Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Wireless Java

Buy
Learning Wireless Java, 9780596002435 (0596002432), O'Reilly, 2001
"Learning Wireless Java" is for Java developers who want to quickly come up to speed and create applications for the Micro Edition audience. This book covers the Connected, Limited Device Configuration and the Mobile Information Device Profile (MIDP), both currently available from Javasoft. The CLDC contains APIs for small devices that are constrained by both memory and processing power. MIDP builds on top of the CLDC and adds APIs specifically for devices such as mobile phones and pagers, allowing programmers to create MIDlet applications. This book offers a solid introduction to J2ME and MIDP, including an explanation of the J2ME Wireless Toolkit, the MIDlet lifecycle methods, the Java application manager, and the CLDC and MIDP constraints. In addition, we cover the javax.microedition.io, javax.microedition.rms, javax.microedition.lcdui, and javax.microedition.midlet classes, as well as the modified java.lang, java.io, and java.util classes. Discussion centers around building safe, compact applications with the sophisticated graphical interface, database, and networking capabilities that the J2ME supports. In addition, this book also shows you how to download your applications to the latest J2ME-enabled devices, including the Motorola i50x and i85s phones and upgraded Palm handhelds.

A guide for Java developers who want to quickly come up to speed and create applications for the Micro Edition audience. Offers a solid introduction to J2ME and MIDP, including an explanation of the J2ME Wireless Toolkit and the MIDP constraints. Softcover.

About the Author

Qusay H. Mahmoud is an independent contractor for Sun Microsystems. He has written several articles for the Java Developer Connection that cover J2ME, including the MIDP and the CLDC APIs. He has also presented tutorials on developing wireless applications at a number of international conferences worldwide. He is the author of Learning Wireless Java (O'Reilly), and Distributed Programming with Java (Manning Publications).
(HTML tags aren't allowed.)

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)
Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)

Expert C# 5.0 is a book about getting the best from C#. It’s based on the principle that to write good, high-performance, robust applications you need to understand whats going on deep under the hood. If you are already experienced with writing managed applications and want to learn more about how to get the best from the ...


Transformers and Inductors for Power Electronics: Theory, Design and Applications
Transformers and Inductors for Power Electronics: Theory, Design and Applications

Based on the fundamentals of electromagnetics, this clear and concise text explains basic and applied principles of transformer and inductor design for power electronic applications. It details both the theory and practice of inductors and transformers employed to filter currents, store electromagnetic energy, provide physical isolation...

Cisco Network Design Solutions for Small-Medium Businesses
Cisco Network Design Solutions for Small-Medium Businesses

Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.

  • Design and implement effective network solutions by mastering the design process that is used by...

Optical Communication Theory and Techniques
Optical Communication Theory and Techniques
Since the advent of optical communications, a great technological effort has
been devoted to the exploitation of the huge bandwidth of optical fibers. Starting
from a few Mb/s single channel systems, a fast and constant technological
development has led to the actual 10 Gb/s per channel dense wavelength division
multiplexing
...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy