|
|
|
|
|
|
Java InstantCode: Developing Applications Using JabberThis code-rich reference includes many applications, such as instant technical support, airline reservation, group chatting, contact list, and chat room applications.
Jabber is an open source set of streaming XML protocols used for messaging, such as Instant Messaging (IM), and remote system monitoring. Jabber allows... | | Java Persistence with Hibernate
Summary
Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR... | | Pro JSF and Ajax: Building Rich Internet ComponentsSince JavaServer Faces first arrived on the Internet technology stage as the new standard for building Java-based Web applications, it has gained significant attention from the Java EE Web development community.Many developers are excited that they can use the standard JavaServer Faces HTML Basic RenderKit to create HTML-based Web... |
|
Oracle ADF Faces Cookbook
This is a cookbook that covers more than 80 different recipes to teach you about different aspects of Oracle ADF Faces. It follows a practical approach and covers how to build your components for reuse in different applications. This book will also help you in tuning the performance of your ADF Faces application.
If you are... | | Pro JSF and HTML5: Building Rich Internet Components
Pro JSF and HTML5 shows you how to leverage the full potential of JavaServer Faces (JSF) and HTML5. This book is for Java developers who aspire to build sophisticated, enterprise-grade web experiences with HTML5-enabled JSF. Written by JSF experts and verified by established community figures, this book will serve as your primary resource,... | | Spring Security 3.x Cookbook
Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.
Overview
-
Learn about all the mandatory security measures for modern day applications using...
|
|
|
Result Page: 7 6 5 4 3 2 1 |