Author: John Hunt
Publisher: Springer Science & Business Media
ISBN: 1447106075
Category : Computers
Languages : en
Pages : 330
Book Description
Intended for those who already know the Java language, this book will help programmers get the most out of Javas capabilities. Topics covered include: good Java style for reusable components, using Java beans, the JDBC, optimizing and testing code, using the IFC tools, and the new JFC. It also explores the significant and exciting developments in Java and covers techniques that will be fundamental to programmers developing significant applications in Java.
Key Java
Author: John Hunt
Publisher: Springer Science & Business Media
ISBN: 1447106075
Category : Computers
Languages : en
Pages : 330
Book Description
Intended for those who already know the Java language, this book will help programmers get the most out of Javas capabilities. Topics covered include: good Java style for reusable components, using Java beans, the JDBC, optimizing and testing code, using the IFC tools, and the new JFC. It also explores the significant and exciting developments in Java and covers techniques that will be fundamental to programmers developing significant applications in Java.
Publisher: Springer Science & Business Media
ISBN: 1447106075
Category : Computers
Languages : en
Pages : 330
Book Description
Intended for those who already know the Java language, this book will help programmers get the most out of Javas capabilities. Topics covered include: good Java style for reusable components, using Java beans, the JDBC, optimizing and testing code, using the IFC tools, and the new JFC. It also explores the significant and exciting developments in Java and covers techniques that will be fundamental to programmers developing significant applications in Java.
Foundational Java
Author: David Parsons
Publisher: Springer Nature
ISBN: 3030545180
Category : Computers
Languages : en
Pages : 612
Book Description
Java is now well-established as one of the world’s major programming languages, used in everything from desktop applications to web-hosted applications, enterprise systems and mobile devices. Java applications cover cloud-based services, the Internet of Things, self-driving cars, animation, game development, big data analysis and many more domains. The second edition of Foundational Java: Key Elements and Practical Programming presents a detailed guide to the core features of Java – and some more recent innovations – enabling the reader to build their skills and confidence though tried-and-trusted stages, supported by exercises that reinforce the key learning points. All the most useful and commonly applied Java syntax and libraries are introduced, along with many example programs that can provide the basis for more substantial applications. Use of the Eclipse Integrated Development Environment (IDE) and the JUnit testing framework is integral to the book, ensuring maximum productivity and code quality when learning Java, although to ensure that skills are not confined to one environment the fundamentals of the Java compiler and run time are also explained. Additionally, coverage of the Ant tool will equip the reader with the skills to automatically build, test and deploy applications independent of an IDE. Topics and features: • Presents the most up-to-date information on Java, including Java 14 • Examines the key theme of unit testing, introducing the JUnit 5 testing framework to emphasize the importance of unit testing in modern software development • Describes the Eclipse IDE, the most popular open source Java IDE and explains how Java can be run from the command line • Includes coverage of the Ant build tool • Contains numerous code examples and exercises throughout • Provides downloadable source code, self-test questions, PowerPoint slides and other supplementary material at the website http://www.foundjava.com This hands-on, classroom-tested textbook/reference is ideal for undergraduate students on introductory and intermediate courses on programming with Java. Professional software developers will also find this an excellent self-study guide/refresher on the topic. Dr. David Parsons is National Postgraduate Director at The Mind Lab, Auckland, New Zealand. He has been teaching programming in both academia and industry since the 1980s and writing about it since the 1990s.
Publisher: Springer Nature
ISBN: 3030545180
Category : Computers
Languages : en
Pages : 612
Book Description
Java is now well-established as one of the world’s major programming languages, used in everything from desktop applications to web-hosted applications, enterprise systems and mobile devices. Java applications cover cloud-based services, the Internet of Things, self-driving cars, animation, game development, big data analysis and many more domains. The second edition of Foundational Java: Key Elements and Practical Programming presents a detailed guide to the core features of Java – and some more recent innovations – enabling the reader to build their skills and confidence though tried-and-trusted stages, supported by exercises that reinforce the key learning points. All the most useful and commonly applied Java syntax and libraries are introduced, along with many example programs that can provide the basis for more substantial applications. Use of the Eclipse Integrated Development Environment (IDE) and the JUnit testing framework is integral to the book, ensuring maximum productivity and code quality when learning Java, although to ensure that skills are not confined to one environment the fundamentals of the Java compiler and run time are also explained. Additionally, coverage of the Ant tool will equip the reader with the skills to automatically build, test and deploy applications independent of an IDE. Topics and features: • Presents the most up-to-date information on Java, including Java 14 • Examines the key theme of unit testing, introducing the JUnit 5 testing framework to emphasize the importance of unit testing in modern software development • Describes the Eclipse IDE, the most popular open source Java IDE and explains how Java can be run from the command line • Includes coverage of the Ant build tool • Contains numerous code examples and exercises throughout • Provides downloadable source code, self-test questions, PowerPoint slides and other supplementary material at the website http://www.foundjava.com This hands-on, classroom-tested textbook/reference is ideal for undergraduate students on introductory and intermediate courses on programming with Java. Professional software developers will also find this an excellent self-study guide/refresher on the topic. Dr. David Parsons is National Postgraduate Director at The Mind Lab, Auckland, New Zealand. He has been teaching programming in both academia and industry since the 1980s and writing about it since the 1990s.
Java Cryptography
Author: Jonathan Knudsen
Publisher: "O'Reilly Media, Inc."
ISBN: 1449390617
Category : Computers
Languages : en
Pages : 366
Book Description
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449390617
Category : Computers
Languages : en
Pages : 366
Book Description
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.
Foundational Java
Author: David Parsons
Publisher: Springer Science & Business Media
ISBN: 1447124782
Category : Computers
Languages : en
Pages : 556
Book Description
This book presents a guide to the core features of Java – and some more recent innovations – enabling the reader to build skills and confidence though tried-and-trusted stages, supported by exercises that reinforce key learning points. All of the most useful and commonly applied Java syntax and libraries are introduced, along with many example programs that can provide the basis for more substantial applications. Use of the Eclipse IDE and the JUnit testing framework is integral to the book, ensuring maximum productivity and code quality, although to ensure that skills are not confined to one environment the fundamentals of the Java compiler and run time are also explained. Additionally, coverage of the Ant tool will equip the reader with the skills to automatically build, test and deploy applications independent of an IDE. Features: presents information on Java 7; contains numerous code examples and exercises; provides source code, self-test questions and PowerPoint slides at an associated website.
Publisher: Springer Science & Business Media
ISBN: 1447124782
Category : Computers
Languages : en
Pages : 556
Book Description
This book presents a guide to the core features of Java – and some more recent innovations – enabling the reader to build skills and confidence though tried-and-trusted stages, supported by exercises that reinforce key learning points. All of the most useful and commonly applied Java syntax and libraries are introduced, along with many example programs that can provide the basis for more substantial applications. Use of the Eclipse IDE and the JUnit testing framework is integral to the book, ensuring maximum productivity and code quality, although to ensure that skills are not confined to one environment the fundamentals of the Java compiler and run time are also explained. Additionally, coverage of the Ant tool will equip the reader with the skills to automatically build, test and deploy applications independent of an IDE. Features: presents information on Java 7; contains numerous code examples and exercises; provides source code, self-test questions and PowerPoint slides at an associated website.
Deductive Software Verification – The KeY Book
Author: Wolfgang Ahrendt
Publisher: Springer
ISBN: 3319498126
Category : Computers
Languages : en
Pages : 714
Book Description
Static analysis of software with deductive methods is a highly dynamic field of research on the verge of becoming a mainstream technology in software engineering. It consists of a large portfolio of - mostly fully automated - analyses: formal verification, test generation, security analysis, visualization, and debugging. All of them are realized in the state-of-art deductive verification framework KeY. This book is the definitive guide to KeY that lets you explore the full potential of deductive software verification in practice. It contains the complete theory behind KeY for active researchers who want to understand it in depth or use it in their own work. But the book also features fully self-contained chapters on the Java Modeling Language and on Using KeY that require nothing else than familiarity with Java. All other chapters are accessible for graduate students (M.Sc. level and beyond). The KeY framework is free and open software, downloadable from the book companion website which contains also all code examples mentioned in this book.
Publisher: Springer
ISBN: 3319498126
Category : Computers
Languages : en
Pages : 714
Book Description
Static analysis of software with deductive methods is a highly dynamic field of research on the verge of becoming a mainstream technology in software engineering. It consists of a large portfolio of - mostly fully automated - analyses: formal verification, test generation, security analysis, visualization, and debugging. All of them are realized in the state-of-art deductive verification framework KeY. This book is the definitive guide to KeY that lets you explore the full potential of deductive software verification in practice. It contains the complete theory behind KeY for active researchers who want to understand it in depth or use it in their own work. But the book also features fully self-contained chapters on the Java Modeling Language and on Using KeY that require nothing else than familiarity with Java. All other chapters are accessible for graduate students (M.Sc. level and beyond). The KeY framework is free and open software, downloadable from the book companion website which contains also all code examples mentioned in this book.
Core Java, Volume II
Author: Cay S. Horstmann
Publisher: Addison-Wesley Professional
ISBN: 0135371732
Category : Computers
Languages : en
Pages : 945
Book Description
The Classic Guide to Advanced Java Programming: Fully Updated for Java 21 Core Java is the leading no-nonsense tutorial and reference for experienced programmers who want to write robust Java code for real-world applications. Now, Core Java, Volume II: Fundamentals, Thirteenth Edition, has been revised to cover the new features and enhancements in the Java 21 long-term support release. As always, all chapters have been completely updated, outdated material has been removed, and the new APIs are covered in detail. This volume focuses on the advanced topics that a programmer needs to know for professional software development and includes authoritative coverage of enterprise programming, networking, databases, security, internationalization, and native methods, as well as complete chapters on the Streams, XML, Date and Time, Scripting, and Compilation APIs. In addition, the chapters on Swing and Graphics cover techniques that are applicable to both client-side user interfaces and server-side generation of graphics and images. Cay S. Horstmann clearly explains sophisticated new features with depth and completeness and demonstrates how to use them to build professional-quality applications. Horstmann's thoroughly tested sample code reflects modern Java style and best practices. The examples are carefully crafted for easy understanding and maximum practical value, so you can rely on them to jump-start your own programs. Master advanced techniques, idioms, and best practices for writing reliable Java code Make the most of enhanced Java I/O APIs, object serialization, and regular expressions Connect to network services, harvest web data with the HTTP/2 client, and serve data with the built-in web server or implement your own server Process code via the Scripting and Compiler APIs Work with the Date and Time API, including recent refinements Leverage the Java security model, user authentication, and the security library's cryptographic functions Preview powerful new APIs for accessing "foreign" functions and memory "This is the definitive reference and instructional work for Java and the Java ecosystem." --Andrew Binstock, Java Magazine See Core Java, Volume I: Fundamentals, Thirteenth Edition, for expert coverage of Java programming fundamentals, including objects, generics, collections, lambda expressions, concurrency, and functional programming. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Publisher: Addison-Wesley Professional
ISBN: 0135371732
Category : Computers
Languages : en
Pages : 945
Book Description
The Classic Guide to Advanced Java Programming: Fully Updated for Java 21 Core Java is the leading no-nonsense tutorial and reference for experienced programmers who want to write robust Java code for real-world applications. Now, Core Java, Volume II: Fundamentals, Thirteenth Edition, has been revised to cover the new features and enhancements in the Java 21 long-term support release. As always, all chapters have been completely updated, outdated material has been removed, and the new APIs are covered in detail. This volume focuses on the advanced topics that a programmer needs to know for professional software development and includes authoritative coverage of enterprise programming, networking, databases, security, internationalization, and native methods, as well as complete chapters on the Streams, XML, Date and Time, Scripting, and Compilation APIs. In addition, the chapters on Swing and Graphics cover techniques that are applicable to both client-side user interfaces and server-side generation of graphics and images. Cay S. Horstmann clearly explains sophisticated new features with depth and completeness and demonstrates how to use them to build professional-quality applications. Horstmann's thoroughly tested sample code reflects modern Java style and best practices. The examples are carefully crafted for easy understanding and maximum practical value, so you can rely on them to jump-start your own programs. Master advanced techniques, idioms, and best practices for writing reliable Java code Make the most of enhanced Java I/O APIs, object serialization, and regular expressions Connect to network services, harvest web data with the HTTP/2 client, and serve data with the built-in web server or implement your own server Process code via the Scripting and Compiler APIs Work with the Date and Time API, including recent refinements Leverage the Java security model, user authentication, and the security library's cryptographic functions Preview powerful new APIs for accessing "foreign" functions and memory "This is the definitive reference and instructional work for Java and the Java ecosystem." --Andrew Binstock, Java Magazine See Core Java, Volume I: Fundamentals, Thirteenth Edition, for expert coverage of Java programming fundamentals, including objects, generics, collections, lambda expressions, concurrency, and functional programming. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Java and Internet Security
Author: Theodore J. Shrader
Publisher: iUniverse
ISBN: 0595135005
Category : Computers
Languages : en
Pages : 210
Book Description
Welcome to exciting realm of Java and Internet Security. Whether you are new to security or a guru, these pages offer introductory and advanced discussions of the hottest security technologies for developing and understanding successful e-business applications. This book offers several complimentary sections for easy reading and includes a generous helping of code samples. We introduce you to the Java 2 security model and its numerous objects and dive into explaining and exploiting cryptography in your applications. This book also includes an in-depth explanation of public keys, digital signatures, and the use of these security objects in Internet messaging and Java programs. We also cover other security topics including the Secure Sockets Layer (SSL), Java Authentication and Authorization Services (JAAS), and Kerberos.
Publisher: iUniverse
ISBN: 0595135005
Category : Computers
Languages : en
Pages : 210
Book Description
Welcome to exciting realm of Java and Internet Security. Whether you are new to security or a guru, these pages offer introductory and advanced discussions of the hottest security technologies for developing and understanding successful e-business applications. This book offers several complimentary sections for easy reading and includes a generous helping of code samples. We introduce you to the Java 2 security model and its numerous objects and dive into explaining and exploiting cryptography in your applications. This book also includes an in-depth explanation of public keys, digital signatures, and the use of these security objects in Internet messaging and Java programs. We also cover other security topics including the Secure Sockets Layer (SSL), Java Authentication and Authorization Services (JAAS), and Kerberos.
JAVA Programming
Author: K. Rajkumar
Publisher: Pearson Education India
ISBN: 933251786X
Category : Computer software
Languages : en
Pages : 704
Book Description
JAVA Programming introduces the subject in a simple and lucid style. This book explains programming concepts and software development practices for solving problems in a clear and precise manner. Every chapter of the book is supported with a wide variety of solved examples and end-of-chapter exercises to help students master this subject.
Publisher: Pearson Education India
ISBN: 933251786X
Category : Computer software
Languages : en
Pages : 704
Book Description
JAVA Programming introduces the subject in a simple and lucid style. This book explains programming concepts and software development practices for solving problems in a clear and precise manner. Every chapter of the book is supported with a wide variety of solved examples and end-of-chapter exercises to help students master this subject.
Java Security
Author: Scott Oaks
Publisher: "O'Reilly Media, Inc."
ISBN: 1449372120
Category : Computers
Languages : en
Pages : 642
Book Description
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449372120
Category : Computers
Languages : en
Pages : 642
Book Description
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
Struts 2 Design and Programming
Author: Budi Kurniawan
Publisher: Brainy Software Inc
ISBN: 0980331609
Category : Computers
Languages : en
Pages : 570
Book Description
Offering both theoretical explanations and real-world applications, this in-depth guide covers the 2.0 version of Struts, revealing how to design, build, and improve Java-based Web applications within the Struts development framework. Feature functionality is explained in detail to help programmers choose the most appropriate feature to accomplish their objectives, while other chapters are devoted to file uploading, paging, and object caching.
Publisher: Brainy Software Inc
ISBN: 0980331609
Category : Computers
Languages : en
Pages : 570
Book Description
Offering both theoretical explanations and real-world applications, this in-depth guide covers the 2.0 version of Struts, revealing how to design, build, and improve Java-based Web applications within the Struts development framework. Feature functionality is explained in detail to help programmers choose the most appropriate feature to accomplish their objectives, while other chapters are devoted to file uploading, paging, and object caching.