Tuesday, May 29, 2007

Java ebooks

Java Concurrency in Practice


Java Concurrency in Practice
By Brian Goetz, Tim Peierls,&nbspJoshua Bloch, Joseph Bowbeer,&nbspDavid Holmes, Doug Lea,

* Publisher: Addison-Wesley Professional
* Number Of Pages: 384
* Publication Date: 2006-05-09
* Sales Rank: 1599
* ISBN / ASIN: 0321349601
* EAN: 9780321349606
* Binding: Paperback
* Manufacturer: Addison-Wesley Professional
* Studio: Addison-Wesley Professional More...Summary:From the Back Cover

"I was fortunate indeed to have worked with a fantastic team on the design and implementation of the concurrency features added to the Java platform in Java 5.0 and Java 6. Now this same team provides the best explanation yet of these new features, and of concurrency in general. Concurrency is no longer a subject for advanced users only. Every Java developer should read this book."
--Martin Buchholz
JDK Concurrency Czar, Sun Microsystems

"For the past 30 years, computer performance has been driven by Moore's Law; from now on, it will be driven by Amdahl's Law. Writing code that effectively exploits multiple processors can be very challenging. Java Concurrency in Practice provides you with the concepts and techniques needed to write safe and scalable Java programs for today's--and tomorrow's--systems."
--Doron Rajwan
Research Scientist, Intel Corp

"This is the book you need if you're writing--or designing, or debugging, or maintaining, or contemplating--multithreaded Java programs. If you've ever had to synchronize a method and you weren't sure why, you owe it to yourself and your users to read this book, cover to cover."
--Ted Neward
Author of Effective Enterprise Java

"Brian addresses the fundamental issues and complexities of concurrency with uncommon clarity. This book is a must-read for anyone who uses threads and cares about performance."
--Kirk Pepperdine
CTO, JavaPerformanceTuning.com

"This book covers a very deep and subtle topic in a very clear and concise way, making it the perfect Java Concurrency reference manual. Each page is filled with the problems (and solutions!) that programmers struggle with every day. Effectively exploiting concurrency is becoming more and more important now that Moore's Law is delivering more cores but not faster cores, and this book will show you how to do it."
--Dr. Cliff Click
Senior Software Engineer, Azul Systems

"I have a strong interest in concurrency, and have probably written more thread deadlocks and made more synchronization mistakes than most programmers. Brian's book is the most readable on the topic of threading and concurrency in Java, and deals with this difficult subject with a wonderful hands-on approach. This is a book I am recommending to all my readers of The Java Specialists' Newsletter, because it is interesting, useful, and relevant to the problems facing Java developers today."
--Dr. Heinz Kabutz
The Java Specialists' Newsletter

"I've focused a career on simplifying simple problems, but this book ambitiously and effectively works to simplify a complex but critical subject: concurrency. Java Concurrency in Practice is revolutionary in its approach, smooth and easy in style, and timely in its delivery--it's destined to be a very important book."
--Bruce Tate
Author of Beyond Java

"Java Concurrency in Practice is an invaluable compilation of threading know-how for Java developers. I found reading this book intellectually exciting, in part because it is an excellent introduction to Java's concurrency API, but mostly because it captures in a thorough and accessible way expert knowledge on threading not easily found elsewhere."
--Bill Venners
Author of Inside the Java Virtual Machine

Threads are a fundamental part of the Java platform. As multicore processors become the norm, using concurrency effectively becomes essential for building high-performance applications. Java SE 5 and 6 are a huge step forward for the development of concurrent applications, with improvements to the Java Virtual Machine to support high-performance, highly scalable concurrent classes and a rich set of new concurrency building blocks. In Java Concurrency in Practice, the creators of these new facilities explain not only how they work and how to use them, but also the motivation and design patterns behind them.

However, developing, testing, and debugging multithreaded programs can still be very difficult; it is all too easy to create concurrent programs that appear to work, but fail when it matters most: in production, under heavy load. Java Concurrency in Practice arms readers with both the theoretical underpinnings and concrete techniques for building reliable, scalable, maintainable concurrent applications. Rather than simply offering an inventory of concurrency APIs and mechanisms, it provides design rules, patterns, and mental models that make it easier to build concurrent programs that are both correct and performant.

This book covers:

* Basic concepts of concurrency and thread safety
* Techniques for building and composing thread-safe classes
* Using the concurrency building blocks in java.util.concurrent
* Performance optimization dos and don'ts
* Testing concurrent programs
* Advanced topics such as atomic variables, nonblocking algorithms, and the Java Memory Model





About the Author

Brian Goetz is a software consultant with twenty years industry experience, with over 75 articles on Java development. He is one of the primary members of the Java Community Process JSR 166 Expert Group (Concurrency Utilities), and has served on numerous other JCP Expert Groups.

Tim Peierls is the very model of a modern multiprocessor, with BoxPop.biz, recording arts, and goings on theatrical. He is one of the primary members of the Java Community Process JSR 166 Expert Group (Concurrency Utilities), and has served on numerous other JCP Expert Groups.

Joshua Bloch is a principal engineer at Google and a Jolt Award-winner. He was previously a distinguished engineer at Sun Microsystems and a senior systems designer at Transarc. Josh led the design and implementation of numerous Java platform features, including JDK 5.0 language enhancements and the award-winning Java Collections Framework. He holds a Ph.D. in computer science from Carnegie Mellon University.

Joseph Bowbeer is a software architect at Vizrea Corporation where he specializes in mobile application development for the Java ME platform, but his fascination with concurrent programming began in his days at Apollo Computer. He served on the JCP Expert Group for JSR-166 (Concurrency Utilities).

David Holmes is director of DLTeCH Pty Ltd, located in Brisbane, Australia. He specializes in synchronization and concurrency and was a member of the JSR-166 expert group that developed the new concurrency utilities. He is also a contributor to the update of the Real-Time Specification for Java, and has spent the past few years working on an implementation of that specification.
Doug Lea is one of the foremost experts on object-oriented technology and software reuse. He has been doing collaborative research with Sun Labs for more than five years. Lea is Professor of Computer Science at SUNY Oswego, Co-director of the Software Engineering Lab at the New York Center for Advanced Technology in Computer Applications, and Adjunct Professor of Electrical and Computer Engineering at Syracuse University. In addition, he co-authored the book, Object-Oriented System Development (Addison-Wesley, 1993). He received his B.A., M.A., and Ph.D. from the University of New Hampshire.

1218 KB

CHM download

NO password or extraction required

Download

Java, Java, Java, Object-Oriented Problem Solving (3rd Edition)


Java, Java, Java, Object-Oriented Problem Solving (3rd Edition)
By Ralph Morelli, Ralph Walde,

* Publisher: Prentice Hall
* Number Of Pages: 880
* Publication Date: 2005-12-22
* Sales Rank: 224094
* ISBN / ASIN: 0131474340
* EAN: 9780131474345
* Binding: Paperback
* Manufacturer: Prentice Hall
* Studio: Prentice Hall More...

Book Description:

Functional and flexible, this guide takes an objects-first approach to Java programming and problem using games and puzzles. Updated to cover Java version 1.5 features, such as generic types, enumerated types, and the Scanner class. Offers independent introductions to both a command-line interface and a graphical user interface (GUI). Features coverage of Unified Modeling Language (UML), the industry-standard, object-oriented design tool. Illustrates key aspects of Java with a collection of game and puzzle examples. Instructor and Student resources available online. For introductory computer programming students or professionals interested in learning Java.

Download

Tuesday, May 22, 2007

The Definitive Guide to Building Java Robots (The Definitive Guide to)


The Definitive Guide to Building Java Robots (The Definitive Guide to)
By Scott Preston

* Publisher: Apress
* Number Of Pages: 440
* Publication Date: 2005-11-11
* Sales Rank: 255928
* ISBN / ASIN: 1590595564
* EAN: 9781590595565
* Binding: Hardcover
* Manufacturer: Apress
* Studio: Apress More...Book Description:

The way Scott lays out the book is really good too . . . He explains everything in easy to understand terms and provides sample code that you can use right away.

— Jim Brown, Robots.net

The Definitive Guide to Building Java Robots is for educators, students, hobbyists, and startups looking for Java/hardware interaction. This book shows you how to use your PC to build robots, and how you can interface with a microcontroller to do the basics. Youll learn to design your robot to navigate, see, speak, recognize your face, listen to you, and build maps.

For up-to-the-minute information, check out Scott's Bots, the author's own website.

Download

Thursday, May 17, 2007

Wireless J2ME™ Platform Programming

By

* Publisher: Prentice Hall PTR
* Number Of Pages: 400
* Publication Date: March 25, 2002
* Sales Rank:
* ISBN / ASIN: 0-13-044914-8More...

Download

Wednesday, May 16, 2007

Java for ColdFusion Developers


Java for ColdFusion Developers
By Eben Hewitt

* Publisher: Pearson Education
* Number Of Pages: 600
* Publication Date: 2003-01-07
* Sales Rank: 516004
* ISBN / ASIN: 0130461806
* EAN: 0076092018766
* Binding: Paperback
* Manufacturer: Pearson Education
* Studio: Pearson Education More...Summary:
Book Description
The ONLY Java programming book ColdFusion developers need!
Everything the ColdFusion pro needs to understand Java technology, install and run a Java Web server, write Java apps, and build and deploy JavaServer Pages!
Practical coverage with loads of code and tips especially for the ColdFusion developer.
Teaches not only object-oriented programming concepts and Java Programming, but also JSP and servlets as well. Macromedia's new ColdFusion MX brings ColdFusion's proven ease of use and productivity to the scalable, standards-based Java technology architecture. Developers can now take advantage of MX's innovations to create rich Internet applications, and for the first time ColdFusion developers will be able to write Java code in ColdFusion templates. In Java for ColdFusion Developers, Hewitt helps the reader quickly get up to speed on the new features of MX, then leverages what the ColdFusion developer already knows to start delving into object-oriented programming concepts and Java programming. Learn the various development environments, basic Java syntax, error handling, exceptions and debugging, then get a GUI overview with AWT and Swing. Create Web sites in Java and learn servlet architecture, JavaServer Pages and how to work with databases. With plenty of code, audience-specific notes, and practical advice Hewitt helps Web developers graduate into full-fledged Java programmers.
Eben Hewitt is in charge of Web development at Cybertrails, the largest ISP in Arizona, whose clients include the Phoenix Coyotes. He is responsible for 1,400 web sites his company hosts and develops for. He is the author of the best-selling book Core ColdFusion 5(0130660612) and the interactive CD-ROM Eben Hewitt's ColdFusion Training Course (0130676071). He is a certified SQL Database Administrator, a certified ColdFusion developer, and holds a Master's degree in Literary Theory. He has published extensively in print and online programming journals, and is on the faculty of the ColdFusion Edge.

Synopsis
The first Java guide specifically for experienced ColdFusion developers and Web professionals!*Leverage your Web and ColdFusion skills to develop powerful Java applications*Master JSP, servlets, custom tags, JavaBeans, JDBC, and other key Java Web technologies*Install and run Apache Tomcat 4 and JRun 4 application servers*Build several complete applications, including an e-commerce site *Includes handy Java glossary and JSP/servlet references *Up-to-the-minute coverage of Java 1.4, JSP 1.2, servlet 2.3, and ColdFusion MX With ColdFusion MX and this book, any Web professional can leverage the power of Java to build robust, high-performance Web applications. Leading Web developer and columnist Eben Hewitt begins with a rapid-fire introduction to Java that builds on what you already know about ColdFusion to teach you exactly what you need to know about Java programming. Hewitt's focused examples, real-world insights, and code will take you from the basics of object-oriented programming to sophisticated JSP/servlet development, XML-based applications, and beyond! *Master object-oriented application design and programming*Build powerful servlets, JavaServer Pages, applets, and desktop applications*Leverage XML & XSLT, exception handling, I/O, JDBC databases, and more*Understand the similarities and key differences between CFML and Java development*Integrate ColdFusion MX with J2EE and servlet technology*Create JSP custom tags and use the brand-new JSP Standard Tag Library*Includes complete references to JSP tags and the Servlet API, plus a handy Java glossaryThe book extensive code examples (downloadable from www corecoldfusion.com) include a start-to-finish Java e-commerce application.

From the Back Cover
The first Java guide specifically for experienced ColdFusion developers and Web professionals!
Leverage your Web and ColdFusion skills to develop powerful Java applications
Master JSP, servlets, custom tags, JavaBeans, JDBC, and other key Java Web technologies
Install and run Apache Tomcat 4 and JRun 4 application servers
Build several complete applications, including an e-commerce site
Includes handy Java glossary and JSP/servlet references
Up-to-the-minute coverage of Java 1.4, JSP 1.2, servlet 2.3, and ColdFusion MX
With ColdFusion MX and this book, any Web professional can leverage the power of Java to build robust, high-performance Web applications. Leading Web developer and columnist Eben Hewitt begins with a rapid-fire introduction to Java that builds on what you already know about ColdFusion to teach you exactly what you need to know about Java programming.

About the Author
EBEN HEWITT, M.A., is a Macromedia Certified ColdFusion Developer and Web Development Manager at Cybertrails.com. He is a frequent columnist, author of Core ColdFusion 5 (Prentice Hall PTR), and creator of Eben Hewitt's ColdFusion Training Course- A Digital Seminar on CD-ROM (PTG Interactive). Every month, millions of people visit the ColdFusion and Java-based sites he has created.

Download

Programming Language Processors in Java: Compilers and Interpreters


Programming Language Processors in Java: Compilers and Interpreters
By David Watt, Deryck Brown,

* Publisher: Prentice Hall
* Number Of Pages: 436
* Publication Date: 2000-04-15
* Sales Rank: 270648
* ISBN / ASIN: 0130257869
* EAN: 9780130257864
* Binding: Hardcover
* Manufacturer: Prentice Hall
* Studio: Prentice Hall More...Summary:
Book Info
Aims to exemplify good software engineering principles at the same time as explaining the specific techniques needed to build compilers and interpreters. Examples included. DLC: Java (Computer program language)

From the Back Cover



David A Watt and Deryck F Brown

Programming Language Processors in Java

Compilers and Interpreters





This book provides a gently paced introduction to techniques for implementing programming languages by means of compilers and interpreters, using the object-oriented programming language Java. The book aims to exemplify good software engineering principles at the same time as explaining the specific techniques needed to build compilers and interpreters.

Features

* The book shows clearly how a simple compiler can be decomposed into a syntactic analyzer, a contextual analyzer, and a code generator, communicating via an abstract syntax tree.

* The book is accompanied by a complete working compiler and interpreter, provided via the Internet, and free of charge for educational use.

* The book contains numerous exercises, together with sample answers to selected exercises. It also contains a number of suggested projects, involving extensions to the accompanying compiler.

* All examples in the book are expressed in Java, and the compiler and interpreter are structured using object-oriented design patterns.

David Watt teaches algorithms and data structures, programming languages, and software design. Deryck Brown teaches compilers, object-oriented programming, operating systems, and software engineering.

Download

Monday, May 14, 2007

J2EE Security for Servlets, EJBs, and Web Services


J2EE Security for Servlets, EJBs, and Web Services
By Pankaj Kumar

* Publisher: Prentice Hall PTR
* Number Of Pages: 448
* Publication Date: 2003-08-29
* Sales Rank: 696243
* ISBN / ASIN: 0131402641
* EAN: 0076092022602
* Binding: Paperback
* Manufacturer: Prentice Hall PTR
* Studio: Prentice Hall PTR More...Summary:
Preface A few years ago, before J2EE (Java 2 Platform, Enterprise Edition) became such a dominant platform for building enterprise systems and long before Web services became central to the IT1 strategy of every small and big company, I was tasked with helping a small company use one of our products more effectively. This company, which must remain unnamed for reasons of privacy and professional conduct, was setting up an infrastructure for creation of a dynamic and collaborative community of businesses so that their people and systems could exchange digital content and information over the Internet in the most appropriate, secure and timely manner. Our sales and marketing department did a good job in convincing them that our soon to be released product, let us call it ProdX, was built to satisfy exactly the same requirements. After numerous technical meetings and the promise of premium customer status, free technical support, training and unrestricted access to the development team, they agreed to use ProdX. ProdX was built and promoted as a Java-based middleware product suite with a strong and unique security architecture for allowing companies to do business over the Internet. However, few people outside the security development team, a sub-team of the overall ProdX development group, understood this architecture well and even fewer knew how to use its APIs effectively or how to set it up for data center operations. Developers, managers and operations staff of the customer company had numerous meetings, conference calls and e-mail exchanges, either through me or directly with the security development team. And still, they did not feel comfortable. At that time, security wasn't the focus of my primary job and I must confess that I was also having difficulty in comprehending certain aspects of ProdX in the context of its use. Watching these interactions, it became obvious to me that the security team had a sound cryptographic background and were deeply involved in developing state of the art security theory and standards, but had little appreciation of the fact that our customers were more interested in having their developers know what APIs to use, how, when and where to use them and having their operations people know how to work out step-by-step processes and procedures for routine and emergency operations. Eventually, they did get what they wanted and were able to go live with ProdX. However, we all felt that the whole thing took a lot more time and attention than required. Since then I have spent a lot more time working with J2EE-based products and Web services infrastructure software. As an architect, I have also participated in the development of Java standards for Web services, reviewed many software products in these areas and interacted with many customer organizations and listened to their security, performance and other concerns. In the meantime, the Java platform, its security architecture and APIs have continuously evolved and matured. However, none of this has eliminated the gap between what is available and what is in use. I attribute this to many factors. The reality is that some of the technology is new and, at times, quite complex. At the same time, the changing ways of using the Internet for business-critical operations and the increased threat of a security breach have kept practitioners on their toes. This constant churn at both ends has kept the gap alive and kicking. It is the aim of this book to narrow this gap, at least in the area of J2EE-based Web applications. J2SE, J2EE and Application Security The life of a Java professional had never been more fun . Besides the traditional forms of enterprise application and Web application development, the emergence of XML and Web services technologies has resulted in a new Web-based distributed computing paradigm, with its own set of design, development, deployment and operations challenges. This is matched, in almost equal measures, by the growing richness of the Java platform, consisting of both the Standard Edition (J2SE) and the Enterprise Edition (J2EE), making it an apt toolchest for an increasingly complex world. This toolchest has drawers filled with APIs, patterns, tools and conventions for different environments and different needs, waiting to be used at the right place , at the right time , and in the right way . Multiple implementations of the same APIs, sometimes from different vendors but more often freely available from the Open Source Community, allows one to pick the best of breed for a particular purpose. It is this multitude of choice and freedom that makes the life of a Java professional fun. It is often claimed that Java is designed for secure programming from the ground up and security features are not added as an after thought. And indeed, it is quite unique in its ability to declaratively specify what a piece of code can and cannot do. Support for cryptographic operations and public key infrastructure through Java Cryptographic Architecture in J2SE is also quite remarkable. In addition, J2EE defines security characteristics for distributed processing, data access, transactions, management and other such aspects. All this makes Java an excellent platform for constructing secure enterprise applications. Scope of the Book This book is about applying security concepts, techniques, APIs, standards, and tools to identify and address enterprise application security problems within the Java environment. You will find the contents of the book useful for all stages of development lifecycle-;analysis, design, development, deployment, and operations. Personally, I have enjoyed reading books that provide insight into the subject matter with appropriate focus on whys and hows , turning to official standards or product manuals for detailed and highly specific information. I also like to see source code fragments, execution steps and screen shots wherever appropriate, for they tell me exactly what to do to accomplish a desired result. Needless to say, this book has been written with these principles in mind. The main focus of this book is the security of data and information maintained and served by enterprise applications running under J2EE. We accomplish this by identifying what needs to be secured, how and where. Further, we discuss the different mechanisms to accomplish this, covering: Cryptographic concepts and services that are at the heart of many security APIs and features. Public Key Infrastructure that makes cryptography as basis of trust for security applications. Access Control based on the origin of code, signer of the signed code, and/or the credentials of the user running the code. Secure communication of data using Secure Socket Layer, also known as Trasport Layer Security. Integrity, Authentication and Confidentiality of XML messages using XML Signature and Encryption. Security characteristics of RMI-based distributed applications. Securing Servlet and JSP-based Web Applications. Security of EJB-based Enterprise Applications. Security aspects of Web services development, deployment and operation. Enterprise application security in J2EE builds upon the foundation of security concepts and architectures such as Cryptography, Digital Certificates, Public Key Infrastructure, Java security model, Java Cryptographic Architecture and so on. One should be comfortable with these topics to follow the main text. Similarly, one should know about basic Web services interoperability standards such as SOAP and WSDL and the Java programming model for Web services. Not assuming that every reader is current with all these technologies, we cover them briefly, stressing those aspects that are more pertinent for the main subject area. This coverage is more appropriate as a quick refresher than a basic introduction and should be used accordingly. At the same time, we must acknowledge that computer and network security is a vast and expanding field incorporating such diverse topics as cryptography, operating system security, network security, firewalls, computer viruses and anti-virus software, intrusion detection, incident response, vulnerability analysis, biometrics, social engineering, privacy and legal aspects, trusted computing, and so on. Though we recognize the importance of these topics in comprehensive security planning, they are not the focus of this book and hence find only brief overview in the first chapter. We also refrain from getting into details of product specific non-standard security features. The only exceptions are product features that help illustrate a specific point not covered by the standards. Who Should Read this Book This book is primarily written for: Java programmers developing Java applications. System administrators managing J2EE-based applications. Architects evaluating security products from different vendors and architecting secure Java solutions. Project Managers planning, managing and overseeing Java and J2EE projects. Specifically, this book is not targeted at security experts designing security protocols, APIs and products. Intruders looking at devising ways to compromise security will also be disappointed. Organization of the Book This book is organized in three main parts. Part One is more like a refresher on basic security and the Java platform. If you are already familiar with these topics, feel free to move over to Part Two. You could also choose to read certain sections selectively and in any order. Part Two introduces the basic building blocks of the Java platform's security architecture-;APIs for cryptographic operations, Public Key Infrastructure, access control mechanisms, Java Secure Socket Extension for secure communication, and APIs for XML Signature and XML Encryption. A sound understanding of these topics is a must for developing secure enterprise applications. Part Three ties the concepts introduced in Part Two to specific J2EE APIs - RMI, Servlets, EJBs and Web services-;and their security architecture. The emphasis is on getting hands-on exposure to APIs and products, aided by lots of working code.

Download

Component Development for the Java Platform


Component Development for the Java Platform
By Stuart Dabbs Halloway

* Publisher: Addison-Wesley Professional
* Number Of Pages: 304
* Publication Date: 2001-12-15
* Sales Rank: 661590
* ISBN / ASIN: 0201753065
* EAN: 0785342753066
* Binding: Paperback
* Manufacturer: Addison-Wesley Professional
* Studio: Addison-Wesley Professional More...Well, I don't think this book deserves 5 stars and here's why:

1) The book provides good description of Class Loaders, reflection and of serialization (I liked them, really) but after that I was expecting to read about, you know, "Component Development", the title of the book ? Like how one divides his application to deployable components, why and when. Nothing about that - author just gave us tools that we can use without providing any further information. But I know Java provides CL, reflection and serialization for many years already - how does it help me to write components ? Where are some real-life examples (besides RMI, EJB and JSP) ?
The chapter about GP (Generative Programming) gives a good description of various approaches about it (and if you know JBoss and it's dynamic invocation stack built with dynamic proxies vs other containers running "rmic" - you understand them even better) but still, I would call this book "Java CL, reflection, serialization and high-level GP overview" - that's exactly the information that I've received from it. Nothing about "component development" besides some basic example in the very beginning.

2) The book spends time and space discussing C++/COM integration with Java and while I understand some will find this information invaluable - I'm sure for most Java developers (and that includes me) this is highly irrelevant.

3) In 2007 it's became outdated in many points as we have Java SE 6 released and 7 upcoming - author only mentions J2SE 1.4.2. Right, many points still hold true but not all of them (does setAccessible(true) allows one to write final fields or not?) and one can never be sure whether what's he's reading is correct today the way it was back in 2001

4) I checked "Java Class File Editor" plugged by the author - it's just a bunch of classes without any documentation (and I've never heard of any bytecode instrumentation guru using this library so it's not of big value after all). So I would call it a "toy project abandoned shortly after

Download

Saturday, May 12, 2007

Core JavaServer(TM) Faces, Second Edition (2nd Edition) (Core Series)


Core JavaServer(TM) Faces, Second Edition (2nd Edition) (Core Series)

By David Geary, Cay Horstmann,

Publisher: Prentice Hall PTR

Number Of Pages: 752

Publication Date: 2007-05-08

Sales Rank: 4466

ISBN / ASIN: 0131738860

EAN: 9780131738867

Binding: Paperback

Manufacturer: Prentice Hall PTR

Studio: Prentice Hall PTR

Book Description:
JavaServer Faces (JSF) is quickly emerging as the leading solution for rapid user interface development in Java-based server-side applications. Now, Core JavaServer™ Faces—the #1 guide to JSF—has been thoroughly updated in this second edition, covering the latest feature enhancements, the powerful Ajax development techniques, and open source innovations that make JSF even more valuable.
Authors David Geary and Cay Horstmann delve into all facets of JSF 1.2 development, offering systematic best practices for building robust applications, minimizing handcoding, and maximizing productivity. Drawing on unsurpassed insider knowledge of the Java platform, they present solutions, hints, tips, and “how-tos” for writing superior JSF 1.2 production code, even if you’re new to JSF, JavaServer Pages™, or servlets.
The second edition’s extensive new coverage includes: JSF 1.2’s improved alignment with the broader Java EE 5 platform; enhancements to the JSF APIs; controlling Web flow with Shale; and using Facelets to replace JSP with XHTML markup. The authors also introduce Ajax development with JSF—from real-time validation and Direct Web Remoting to wrapping Ajax in JSF components and using the popular Ajax4jsf framework.
This book will help you
Automate low-level details and eliminate unnecessary complexity in server-side development
Discover JSF best practices, ranging from effective UI design and style sheets to internationalization
Use JSF with Tiles to build consistent, reusable user interfaces
Leverage external services such as databases, LDAP directories, authentication/authorization, and Web services
Use JBoss Seam to greatly simplify development of database-backed applications
Implement custom components, converters, and validators
Master the JSF 1.2 tag libararies, and extend JSF with additional tag libraries
Download

Java Security Solutions


Java Security SolutionsBy Rich Helton, Johennie Helton,

Publisher: Wiley

Number Of Pages: 600

Publication Date: 2002-05-01

Sales Rank: 916361

ISBN / ASIN: 0764549286

EAN: 0785555105881

Binding: Paperback

Manufacturer: Wiley

Studio: Wiley

Book Description:
* Provides practical solutions, not just principles of security.* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.* Introduces concepts of security patterns for designing systems, as well as security building blocks for systems.* Discusses algorithms, cryptography and architecture.* Addresse security for different application servers.
Download

Friday, May 11, 2007

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications


By Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin,

* Publisher: Addison-Wesley Professional

* Number Of Pages: 416

* Publication Date: 2004-02-17

* Sales Rank: 652539

* ISBN / ASIN: 0321118898

* EAN: 0076092018827

* Binding: Paperback

* Manufacturer: Addison-Wesley Professional

* Studio: Addison-Wesley Professional

Book Info:"For a long time, there has been a need for a J2EE(TM) security book. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of the J2EE platform and e-business."-From the Foreword by Steven A. Mills, Senior Vice President and Group Executive, Software Group, IBM CorporationEnterprise Java(TM) Security: Building Secure J2EE(TM) Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java(TM) 2 Platform, Enterprise Edition (J2EE), and Java(TM) 2 Platform, Standard Edition (J2SE(TM)), security architectures and offers practical solutions and usage patterns to address the challenges of Java security.To aid developers who need to build secure J2EE applications, Enterprise Java(TM) Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP(TM)), and Enterprise JavaBeans(TM) (EJB(TM))�technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security.Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology.The relationship between Java and cryptographic technologies is covered in great detail, including:- Java Cryptography Architecture (JCA)- Java Cryptography Extension (JCE)- Public-Key Cryptography Standards (PKCS)- Secure/Multipurpose Internet Mail Extensions (S/MIME)- Java Secure Socket Extension (JSSE)
Download

Friday, May 4, 2007

CodeNotes for J2EE: EJB, JDBC, JSP, and Servlets



Publisher: Random House Trade Paperbacks
Number Of Pages: 240
Publication Date: 2002-01-02
Sales Rank: 248327
ISBN / ASIN: 0812991907
EAN: 9780812991901
Binding: Paperback
Manufacturer: Random House Trade Paperbacks
Studio: Random House Trade Paperbacks Book Description:
CodeNotes provides the most succinct, accurate, and speedy way for a developer to ramp up on a new technology or language. Unlike other programming books, CodeNotes drills down to the core aspects of a technology, focusing on the key elements needed in order to understand it quickly and implement it immediately. It is a unique resource for developers, filling the gap between comprehensive manuals and pocket reference.CodeNotes for J2EE: EJB, JDBC, JSP, and Servlets introduces Java developers to the key database and web development technologies of the Java 2 Platform, Enterprise Edition. The JDBC API, JavaServer Pages, and Servlet frameworks are covered individually with examples that show how these technologies work together to create robust, dynamic web-based applications. The book also explains how to use Enterprise JavaBeans to create large, distributed, scalable applications.This edition of CodeNotes includes:-A global overview of a technology and explanation of what problems it can be used to solve-Real-world examples-"How and Why," "Design Notes," and "Bugs and Caveats" sections that provide hints, tricks, workarounds, and tips on what should be taken advantage of or avoided-Instructions and classroom-style tutorials throughout from expert trainers and software developersVisit www.codenotes.com for updates, source code templates, access to message boards, and discussion of specific problems with CodeNotes authors and other developers.Every CodeNotes title is written and reviewed by a team of commercial software developers and technology experts. See "About the Authors" at the beginning of the book for more information.

Tuesday, May 1, 2007

Groovy Programming: An Introduction for Java Developers


  • Publisher: Morgan Kaufmann
  • Number Of Pages: 496
  • Publication Date: 2006-12-06
  • Sales Rank: 65225
  • ISBN / ASIN: 0123725070
  • EAN: 9780123725073
  • Binding: Paperback
  • Manufacturer: Morgan Kaufmann
  • Studio: Morgan Kaufmann
Book Description:
Groovy Programming is an introduction to the Java-based scripting language Groovy. Groovy has much in common with popular scripting languages such as Perl, Python, and Ruby, but is written in a Java-like syntax. And, unlike these other languages, Groovy is sanctioned by the Java community for use on the Java platform. Since it is based on Java, applications written in Groovy can make full use of the Java Application Programmer Interfaces (APIs). This means Groovy can integrate seamlessly with applications written in Java, while avoiding the complexities of the full Java language. This bare-bones structure also means Groovy can be used as an introduction to Java and to programming in general. Its simpler constructions and modern origins make it ideal as a first language and for introducing principles such as object-oriented programming.
This book introduces all the major aspects of Groovy development and emphasizes Groovy's potential as a learning tool. Case studies and exercises are included, along with numerous programming examples. The book begins assuming only a general familiarity with Java programming, and progresses to discuss advanced topics such as GUI builders, Groovlets, Unit Testing, and Groovy SQL.

* The first comprehensive book on Groovy programming that shows how writing applications and scripts for the Java platform is fast and easy

* Written by leading software engineers and acclaimed computing instructors

* Offers numerous programming ex
Download

Beginning JavaServer Pages


  • Publisher: Wrox
  • Number Of Pages: 1296
  • Publication Date: 2005-02-18
  • Sales Rank: 298305
  • ISBN / ASIN: 076457485X
  • EAN: 9780764574856
  • Binding: Paperback
  • Manufacturer: Wrox
Book Description:
  • JSP is one of the core technologies for server-side Java applications and the 2.0 release, which this book covers in detail, makes JSP an even more powerful tool
  • Walks Java programmers and Web developers through JSP fundamentals, including JSP syntax and directives, JSP Expression Language, JSP Tag libraries, JSTL, and techniques for testing and debugging
  • Shows how to use JSP in real-world Web applications along with open source frameworks such as Struts, WebWork, and Turbine, software design methodologies, and developer tools like Ant, jUnit, and CVS, as well as popular IDEs (integrated development environmnents)
  • Each chapter has an exercise section with solutions on the companion Web site


http://rapidshare.com/files/28839869/begjsp.rar

Monday, April 2, 2007

Java Persistence with Hibernate


Publisher: Manning Publications
Number Of Pages: 841
Publication Date: 2006-11-24
Sales Rank: 1629
ISBN / ASIN: 1932394885
EAN: 9781932394887
Binding: Paperback
Manufacturer: Manning Publications
Studio: Manning Publications

Book Description: )
Persistence-the ability of data to outlive an instance of a program-is central to modern applications. Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational mapping making it a snap to work with SQL databases in Java applications. Hibernate applications are cheaper, more portable, and more resilient to change. Because it conforms to the new EJB 3.0 and Java Persistence 1.0 standard, Hibernate allows the developer to seamlessly create efficient, scalable Java EE applications.
Java Persistence with Hibernate explores Hibernate by developing an application that ties together hundreds of individual examples. You'll immediately dig into the rich programming model of Hibernate 3.2 and Java Persistence, working through queries, fetching strategies, caching, transactions, conversations, and more. You'll also appreciate the well-illustrated discussion of best practices in database design, object/relational mapping, and optimization techniques.
In this revised edition of the bestselling Hibernate in Action, authors Christian Bauer and Gavin King-the founder of the Hibernate project-cover Hibernate 3.2 in detail along with the EJB 3.0 and Java Persistence standard.
Download

Objects First with Java: A Practical Introduction Using BlueJ



Publisher: Prentice Hall
Number Of Pages: 400
Publication Date: 2002-10-23
Sales Rank: 485693
ISBN / ASIN: 0130449296
EAN: 9780130449290
Binding: Paperback
Manufacturer: Prentice Hall
Studio: Prentice Hall
Summary:BlueJ is a Java development environment that runs on top of the Sun Microsystems Java Development Kit making use of the standard compiler and virtual machine. It allows readers to create objects of any class and interact with their methods. For the first time, the traditionally difficult concepts of objects and classes are brought alive in an easily manipulable visual form. This truly “objects first” approach within the customized BlueJ environment will revolutionize the way programming is learned. The book includes a copy of BlueJ. Takes a project driven approach to problem solving—the book is structured along the lines of fundamental development tasks—providing readers with clear coverage of the principles of object-oriented programming. Programmers and non-programmers who want to learn Java with a state of the art approach and user-friendly programming environment.From the Back CoverObjects First with Java:A Practical Introduction Using BlueJLearn JAVA and BLUEJ straight from the source!Welcome to the first introductory programming textbook that completely integrates BlueJ with the teaching of object-oriented principles using Java.BlueJ is a Java development environment that runs on top of the Sun Microsystems Java Development Kit making use of the standard compiler and virtual machine. It has been specifically designed for the introductory teaching of object-oriented programming, allowing the student to create objects of any class and interact with their methods. This truly objects first approach within the customized BlueJ environment is expected to revolutionise the way programming is taught. For the first time, the traditionally difficult concepts of objects and classes are brought alive in an easily manipulable visual form.Key features:* Objects first approachBlueJ supports teaching tools that are not available in other environments, including the visualisation of class structure. This means that the student can interact with objects directly, even before looking at the first line of Java syntax!* Project driven approach to problem solvingEach chapter contains problems which are analyzed before the language constructs are introduced that can solve them. What is more, the book is structured along the lines of fundamental development tasks, giving clear coverage of the principles of object-oriented programming* Spiral approachChallenging topics are introduced early, and then revised later in the book in a different context in order to deepen understanding* Thorough treatment of object-oriented principlesPointers are used within each chapter to refer the student to further reading, supplementary sources, and language references* SupplementsThe book is accompanied by a CD-ROM containing the JDK and BlueJ for various operating systems. A supplement download website contains the style guide for all examples used in the book, as well as PowerPoint slides for instructors.

Java After Hours: 10 Projects You'll Never Do at Work



Publisher: Sams
Number Of Pages: 336
Publication Date: 2005-06-08
Sales Rank: 49841
ISBN / ASIN: 0672327473
EAN: 9780672327476
Binding: Paperback
Manufacturer: Sams
Studio: Sam

Book Description: )
Take your Java programming skills beyond the ordinary. Java After Hours: 10 Projects You'll Never Do at Work will make Java your playground with ten detailed projects that will have you exploring the various fields that Java offers to build exciting new programs. You'll learn to:
Create graphics interactively on Web servers
Send images to Web browsers
Tinker with Java's Swing package to make it do seemingly impossible things
Search websites and send e-mail from Java programs
Use multithreading, Ant and more!
Increase your Java arsenal by taking control of Java and explore its possibilities with Java After Hours.
Download

Java Security (2nd Edition)


ISBN: 0596001576

Author: Scott Oaks

Publisher: O'Reilly Media, Inc.

Edition: 2 edition (May 17, 2001)

Paperback: 620 pages

Summary:Scott Oakes' Java Security is extraordinary both for its technical depth and its readability. It provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations. The book opens with a clear discussion of what Java security is, how the various Java sandbox models work, and how Java applications and applets execute within the security model. The following chapters look in depth at the elements of the Java security architecture: language rules, class loaders, the security manager, the access controller, and permission objects. All these chapters provide detailed information on implementation, as well as an excellent explanation of the role of each feature within the entire security picture. The second half of the book covers cryptographic features in the Java security package (much enhanced in Java 1.2) and how Java programs work with code that performs authentication and encryption. Here, you'll find detailed chapters on message digests, keys and certificates, key management, digital signatures, and the Java Cryptography Extensions. Anyone who needs to understand Java security, but especially those who will implement security features in Java applications, will want to own this book.

Concurrent Programming in Java(TM): Design Principles and Pattern (2nd Edition)


ISBN: 0201310090
Author: Doug Lea
Publisher: Addison-Wesley Professional
Edition: 2 edition (November 5, 1999)
Paperback: 432 pages
Summary:Concurrent Programming in Java, 2nd Edition surveys a wide field of research in parallelism and concurrency and shows how to do more with multithreading in Java with dozens of patterns and design tips. Written for the advanced Java developer, this book offers a comprehensive tour of leading-edge thinking about parallel coding processes.Within the dozens of techniques and tips offered here, this book accomplishes at least two goals. First, it shows how concurrency is implemented by default within Java, with material on how built-in features (like the synchronized keyword and its memory model) can be expected to perform when dealing with multiple threads. Naturally, Java threads themselves are also covered, including priorities, scheduling, and the like.Much of this book looks at ways to improve performance of concurrent code beyond the simple default strategies. After defining criteria for measuring concurrent code (such as safety and "liveness," a measure of running live threads effectively), the book presents dozens of techniques for letting threads work together safely. For the working Java programmer, coverage of patterns that have been implemented in the downloadable java.concurrency package will be the most immediately useful. (Within this nearly encyclopedic survey, short code snippets are used for every pattern and concept.)Though theoretical at times, this book offers plenty of ideas and sample code to get you started thinking of ways to improve multithreaded code.Impressively comprehensive, Concurrent Programming in Java offers a veritable bible of techniques for doing two things at once with threads in Java. It's a worthwhile guide to the state-of-the-art strategies for improving the performance of your Java threads. --Richard DraganTopics covered: Threads and concurrency in Java, design considerations (safety, liveness, and performance), Before/After Patterns, layering, adapters, immutability and synchronization, deadlock, resource ordering, the Java Memory Model and concurrency, using the java.concurrency package, confinement, refactoring for concurrency, mutexes, read-write locks, recovering from failure, notifications, semaphores, latches, exchanges, transactions, one-way messages, worker threads, polling and event-driven I/O, parallelism techniques (fork/join, computation trees, and barriers), Communicating Sequential Processes (CSP).
Download

Sunday, April 1, 2007

Java For Artists: The Art, Philosophy, And Science Of Object-Oriented Programming


Summary:Java For Artists: The Art, Philosophy, And Science Of Object-Oriented Programming towers head and shoulders above ordinary introductory Java texts in its comprehensive coverage and audacious style. Java For Artists is the only book of its kind that succinctly address the art, philosophy, and science of Java and object-oriented programming. The authors, both certified Java developers, are uniquely qualified to present material other books shy away from or ignore completely. Java For Artists will help you smash through the barriers preventing you form mastering the complexities of object-oriented programming in Java. Start taming complexity now! Read Java For Artists today - energize your programming skills for life!

Features and Benefits* Supercharge your creative energy by recognizing and utilizing the power of the "flow"* Learn a development cycle you can actually use at work* Comprehensive programming project walk-through shows you how to apply the development cycle* Project Approach Strategy helps you maintain programming project momentum* Java Student Survival Guide helps you tackle any project thrown at you* Apply real-world programming techniques to produce professional code* In-depth coverage of arrays eliminates their mystery* Create complex GUIs using Swing components* Learn the secrets of thread programming to create multi-threaded applications* Master the complexities of Java generics and learn how to create generic methods* Discover three object-oriented design principles that will greatly improve your software architectures* Learn how to design with inheritance and composition to create flexible and reliable software* Create well-behaved Java objects that can be used predictably and reliably in Java applications* Master the use of the singleton, factory, model-view-controller, and command software design patterns* Reinforce your learning with the help of chapter learning objectives, skill-building exercizes, suggested projects, and self-test questions* Packed with 134 tables, 477 figures, and 410 code examples containing over 7500 lines of code* All code examples were compiled, executed, and tested before being used in the book to ensure quality* And much, much, more...!

No comments: