Professional Java Native Interfaces takes a solutions-based approach in showing how SWT/JFace works, discussing each common component, providing useful, practical ideas, tips and techniques to make the Java developers' work easier. The author provides relevant and timely examples, both stand-alone applications and smaller code snippets that readers can incorporate into their own code.
To provide a truly real-world quality, the author builds an email/ftp client sample application to show readers how to combine everything into a presentable Java native UI application.
Professional Java Native Interfaces takes a solutions-based approach in showing how SWT/JFace works, discussing each common component, providing usefu...
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be...
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing crea...
The Extreme Programming (XP) methodology enables you to build and test enterprise systems quickly without sacrificing quality. In the last few years, open source developers have created or significantly improved a host of Java XP tools, from XDoclet, Maven, AntHill, and Eclipse to Ant, JUnit, and Cactus. This practical, code-intensive guide shows you how to put these tools to work -- and capitalize on the benefits of Extreme Programming.
Using an example pet store application, our expert Java developers demonstrate how to harness the latest...
What is this book about?
The Extreme Programming (XP) methodology enables you to build and test enterprise systems quickly without sac...
Beginning PHP5 is a complete tutorial in PHP5's language features and functionality, beginning with the basics and building up to the design and construction of complex data-driven Web sites. Fully functioning applications are developed through the course of the book. Other features of the book include installation guide and troubleshooting tips, introduction to relational databases, practical working examples and applications, and a detailed language reference.
Here are the new topics in this edition:
OOP
PEAR
...
What is this book about?
Beginning PHP5 is a complete tutorial in PHP5's language features and functionality, beginning with the basi...
Taking readers through the basics of the language, right up to some more advanced topics, this book is a practical, hands-on resource and aims to keep the reader involved at all times
Focuses on the SQL standard and is loaded with detailed examples and code; each chapter includes practice exercises that readers can challenge themselves with before looking at the sample solutions in the appendix
Paul Wilton is a successful Wrox -Beginning- book author and is an ideal author to write for those who want a firm grasp of standard SQL before learning the details specific...
Taking readers through the basics of the language, right up to some more advanced topics, this book is a practical, hands-on resource and aim...
Unlike high-level languages such as Java and C++, assembly language is much closer to the machine code that actually runs computers; it's used to create programs or modules that are very fast and efficient, as well as in hacking exploits and reverse engineering
Covering assembly language in the Pentium microprocessor environment, this code-intensive guide shows programmers how to create stand-alone assembly language programs as well as how to incorporate assembly language libraries or routines into existing high-level applications
Demonstrates how to manipulate...
Unlike high-level languages such as Java and C++, assembly language is much closer to the machine code that actually runs computers; it's use...
Covering all aspects of the Unix operating system and assuming no prior knowledge of Unix, this book begins with the fundamentals and works from the ground up to some of the more advanced programming techniques
The authors provide a wealth of real-world experience with the Unix operating system, delivering actual examples while showing some of the common misconceptions and errors that new users make
Special emphasis is placed on the Apple Mac OS X environment as well as Linux, Solaris, and migrating from Windows to Unix
A unique conversion section of the...
Covering all aspects of the Unix operating system and assuming no prior knowledge of Unix, this book begins with the fundamentals and works f...
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples....
Beginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that...
Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
The companion Web site includes author-created...
Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products