Book Details:
Pages: | 384 |
Published: | Mar 05 2003 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | CHM |
Book size: | 2.55 MB |
Book Description:
Although Java is incredibly popular, the standard edition of Java is way too big and bulky to build applications for wireless devices such as PDAs and phones. Thus, Sun has released Java 2 Platform, Micro Edition (J2ME). J2ME has the potential to be as revolutionary in the wireless space as Java has been in the server space. Wireless Java: Developing with J2ME, Second Edition is updated to include coverage of the next version of programs for mobile Java devices. MIDP 2.0 contains many exciting new features, such as sound HTTPS support, lots of user interface API enhancements, a Game API, and much more. Also, author Jonathan Knudsen makes clear what material is new, so readers can still use the book for MIDP 1.0/CLDC 1.0.
Developing with Java 2, Micro Edition
The first book that uses the current version of J2ME to give real code for real applications, including extensive coverage of the new and exciting concept of MIDIlets. Jonathan Knudsen is one of the leading authors in the Java space. Softcover....
Sams Teach Yourself in 21 Days
Sams Teach Yourself Wireless Java with J2ME in 21 Days begins by establishing the basic parameters of J2ME development and its uses in building wireless applications. The tutorial chapters introduce both text and graphical application development for typical wireless devices. Finally, the book presents the major types of applications that the wireless developer will build-information management, communications, games, etc. The book also introduces the basic concepts of networking wireless devices through Java....
Wireless Security Secrets & Solutions
Secure Your Wireless Networks the Hacking Exposed WayDefend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.Understand the concepts behind RF electronics, Wi-Fi/802.11, and...
2007 - 2021 © eBooks-IT.org