Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Microelectronic circuits: theory and applications
Bookmark Share

Text

Microelectronic circuits: theory and applications

James D. Lester James D Lester Jr - Personal Name; Ron Person - Personal Name; Jane Kouns Daniel Minoli - Personal Name; Williams, Nicholas S. - Personal Name;

Part I: Creating Enterprise Applications
Chapter 1: Introducing Java Platform, Enterprise Edition
Chapter 2: Using Web Containers
Chapter 3: Writing Your First Servlet
Chapter 4: Using JSPs to Display Content
Chapter 5: Maintaining State Using Sessions
Chapter 6: Using the Expression Language in JSPs
Chapter 7: Using the Java Standard Tag Library
Chapter 8: Writing Custom Tag and Function Libraries
Chapter 9: Improving Your Application Using Filters
Chapter 10: Making Your Application Interactive wi th WebSockets
Chapter 11: Using Logging to Monitor Your Application
Part II: Adding Spring Framework Into the Mix
Chapter 12: Introducing Spring Framework
Chapter 13: Replacing Your Servlets with Controllers
Chapter 14: Using Services and Repositories to Support Your Controllers
Chapter 15: Internationalizing Your Application with Spring Framework i18n
Chapter 16: Using JSR 349, Spring Framework, and Hibernate Validator for Bean Validation
Chapter 17: Creating RESTful and SOA P Web Services
Chapter 18: Using Messaging and Clustering for Flexibility and Reliability
Part III: Persisting Data with JPA and Hibernate ORM
Chapter 19: Introducing Java Persistence API and Hibernate ORM
Chapter 20: Mapping Entities to Tables with JPA Annotations
Chapter 21: Using JPA in Spring Framework Repositories
Chapter 22: Eliminating Boilerplate Repositories with Spring Data JPA
Chapter 23: Searching for Data with JPA and Hibernate Search
Chapter 24: Creating Advanced Mappi ngs and Custom Data Types
Part IV: Securing Your Application wi th Spring Security
Chapter 25: Introducing Spring Security
Chapter 26: Authenticating Users with Spring Security
Chapter 27: Using Authorization Tags and Annotations
Chapter 28: Securing RESTful Web Services with OAuth


Availability

No copy data

Detail Information
Series Title
--
Call Number
005.262 WIL p
Publisher
Indianapolis : John Wiley & Sons., 2014
Collation
xxxiii, 900 hlm.: ilus.; 23 cm
Language
English
ISBN/ISSN
9781118656464
Classification
005.262
Content Type
-
Media Type
-
Carrier Type
-
Edition
null
Subject(s)
Web Application
Java (Bahasa Pemrograman)
Hak Kekayaan Intelektual

Specific Detail Info
-
Statement of Responsibility
Nicholas S. Williams
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?