Part I: Creating Enterprise Applications Chapter 1: Introducing Java Platform, Enterprise Edition Chapter 2: Using Web Containers Chapter 3: Writing Your First Servlet Chapter 4: Using JSPs to Display Content Chapter 5: Maintaining State Using Sessions Chapter 6: Using the Expression Language in JSPs Chapter 7: Using the Java Standard Tag Library Chapter 8: Writing Custom Tag and Function Libra…
Part One. Overview. Chapter 1. Introduction. Chapter 2. Operating-System Structures. Part Two. Process Management. Chapter 3. Processes. Chapter 4. Threads. Chapter 5. CPU Scheduling. Chapter 6. Process Synchronization. Chapter 7. Deadlocks. Part Three. Memory Management. Chapter 8. Main Memory. Chapter 9. Virtual Memory. Part Four. Storage Management. Chapter 10. File-System Interface. Chapte…
null
null
Part I: AN INTRODUCTION TO INQUIRY. 1. Human Inquiry and Science. 2. Paradigms, Theory, and Social Research. 3. The Ethics and Politics of Social Research. Part II: THE STRUCTURING OF INQUIRY: QUANTITATIVE AND QUALITATIVE. 4. Research Design. 5. Conceptualization, Operationalization, and Measurement. 6. Indexes, Scales, and Typologies. 7. The Logic of Sampling. Part III: MODES OF OPERATION: Q…
Anak Judul: best practices for secure java web application development. Terdapat bibliografi dan indeks. CONTENTS: 1. Web Application Security Basics < >What Is Untrusted Data? < >HTTP Security Considerations < >< >HTTPS < >< >HTTP/S GET Request < >< >HTTP/S POST Request < >< >HTTP/S Response < ><&…