Friday, January 25, 2008
More Java Pitfalls: 50 New Time-Saving Solutions and Workarounds by Michael C. Daconta
http://rapidshare.de/files/37080274/MCDaconta.rar%3Cbr%20/%3E.html
http://depositfiles.com/files/320805
Java Regular Expressions: Taming the java.util.regex Engine
http://rapidshare.com/files/24619150/jrex.rar
Pass: www.AvaxHome.ru
Secrets Series Of Java By Elliotte Rusty Harold
http://depositfiles.com/files/318468
http://rapidshare.de/files/36929993/Java_Secrets.rar
Pro Java ME MMAPI By Vikram Goyal
http://rapidshare.com/files/1365312/VGoyal.rar
http://depositfiles.com/files/347904
http://mihd.net/7umjzi
Enterprise Java Security: Building Secure J2EE Applications
http://rapidshare.com/files/10917327/Enterprise_Java_Security_Building_Secure_J2EE_Applications.rar
http://depositfiles.com/files/512644
Quick Time for Java: A Developer's Notebook by Chris Adamson
http://rapidshare.com/files/12990960/Oreilly.QuickTime.for.Java.A.Developers.Notebook.Jan.2005.ISBN0596008228.chm
http://depositfiles.com/files/552366
Marco Pistoia, et al, «Enterprise Java Security: Building Secure and Robust J2EE Applications»
“
\"For a long time, there has been a need for a J2EE(TM) security book. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of the J2EE platform and e-business.\"-From the Foreword by Steven A. Mills, Senior Vice President and Group Executive, Software Group, IBM CorporationEnterprise Java(TM) Security: Building Secure J2EE(TM) Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java(TM) 2 Platform, Enterprise Edition (J2EE), and Java(TM) 2 Platform, Standard Edition (J2SE(TM)), security architectures and offers practical solutions and usage patterns to address the challenges of Java security.To aid developers who need to build secure J2EE applications, Enterprise Java(TM) Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP(TM)), and Enterprise JavaBeans(TM) (EJB(TM))—technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security.Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology.The relationship between Java and cryptographic technologies is covered in great detail, including:- Java Cryptography Architecture (JCA) - Java Cryptography Extension (JCE) - Public-Key Cryptography Standards (PKCS) - Secure/Multipurpose Internet Mail Extensions (S/MIME) - Java Secure Socket Extension (JSSE)
http://rapidshare.de/files/18345208/MPistoia.rar.html
Beginning POJOs: Lightweight Java Web Development Using Plain Old Java Objects in Spring, Hibernate, and Tapestry by Brian Sam
http://rapidshare.de/files/37067045/BSamBodden.rar.html
http://depositfiles.com/files/320542
http://mihd.net/7.1001/Apress.Beginning.POJOs.From.Novice.to.Professional.Mar.html
Tricks of the Java Programming Gurus
http://www.icefile.info/index.php?page=main&id=127bf1333&name=1575211025.rar
http://rapidshare.com/files/66003970/1575211025.rar
Sun.Microsystems.Fundamentals.of.the.Java.Program
http://rapidshare.com/files/54460132/smfotjpl.r00
http://rapidshare.com/files/54489409/smfotjpl.r01
http://rapidshare.com/files/54583229/smfotjpl.r02
http://rapidshare.com/files/54583231/smfotjpl.r03
http://rapidshare.com/files/54633172/smfotjpl.r04
http://rapidshare.com/files/54795936/smfotjpl.r05
http://rapidshare.com/files/54906509/smfotjpl.r06
http://rapidshare.com/files/54736120/smfotjpl.r07
http://rapidshare.com/files/54758947/smfotjpl.rar
http://rapidshare.com/files/54583357/smfotjpl.sfv
Sun Microsystems Java Programming Language WJB 275A
http://www.filefactory.com/file/199cf3/
http://www.filefactory.com/file/e52c79/
http://www.filefactory.com/file/e908b1/
http://rapidshare.com/files/48813649/Sun.Microsystems.Java.Programming.Language.WJB.275A.part1.rar
http://rapidshare.com/files/48813624/Sun.Microsystems.Java.Programming.Language.WJB.275A.part2.rar
http://rapidshare.com/files/48811448/Sun.Microsystems.Java.Programming.L
Carl Albing, Michael Schwarz, «Java Application Development on Linux»
“
Determined to spare other developers hours of trial and error, the authorsAlbing and Schwarz demonstrate the platform, tools, and application development by constructing a real-world, database-driven budget application. After a simple command-line application introduces basic tools, this program leads readers through business logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use the JBoss Application Server and Enterprise JavaBeans (EJB). The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described.Readers learn how to: Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in LinuxThe authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described.
http://www.phptr.com/content/images/013143697X/downloads/013143697X_book.pdf
http://rapidshare.de/files/20249172/CAlbing.rar.html
Java Development on PDAs
http://ebook.icefile.org/index.php?page=main&id=c4d19657&name=0201719541.rar
http://rapidshare.com/files/16860803/0201719541.rar
http://depositfiles.com/files/629447
Java Development on PDAs
http://ebook.icefile.org/index.php?page=main&id=c4d19657&name=0201719541.rar
http://rapidshare.com/files/16860803/0201719541.rar
http://depositfiles.com/files/629447
Java Database Programming with JDBC
http://depositfiles.com/files/720219
http://ed.icefile.org/index.php?page=main&id=c7ebd446&name=Java
http://rapidshare.com/files/22376899/Java_Database_Programming_with_J
Concurrent and Real-Time Programming in Java
http://ebook.icefile.org/index.php?page=main&id=1c11c922&name=047084437X.rar
http://rapidshare.com/files/15314201/047084437X.rar
http://depositfiles.com/files/FRHTNR
http://www.filefactory.com/TGUYT
Java & XML
http://depositfiles.com/files/520535
http://rapidshare.com/files/11359458/Java_and_XML_059610149X.rar
http://ebook.icefile.org/index.php?page=main&id=8d316920&name=059610
The Java Web Services Tutorial by Eric Armstrong
http://rapidshare.com/files/2692230/addison-wesley_20-_20the_20java_20web_20services_20tutorial.chm
http://depositfiles.com/files/364874
http://www.ebooksclub.org/?link=qt3wZE
Java Precisely by Peter Sestoft
http://rapidshare.com/files/512631/_5BMIT_20Press_5D_20Java_20Precisely.pdf.html
http://depositfiles.com/files/335900
More Java Pitfalls
http://rapidshare.de/files/37080274/MCDaconta.rar%3Cbr%20/%3E.html
http://depositfiles.com/files/320805
Java Swing, Second Edition
http://ebook.icefile.com/index.php?page=main&id=f4c841918&name=059600
XML, XSLT, Java, and JSP: A Case Study in Developing a Web Application
http://w13.easy-share.com/1240477.html
http://depositfiles.com/files/1078113
Java Regular Expressions
http://rapidshare.com/files/24619150/jrex.rar
Pass: www.AvaxHome.ru
Elliotte Rusty Harold, «Java Secrets» (Secrets Series)
http://depositfiles.com/files/318468
http://rapidshare.de/files/36929993/Java_Secrets.rar
Ebook Pro Java ME MMAPI
http://rapidshare.com/files/1365312/VGoyal.rar
http://depositfiles.com/files/347904
http://mihd.net/7umjzi
Enterprise Java Security
http://rapidshare.com/files/10917327/Enterprise_Java_Security_Building_Secure_J2EE_Applications.rar
http://depositfiles.com/files/512644
Download Rapidshare Ebook Java & XML
http://depositfiles.com/files/520535
http://rapidshare.com/files/11359458/Java_and_XML_059610149X.rar
http://ebook.icefile.org/index.php?page=main&id=8d316920&name=059610149X
Contemporary Qualitative Research
Contemporary Qualitative Research: Exemplars for Science and Mathematics Educators
Pages: 248
This volume offers a unique set of research exemplars for science, mathematics and technology educators. The volume explores the important challenge of how to translate leading-edge methodologies into practical research strategies and techniques. The book is divided into three major sections, The Golden Age of Research, Meeting the Research Crises and A New Era of Research, with chapters exploring a variety of methodologies and representational forms and texts. These include historical, narrative, literary, phenomenological, autobiographical, virtual and performance texts, among others.
Qualitative Research in Postmodern Times is an exciting and accessible book that will be essential reading for science, mathematics and technology educators interested in new forms of educational research. Beginning researchers will find it practically helpful in planning and conducting their research studies, while experienced researchers will welcome new theoretical insights into postmodern methodologies.
http://mihd.net/blpsvf
http://rapidshare.com/files/73109642/contemporary_qualitative
Controlled Simple Homotopy Theory and Applications
Controlled Simple Homotopy Theory and Applications
Pages: 94
http://mihd.net/pfedyw
http://rapidshare.com/files/76546259/ebc_pipahnuu.rar
password: twilightzone
Controlling Strategy
Controlling Strategy: Management, Accounting, and Performance Measurement
Pages: 200
Ideas about the role of management accounting systems in a firm's strategy have changed in recent years, and this book explores the ways in which this has happened. Management control systems have frequently been seen as irrelevant to strategy, or even damaging. Controlling Strategy draws out the various ways in which management control systems can build and sustain valuable strategic roles. The book explores topics such as: *Strategic measurement; *Strategic data analysis; *The Balanced Scorecard; *Capital budgeting; *Strategy coordination; Written as an introduction to the strategic role of management control systems Controlling Strategy provides a synthesis of important work in the fields of strategy and management accounting. Academics and Advanced Students of Accounting, Strategy, or Management Studies will find the book an indispensable guide to this area.
http://www.4shared.com/file/17125789/6affe8bb/Controlling_Strategy.html
Convex Analysis in General Vector Spaces
Convex Analysis in General Vector Spaces
Pages: 367
The book consists of not optimization and algorithm, but convex analysis and theory.
http://www.mediafire.com/?9tdydxewzdz
http://mihd.net/qgotm9
http://rapidshare.com/files/74682836/Zali9812380671.rar
http://mihd.net/rbuphv
Body Language at the workplace
by : PENGUIN BOOKS
Julius Fast..
Julius Fast lives in New York City. In addition to his expertise
as a writer and researcher, he has spent many years in
the business world, having held positions at Smith, Kline &
French, Perdue Fredericks, and the publications Science
and Medicine and Medical News. He has also given
numerous seminars to businesspeople and lawyers. Among
his books are Body Language, The Body Language of Sex,
Power, and Aggression, Talking Between the Lines, and
Sexual Chemistry.
be your own career consultant
how to unlock your career potential and help yourself to your future.
Gary Pyke
Staurt Neath
First, a little background. In 1997 the authors were brought together
as part of a small team to help deliver a course aimed at teaching
people how to take ownership and responsibility for their own
careers within a given organization. Happy and excited to do so, we
joined in, got briefed and were asked to go away and run two
courses back-to-back. By the end of the second course we knew that
we had a major job on our hands.
The course did not hang together and had little or no common
thread. There was some unfortunate use of negative terminology and
words, and some of the tools and techniques needed upgrading,
throwing away or rewriting. We then set about rewriting and
redesigning large sections of the course, including the basic premise
on which it was based. Once done, the course has continued to run
until the present day, with the feedback from delegates being almost
unanimously excellent.
This book is a reflection of that course and contains much of what we
have incorporated into it. Our experience over the last five years is
that it works. We hope that it will work for you. .....
Click here to download the book.
1,001 Ways to Get Promoted
by David E. Rye
Career Press
ISBN: 1564144305 Pub
Date: 01/01/00
Introduction
The Challenge of Promoting Yourself
What does it mean to promote yourself? Is the promotion game worth spending your energy on?
Employees often get locked into playing the corporate game where someone else sets the speed of the
treadmill and dictates how fast to run. Conversely, playing the promotional game can be a lot of fun
because you control the speed of the treadmill and determine what promotional plays to use to move
yourself up the corporate ladder. If you play the game right, you’ll come out a winner and get promoted
along the way.
Let’s face it, business is a game where power and influence are required to get ahead. The object of the
game is simple enough: Determine where you want to be on the corporate ladder, and then try to get
there! Some people play the game for money, some for job security, others for recognition or personal
objectives. When you play the promotion game, you will need to make rapid, complex moves if you
want to win.
To successfully play the promotion game, you must first learn how the game is played and what
techniques or strategies it takes to win. Your challenge along the way will be to refine your moves to a
fine, cutting edge. Here’s how the game is played: There are seven essential promotional tenets that you
must learn to master in order to win. Like rungs in the ladder, once you have mastered one, you move up
the ladder to the next rung. Although each tenet is autonomous and distinct from the others, they all
interact to form a cohesive, interactive strategy that, if properly employed, will catapult you up to the top
of the ladder, where you will meet or exceed your most ambitious promotional dream.
.. click the link below for download.