๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Developing Enterprise Java Applications with J2EE(TM) and UML

โœ Scribed by Khawar Zaman Ahmed, Cary E. Umrysh


Publisher
Addison-Wesley Professional
Year
2001
Tongue
English
Leaves
349
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association link is, the mentioned chapter is invaluable. I wish the authors expanded more on UML-Java mapping as developer can then relate a diagram to the Java code. I would have given the book 5 star if it had expanded a bit on modelling XML and UML-Java mapping.


๐Ÿ“œ SIMILAR VOLUMES


Developing Enterprise Java Applications
โœ Khawar Zaman Ahmed, Cary E. Umrysh ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li

Developing enterprise Java applications
โœ Khawar Zaman Ahmed, Cary E. Umrysh ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Addison-Wesley ๐ŸŒ English

Developing complex software requires more than just churning out lines of code. As a software architect or developer involved in an industrial project, you must understand and be able to leverage critical software sub-disciplines such as architecture, analysis and design techniques, development proc

Enterprise Java(TM) Security: Building S
โœ Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› addison-wesley ๐ŸŒ English

Enterprise Javaa Security: Building Secure J2EEa Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehe

Enterprise Java (TM) Security: Building
โœ Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

Enterprise Javaa Security: Building Secure J2EEa Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehe

Developing Applications with Java(TM) an
โœ Paul R. Reed ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

Developing Applications with Javaโ„ข and UML focuses on the craft of creating quality Java software. The book introduces the fundamentals of the Unified Modeling Language (UML) and demonstrates how to use this standard object-oriented notation to build more robust Java applications that fulfill user