๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Java 2 Network Protocols Black Book

โœ Scribed by Al Williams


Publisher
Paraglyph Press
Year
2001
Tongue
English
Leaves
592
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Subjects


Internet. ; Computer network protocols. ; Java (Computer program language)


๐Ÿ“œ SIMILAR VOLUMES


Java 2 Core Language Little Black Book
โœ Alain Trottier ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Paraglyph Press ๐ŸŒ English

The Java 2 Core Language Little Black Book is a compact, detailed reference for intermediate to experienced programmers and managers who are ready to learn how to build Java programs. The book features a logical, sequential approach with concise overviews and step-by-step, ready-to-use solutions cre

Network Programming in Java: Internet pr
โœ Mouhli Alan. ๐Ÿ“‚ Library ๐ŸŒ English

Amazon Digital Services LLC, 2016. โ€” 23 p. โ€” ASIN: B01DY9BNOA<div class="bb-sep"></div>The sockets are used to communicate between two hosts called client / server with an IP address and a port I call taking; these sockets will handle incoming and outgoing flows to ensure communication between the t

Network Programming in Java: Internet pr
โœ Mouhli Alan. ๐Ÿ“‚ Library ๐ŸŒ English

Amazon Digital Services LLC, 2016. โ€” 19 p. โ€” ASIN: B01DY9BNOA<div class="bb-sep"></div>The sockets are used to communicate between two hosts called client / server with an IP address and a port I call taking; these sockets will handle incoming and outgoing flows to ensure communication between the t

Java 2 network security
โœ Marco Pistoia; International Business Machines Corporation.; et al ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐Ÿ› IBM Corp ๐ŸŒ English
Java 2 Network Security
โœ Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐Ÿ› Charles River Media ๐ŸŒ English

Java is fashionable, but is it reliable? Java is entertaining, but is it secure? Java is useful, but is it safe?The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book differen