Refactoring des applications Java J2EE
β Scribed by Jean-Philippe Retaille, Olivier Salvatori, Thierry Templier, Michel Hue
- Year
- 2005
- Tongue
- French
- Leaves
- 396
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography
Developing complex software requires more than just churning out lines of code. As a software architect or developer involved in an industrial project, you must understand and be able to leverage critical software sub-disciplines such as architecture, analysis and design techniques, development proc
Includes bibliographical references and index
This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li
This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li