A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and architects are shown the Jess rule programming language in an accessible, tutorial style. Demonstrated is how to quickly progress from building freestanding interactive applications to rule-based Web and Enterprise software. Specific issues covered in this process include designing the application, embedding Jess in Java applications, and using a rule engine in the J2EE environment.
Sunday, June 8, 2008
Jess In Action: Java Rule-based System
WordPress Theme Design
This book walks through clear, step-by-step instructions to build a custom theme for the WordPress open-source blog engine. The author provides design tips and suggestions and covers setting up your WordPress sandbox, and reviews the best practices from setting up your theme's template structure, through coding markup, testing, and debugging, to taking it live. The last three chapters cover additional tips, tricks, and various cookbook recipes for adding popular site enhancements to your WordPress theme designs using 3rd-party plugins as well as creating API hooks to add your own custom plugins. Whether you're working with a pre-existing theme or creating a new one from the ground up, WordPress Theme Design will give you the know-how to effectively understand how themes work within the WordPress blog system enabling you to have full control over your site's design and branding.
Download Here
Wednesday, May 28, 2008
J2ME in a Nutshell
J2ME in a Nutshell provides a solid, no-nonsense reference to the "alphabet soup" of micro edition programming, covering the CLDC, CDC, KVM and MIDP APIs. The book also includes tutorials for the CLDC, KVM, MIDP and MIDlets, MIDlet user interfaces, networking and storage, and advice on programming small handhelds. Combined with O'Reilly's classic quick reference to all the core micro-edition APIs, this is the one book that will take you from curiosity to code with no frustrating frills in between.
Programming Wireless Devices with Java2 Platform
This book presents the JavaaA A 2 Platform, Micro Edition (J2MEaA A ) standards that support the development of applications for consumer devices such as mobile phones, two-way pagers, and wireless personal organizers. To create these standards, Sun collaborated with such consumer device companies as Motorola, Nokia, NTT DoCoMo, Research In Motion, Samsung, Siemens, Sony Ericsson, and many others. The result is a highly portable, small-footprint application development environment that brings the unique capabilities of Java technology, including platform independence and enhanced security, to the rapidly growing wireless market. This definitive JavaaA A Series guide provides a programmer's introduction to the Java 2 Platform, Micro Edition. It presents a general description of wireless technology and an overview of the J2ME platform. In addition, the book details the Connected Limited Device Configuration (CLDC) version 1.1 and the Mobile Information Device Profile (MIDP) version 2.0, the standards that define the Java platform features and libraries for wireless, resource-constrained devices.Written by a team of authors that includes the original J2ME technology experts from Sun.
J2ME Game Programming
Have you ever seen players' eyes light up as they explore the worlds that you've created in your games? If you have, then game development probably has you hooked firmly in its grasp! If you’ve never taken your games beyond the PC, now's the time! "J2ME Game Programming" is a hands-on guide that teaches you how to create games for micro-devices. You'll be amazed at just how cool the games you create can look and play. Focusing primarily on mobile phone game creation, you'll jump right in and create your own games as you work your way through the book. The thought has surely crossed your mind that it would be nice to make some money off of this cool hobby of yours. J2ME offers real opportunity to profit from your games. Learn how you can earn revenue from your games by taking them to market. If you have a basic understanding of Java, then you're ready to explore all that "J2ME Game Programming" has to offer!
Java Cryptography Extensions
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. –Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist.
One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and server-side programming. Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources
Friday, May 9, 2008
Programming Video Games for the Evil Genius
Always wanted to be a genius game creator? This Evil Genius guide goes far beyond a typical programming class or text to reveal insider tips for breaking the rules and constructing wickedly fun games that you can tweak and customize to suit your needs!
In Programming Video Games for the Evil Genius, programming wunderkind Ian Cinnamon gives you everything you need to create and control 57 gaming projects. You'll find easy-to-follow plans featuring Java, the most universal programming language, that run on any PC, Mac, or Linux computer.
Gaming projects that vary in difficulty-starting with simple programs and progressing to sophisticated projects for programmers with advanced skills
An interactive companion website featuring a free Java compiler, where you can share your projects with Evil Geniuses around the globe
Removes the frustration-factor-all the parts you need are listed, along with sources
Regardless of your skill level, Programming Video Games for the Evil Genius provides you with all the strategies, code, and insider programming advice you need to build and test your games with ease, such as:
Radical Racing
Screen Skier
Whack an Evil Genius
Tic-Tac-Toe Boxing
Snake Pit
Space Destroyers
Bomb Diffuser
Trapper
Oiram
Memory
Ian Says
Password: knowfree.net