John Zukowski’s Definitive Guide to Swing for Java 2


Book Description

All set to become the one-stop resource for serious Java developers, this is the first comprehensive book to be based on released versions of the Java 1.2 Swing Set. While thorough in its treatment of the Swing set, the book avoids covering the minutia that is of no interest to programmers. John Zukowski is one of the best known figures in the Java community, and one of the most popular columnists for JavaWorld Magazine. He provides significant content for JavaSofts own web site and was the principal author of the "official" on-line Swing tutorial.




The Definitive Guide to Java Swing


Book Description

Fully updated for the Java 2 Platform, Standard Edition version 5.0, the third edition of this praised book is a one-stop resource for serious Java developers. This book shows you the parts of Java Swing API that you will use daily to create graphical user interfaces (GUI). You will also learn about the Model-View-Controller architecture that lies behind all Swing components, and about customizing components for specific environments. Author John Zukowski also provides custom editors and renderers for use with tables, trees, and list components. You'll encounter an overview of Swing architecture, and learn about core Swing components, toggelable components, event handling with the Swing Component Set, Swing menus and toolbars, borders, pop-ups, choosers, and more.




Java Programming For Developers: The Definitive Guide to Learn JDBC And Database Applications


Book Description

This step-by-step guide to explore database programming using Java is ideal for people with little or no programming experience. The goal of this concise book is not just to teach you Java, but to help you think like a programmer. Each brief chapter covers the material for one week of a college course to help you practice what you've learned. As you would expect, this book shows how to build from scratch two different databases: MariaDB and SQLite using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. In the first chapter, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. In the second chapter, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. In the third chapter, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. In the fourth chapter, You create a table with the name of the Account, which has ten columns: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In the fifth chapter, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. In chapter six, you will be shown how to create SQLite database and tables with Java. In chapter seven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. Digital image techniques to extract image features used in this chapted are grascaling, sharpening, invertering, blurring, dilation, erosion, closing, opening, vertical prewitt, horizontal prewitt, Laplacian, horizontal sobel, and vertical sobel. For readers, you can develop it to store other advanced image features based on descriptors such as SIFT and others for developing descriptor based matching. In chapter eight, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo. In chapter nine, you will be taught to create Java GUI to view, edit, insert, and delete Feature_Extraction table data. This table has eight columns: feature_id (primary key), suspect_id (foreign key), feature1, feature2, feature3, feature4, feature5, and feature6. All six fields (except keys) will have a BLOB data type, so that the image of the feature will be directly saved into this table. In chapter ten, you will add two tables: Police_Station and Investigator. These two tables will later be joined to Suspect table through another table, File_Case, which will be built in the seventh chapter. The Police_Station has six columns: police_station_id (primary key), location, city, province, telephone, and photo. The Investigator has eight columns: investigator_id (primary key), investigator_name, rank, birth_date, gender, address, telephone, and photo. Here, you will design a Java GUI to display, edit, fill, and delete data in both tables. In chapter eleven, you will add two tables: Victim and Case_File. The File_Case table will connect four other tables: Suspect, Police_Station, Investigator and Victim. The Victim table has nine columns: victim_id (primary key), victim_name, crime_type, birth_date, crime_date, gender, address, telephone, and photo. The Case_File has seven columns: case_file_id (primary key), suspect_id (foreign key), police_station_id (foreign key), investigator_id (foreign key), victim_id (foreign key), status, and description. Here, you will also design a Java GUI to display, edit, fill, and delete data in both tables. Finally, this book is hopefully useful and can improve database programming skills for every Java/MariaDB/SQLite pogrammer.




Java Collections


Book Description

The Collections Framework is supplied with all versions of the Java 2 platform and provides programmers with incredibly efficient ways to manipulate data. However, given the large number of methods and classes in this library, using them correctly is hardly a cakewalk. Well-known columnist and bestselling author John Zukowski gives the Java professional exactly what he or she needs to know about this vital library in order to maximize productivity. This practical book contains comprehensive coverage of the important Collections Framework from the working programmer's point of view, while staying away from academic abstractions. Java Collections leads you through the standard Java support for maintaining abstract groups of data, from the historical collection classes available since the inception of Java time, through the Collections Framework introduced with the Java 2 platform, and on to third-party alternative libraries for times when the standard support isn't enough. If you're working with data in Java programs, you need to understand the Collections Framework. Let Zukowski's Java Collections be your guide! Table of Contents Java Collections Framework: An Overview Arrays The Vector and Stack Classes The Enumeration Interface The Dictionary, Hashtable, and Properties Classes The BitSet Class Collections Introduction Sets Lists Maps Sorting Special Collections Support Array Algorithm Support Custom Implementations Compatibility Issues Advanced Usages JGL Libraries util.concurrent Colt




Web Information Systems Engineering – WISE 2016


Book Description

This two volume set LNCS 10041 and LNCS 10042 constitutes the proceedings of the 17th International Conference on Web Information Systems Engineering, WISE 2016, held in Shanghai, China, in November 2016. The 39 full papers and 31 short papers presented in these proceedings were carefully reviewed and selected from 233 submissions. The papers cover a wide range of topics such as Social Network Data Analysis; Recommender Systems; Topic Modeling; Data Diversity; Data Similarity; Context-Aware Recommendation; Prediction; Big Data Processing; Cloud Computing; Event Detection; Data Mining; Sentiment Analysis; Ranking in Social Networks; Microblog Data Analysis; Query Processing; Spatial and Temporal Data; Graph Theory; Non-Traditional Environments; and Special Session on Data Quality and Trust in Big Data.




Complexity in Information Systems Development


Book Description

This volume is a collection of papers on emerging concepts, approaches and ideas in information systems research. It examines theoretical and methodological issues related to both information systems development in general and the complexity of information systems as socio-technical systems. The book draws on invited papers selected from the proceedings of the 25th International Conference on Information Systems Development (ISD) held in Katowice, Poland, August 24 - 26, 2016. The invited conference papers were revised and expanded and present research that is focused on context, creativity, and cognition in information systems development. These issues are significant as they provide the basis for organizations to identify new markets, support innovative technology deployment, and enable mobile applications to detect, sense, interpret, and respond to the environment.




Human-Centered and Error-Resilient Systems Development


Book Description

This book constitutes the refereed proceedings of the IFIP WG 13.2/13.5 Joint Working Conferences: 6th International Conference on Human-Centered Software Engineering, HCSE 2016, and 8th International Conference on Human Error, Safety, and System Development, HESSD 2016, held in Stockholm, Sweden, in August 2016. The 11 full papers and 14 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.




Mastering Java 2, J2SE 1.4


Book Description

The 1.4 version of Java 2 Standard Edition provides many new programming capabilities while making plenty of old tasks easier. But without reliable guidance, you'll find it hard to take advantage of even a fraction of what the new SDK has to offer. Filled with detailed coverage of the new technology, step-by-step instruction, and tips from an acclaimed Java consultant and author, Mastering Java 2, J2SE 1.4 is the resource you'll want to keep within easy reach. Coverage Includes: * Understanding the Java programming language * Building forms with the Swing component set * Creating superior graphics with the Java 2D API * Supporting advanced data structures with the Collections API * Improving the speed of your Java applications * Taking advantage of Swing's support of drag and drop * Understanding OOP concepts, including UML * Working with Java's new assertion capabilities * Using Java's new I/O capabilities: nonblocking read and write operations, application preferences, and logging * Solving tough printing challenges * Working with installation options, including Java Plug-in and Java Web Start * Working with multiple threads and timer tasks




Definitive Guide to Swing for Java 2


Book Description

This guide provides developers with more tips, techniques and detailed coverage of issues related to Java programming using the Swing Component Set. It makes client-side programming in Java a real possibility by offering new information for the recent release of Java SDK version 1.3 and techniques for JTable, JList components, RepaintManager, Updating UIManager Property List, and much more.




A Comprehensive Guide to Java GUI Programming with SQLite


Book Description

The lessons in this book are a highly organized and well-indexed set of tutorials meant for students and programmers. Netbeans, a specific IDE (Integrated Development Environment) is used to create GUI (Graphical User Interface applications).The finished product is the reward, but the readers are fully engaged and enriched by the process. This kind of learning is often the focus of training. In this book, you will learn how to build from scratch a SQLite database management system using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. Gradually and step by step, you will be taught how to use SQLite in Java. In chapter one, you will learn: How to create SQLite database and six tables In chapter two, you will study: Creating the initial three table projects in the school database: Teacher table, TClass table, and Subject table; Creating database configuration files; Creating a Java GUI for viewing and navigating the contents of each table; Creating a Java GUI for inserting and editing tables; and Creating a Java GUI to join and query the three tables. In chapter three, you will learn: Creating the main form to connect all forms; Creating a project will add three more tables to the school database: the Student table, the Parent table, and Tuition table; Creating a Java GUI to view and navigate the contents of each table; Creating a Java GUI for editing, inserting, and deleting records in each table; Creating a Java GUI to join and query the three tables and all six tables. In chapter four, you will study how to query the six tables. In chapter five, you will create Bank database and its four tables. In chapter six, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. In chapter seven, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. In chapter eight, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. In chapter nine, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. In chapter ten, you will create Crime database and its six tables. In chapter eleven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. In chapter twelve, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo. In chapter thirteen, you will be taught to create Java GUI to view, edit, insert, and delete Feature_Extraction table data. This table has eight columns: feature_id (primary key), suspect_id (foreign key), feature1, feature2, feature3, feature4, feature5, and feature6. All six fields (except keys) will have a BLOB data type, so that the image of the feature will be directly saved into this table. In chapter fourteen, you will add two tables: Police_Station and Investigator. These two tables will later be joined to Suspect table through another table, File_Case, which will be built in the seventh chapter. The Police_Station has six columns: police_station_id (primary key), location, city, province, telephone, and photo. The Investigator has eight columns: investigator_id (primary key), investigator_name, rank, birth_date, gender, address, telephone, and photo. Here, you will design a Java GUI to display, edit, fill, and delete data in both tables. In chapter fifteen, you will add two tables: Victim and File_Case. The File_Case table will connect four other tables: Suspect, Police_Station, Investigator and Victim. The Victim table has nine columns: victim_id (primary key), victim_name, crime_type, birth_date, crime_date, gender, address, telephone, and photo. The File_Case has seven columns: file_case_id (primary key), suspect_id (foreign key), police_station_id (foreign key), investigator_id (foreign key), victim_id (foreign key), status, and description. Here, you will also design a Java GUI to display, edit, fill, and delete data in both tables.