This course is paced to provide a solid foundation in Java for programmers without syntax experience in a C-based language. Intensive and hands-on, the course emphasizes becoming productive quickly as a Java 5.0 programmer.
Class goals :
Learning the basic structure and syntax of the language, students will also learn object-oriented principles and how they are applied in Java applications. The course then covers several of the provided API packages, such as I/O streams, collections, Swing GUI programming, and accessing a database with JDBC. Appendices on threading and J2EE are also available for further study.
Content of JAVA FUNDAMENTALS FOR NON C PROGRAMMERS
Learning the basic structure and syntax of the language, students will also learn object-oriented principles and how they are applied in Java applications. The course then covers several of the provided API packages, such as I/O streams, collections, Swing GUI programming, and accessing a database with JDBC. Appendices on threading and J2EE are also available for further study.
Training JAVA FUNDAMENTALS FOR NON C PROGRAMMERS
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course is paced to provide a solid foundation in Java for programmers without syntax experience in a C-based language. Intensive and hands-on, the course emphasizes becoming productive quickly as a Java 5.0 programmer.
Java 2: Programming Language introduces the foundations of Java 2 Standard Edition (J2SE) technology. Students will explore concepts and perform hands-on exercises to apply what they learn. Java is the language of choice for the Internet. Java enhances productivity by allowing the inheritance of methods and properties from the well-organized Java Class Library. Students will build Graphical User Interfaces and handle various events. Students will explore multi-threading and how it can improve the performance of applications. Students will also use many methods of the Graphics class to draw shapes.
Class goals :
An Introduction to Java
Datatypes, Variables, and Methods
Object Orientation, Part 1
Construction Time
Object-Orientation, Part 2
Java Language-Statements and Expressions
Branching and Looping
The Java Class Library
Exploring java.lang
Content of JAVA 2 Programming Language
Class objectives help students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:
List the benefits and roles of the Java programming language.
Utilize primitive datatypes, variables, constants, literals, and methods.
Implement classes and properties, and understand abstraction and encapsulation.
Differentiate between an application and an applet, and pass parameters to both.
Use inheritance, interfaces, packages, modifiers, as well as archive files.
Use operators and expressions to perform calculations and typecasting.
Control the flow of programs with branching and looping.
Explore the packages and interfaces in the Java Class Library.
Explore the java.lang package and use methods from the String and Math classes.
Change fonts and colors in the display; use Graphics and Image classes to draw to the display.
Handle key and mouse events.
Explore the applet architecture, detect and process errors, and explore threads.
Explore the AWT package and build a GUI interface.
Training JAVA 2 Programming Language
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Java 2: Programming Language introduces the foundations of Java 2 Standard Edition (J2SE) technology. Students will explore concepts and perform hands-on exercises to apply what they learn. Java is the language of choice for the Internet. Java enhances productivity by allowing the inheritance of methods and properties from the well-organized Java Class Library. Students will build Graphical User Interfaces and handle various events. Students will explore multi-threading and how it can improve the performance of applications. Students will also use many methods of the Graphics class to draw shapes.
This course provides you with the background and skills required to design and develop enterprise applications in Java using J2EE technologies. You will use WebLogic server as the application and web server and will learn about configuring WebLogic, deploying applications, and monitoring applications using WebLogic’s monitoring tools. During the course you will write many components of a sample e-commerce application and deploy the application to WebLogic.
Class goals :
Java 2, Enterprise Edition (J2EE)
Overview of BEA WebLogic
Building, Deploying, and Testing Enterprise Applications
Building a Sample Application
Container-managed Persistence (CMP) Entity Beans
Bean-managed Persistence (BMP) Entity Beans
Stateless Session Beans
Stateful Session Beans
Message-Driven Beans
The View
The Controller
Advanced WebLogic Server Concepts
Content of Java 2 Enterprise Development With BEA WebLogic
Develop with RMI, JNDI, JMS, and JDBC.
Use container-managed and bean-managed transactions.
Write JSPs and servlets.
Write Entity Enterprise JavaBeans (EJBs) using container-managed or bean-managed persistence.
Write Stateless and Stateful Session EJBs.
Write Message-Driven EJBs.
Unit test your J2EE applications.
Build your J2EE applications using Ant.
Implement the Model-View-Controller design pattern.
Use the Value Object design pattern.
Use the DAO design pattern.
Configure and monitor WebLogic 6.1.
Load test EJBs in WebLogic 6.1.
Training Java 2 Enterprise Development With BEA WebLogic
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides you with the background and skills required to design and develop enterprise applications in Java using J2EE technologies. You will use WebLogic server as the application and web server and will learn about configuring WebLogic, deploying applications, and monitoring applications using WebLogic’s monitoring tools. During the course you will write many components of a sample e-commerce application and deploy the application to WebLogic.
Java 2: Using IBM VisualAge to Create Java Applications introduces the major elements of the VisualAge Java programming environment.
Class goals :
Build Your First Applet and Applications Using VisualAge
Using the Basic VisualAge SmartGuides
The VisualAge Environment
The Visual Composition Editor
Creating Connections Between Java Beans
Reusable Form Fragments
Creating “Invisible” Beans from Scratch
Content of J2 Using IBM VisualAge To Create Java Applications
Upon successful completion of this course, students will be able to:
Create applications and applets in VisualAge.
Use many of the VisualAge SmartGuides.
Navigate through the features of the VisualAge environment, and be ableto use the debugger.
Use the Visual Composition Editor to create GUI-rich visual applications.
Use Connections in the Visual Composition Editor to specify eventhandling and property-to-property connections.
Create reusable, “visible” form-fragment beans.
Create new “invisible” beans that have events and properties.
Use advanced Swing techniques in VisualAge, including using TabbedPanes and ScrollPanes, and specifying the data model of various beans,such as JLists.
Understand and modify the code that the VisualAge Visual CompositionEditor generates.
Access databases using the Java JDBC libraries.
Access databases using specialized database beans, such as the Select and DBNavigator beans in the Visual Composition Editor.
Create custom database-aware TableModels beans for use with Swing JTables.
Training J2 Using IBM VisualAge To Create Java Applications
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Java 2: Using IBM VisualAge to Create Java Applications introduces the major elements of the VisualAge Java programming environment.
Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process
Class goals :
Know the Purpose and Parts of the UML
Drive the Development of a System Using Use Cases
Describe How Objects Interact Using a Sequence Diagram
Create Class and Object Diagrams
Interface-based Design
Layer your System into Packages
Model Dynamic Behavior using Collaboration,
Statechart, and Activity Diagrams
Using Component and Deployment Diagrams
Manage and Schedule the Software Development Process
Content of J 2Object Oriented Analysis And Design Using UML
Students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:
Know the purpose and parts of UML.
Drive the development of a system based on Use Cases.
Use the CRC method to identify classes.
Describe how objects interact using a Sequence Diagram.
Create Class and Object Diagrams.
Use Interface-based Design.
Layer your system into packages.
Model Dynamic Behavior using Collaboration,
Statechart, and Activity Diagrams.
Use Component and Deployment Diagrams.
Manage and Schedule the Software Development Process.
Training J 2Object Oriented Analysis And Design Using UML
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process
Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
Class goals :
Java programmers who wish to increase their depth of knowledge in Java programming and explore the uses of the various advanced packages.
Content of ADVANCED JAVA PROGRAMMING
Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
Training ADVANCED JAVA PROGRAMMING
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
Objective-C is the language for developing iPhone and iPad applications. This class teaches the fundamentals of the programming language. It includes an introduction to XCode, the software development tool for Objective-C; c++ underlying concepts; program control flow and functions; object-oriented programming concepts and practice, including object handling within Objective-C; memory management in Objective-C; and an in-depth review of the Foundation classes.
Class goals :
Learn how to use XCode for developing Objective-C programs.
Learn how to manage variables and build your own functions in Objective-C.
Learn the fundamental concepts of object oriented programming, and how to create and use objects in Objective-C.
Understand the memory management model for Objective-C, and options for the developer.
Learn about the Foundation classes for data manipulation, and their use in Objective-C programming.
Content of Introduction To Objective C For IOS Development Iphone Ipad
Upon class completion students will gain a strong foundation and understanding for the Objective C language. Students can then take the next step towards learning XCode which will help in developing Mobile Apps for iPhone.
Training Introduction To Objective C For IOS Development Iphone Ipad
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Objective-C is the language for developing iPhone and iPad applications. This class teaches the fundamentals of the programming language. It includes an introduction to XCode, the software development tool for Objective-C; c++ underlying concepts; program control flow and functions; object-oriented programming concepts and practice, including object handling within Objective-C; memory management in Objective-C; and an in-depth review of the Foundation classes.
This course provides learners with the skills necessary to monitor, maintain, optimize and troubleshoot Citrix XenApp 6.5 environments running on Windows Server 2008 R2 software. Learners are introduced to the tools used to monitor the XenApp farm, record farm activity and generate reports.
Class goals :
On completion of this course, students will have learnt about:
Troubleshooting the XenApp environment
Scaling the XenApp environment
Creating farm redundancy
Maintaining the XenApp environment
Optimizing the XenApp environment
Optimizing printing
Monitoring XenApp with standard utilities
Monitoring XenApp with EdgeSight
Securing XenApp
Content of Citrix XenApp 6.5 Advanced Administration
Module 1: Troubleshooting the XenApp Environment
Troubleshooting Methodology
Logon Issues
User Sessions
Server Resources
Exercise 1-1: Troubleshooting an AppCenter Issue
Exercise 1-2: Troubleshooting Web Interface and XML Issues
Exercise 1-3: Troubleshooting Launching a Hosted Application
This course provides the foundation to manage, configure and monitor advanced features and components of Citrix NetScaler 9.0 Platinum Edition. Interactive discussion and hands-on labs guide learners through advanced administration tasks such as troubleshooting, configuring application security with the Citrix Application Firewall feature, tuning the NetScaler for high traffic, configuring Authentication Authorization and Accounting for system management, and configuring Advanced Policies using service callouts.
Class goals :
Upon successful completion of this course, learners are able to:
Identify common web attacks and vulnerabilities
Write PERL compatible regular expressions
Configure Citrix Application Firewall 9.0 to protect web applications
Troubleshoot Citrix Application Firewall 9.0
Install and configure Citrix EdgeSight for NetScaler to monitor web application performance
Install, configure, and use Citrix Command Center to manage NetScaler devices
Configure and use additional advanced features of NetScaler 9.0 including NetScaler Web Logging, HTTP Callout, and AAA authentication for web applications
Content of Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Application Attacks (Application Attack Description; Goals of Application Attacks; Most Common Types of Web Application Attacks; The Application Firewall Solution; Business Problems)
The Benefits of Application Firewall (Application Layer Protection; Positive Security Model; Negative Security Model; Deep Stream Inspection; Adaptive Learning Engine; Web Application Vulnerabilities; Security Audits and Application Firewalls)
Payment Card Industry Data Security Standard (Importance of PCI; Common Coding Vulnerabilities; PCI-DSS Report; Packet Processing and Inspection; Request Process; Response Process; Deployment Considerations)
Profiles and Policies (Profiles; Policies)
Profiles and Policies
Profiles (Profile Types; Default Profiles; Creating a Profile in the Configuration Utility; Creating a Profile in the Command-Line Interface; Action Settings; Sessionization and Security Checks; Profile Settings; Error Page; HTML Comment Stripping; XML Error Object; Other Profile Settings)
Policies (Policy Creation; Policy Binding; Policy State; Policy Priorities; Creating a Policy in the Configuration Utility; Creating Policies in the Command-Line Interface; Binding and Prioritizing a Policy in the Configuration Utility; Binding Policies in the Command-Line Interface)
Engine Settings
Regular Expressions
Regular Expressions
Forms of Regular Expressions
Using Regular Expressions
Metacharacters and Literal Characters
Metacharacters
Escapes
Quantifiers
Backreferencing
Lookaheads
Regular Expression Scope
Attacks and Protections
Security Checks (Profile Types; Common Security Checks; HTML Security Checks; XML Security Checks; Request-Side and Response-Side Checks)
HTTPS Web Applications
Buffer Overflow Exploits (Goals of a Buffer Overflow Attack; Consequences of a Buffer Overflow Attack)
Buffer Overflow Protection (Default Maximum Values; Modifying Buffer Overflow Settings)
Deny URL Protection (The Deny URL List; Adding a Deny URL in the Command-Line Interface; Deleting a Deny URL in the Command-Line Interface)
SQL Injection (How SQL Injection Works)
HTML SQL Injection Protection (SQL Keywords and Special Characters; Modifying SQL Injection Action Settings; XML SQL Injection Security Check; Cross-Site Scripting; Attacking the Trust Relationship; How Cross-Site Scripting Attacks Work; Results of a Cross-Site Scripting Attack; Preventing Cross-Site Scripting Attacks; HTML Cross-Site Scripting Protection; Cross-Site Scripting Action Settings; Transform Cross-Site Scripts; Check Complete URLs for Cross-Site Scripting; Additional Action Settings; Relaxations; Modifying Cross-Site Scripting Action Settings; Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface; Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface; XML Cross-Site Scripting Security Check)
Command Injection (Command Injection Examples)
Field Format Protection (Field Types and Field Formats; Predefined Field Types; Custom Field Types; Field Format Configuration; Default Field Format; Confidential Fields; Adding a Custom Field Type; Setting a Default Field Type; Modifying Field Format Settings; Adding a Confidential Field; Modifying a Confidential Field)
Cookie Tampering and Poisoning (Types of Cookies; How Cookies Are Added; Web Server Sessions)
Cookie Consistency Protection (Sessionization and Cookies; Relaxations; Adding a Cookie Consistency Relaxation in the Command-Line Interface; Deleting a Cookie Relaxation in the Command-Line Interface)
Form/Hidden Field Manipulation (Example of Hidden Field Manipulation)
Form Field Consistency Protection (Field Consistencies; User Sessions; Adding a Form Field Consistency Relaxation Using the Command-Line Interface; Deleting a Form Field Consistency Relaxation Using the Command-Line Interface)
Forceful Browsing (Forceful Browsing Protection)
Start URLs (The Start URL List; Sessionization and Start URLs; Modify Start URL Check; Adding a Start URL in the Command-Line Interface; Deleting a Start URL in the Command-Line Interface)
Backdoors and Misconfigurations
URL Closure (Enforcing URL Closure in the Configuration Utility; Enforcing URL Closure in the Command-Line Interface)
Identity Theft Attacks (Types of Identity Theft Attacks; Application Firewall Protection Against Identity Theft)
HTTP Connection Management and NetScaler HTTP Behavior (Client Keep-Alive; Connection IP Address Control; Maximum Requests and Maximum Connections; Connection Idle Settings; Trackable Connections)
TCP Buffering (Down-State Flush and Access Down Connection Settings; TCP Optimization; Advertised Window Size; Window Scaling; Selective Acknowledgement)
Surge Queue
Surge Protection (Request and Response Rates; Throttle Rate; Disabling Surge Protection in the Configuration Utility; Disabling Surge Protection for a Service in the Configuration Utility; Setting Thresholds in the Configuration Utility)
Priority Queuing (Enabling Priority Queuing in the Configuration Utility; Creating a Priority Queuing Policy in the Configuration Utility; Binding Priority Queuing Policies in the Configuration Utility; Weighted Queuing)
HTTP Denial-of-Service Protection (Enabling HTTP DoS Protection in the Configuration Utility; Adding a HTTP DoS Policy in the Configuration Utility; Challenged JavaScript Responses; Client Detection Tuning and JavaScript Challenge Response Rate; HTTP DoS Protection Deployment Guidelines; Attack Characteristics)
IP Rate Limiting (Rate Control by Subnet Example; IP Rate Limiting Best Practices)
Authentication, Authorization, and Auditing
Users, Groups and Command Policies (Authentication, Authorization, and Auditing; Systems and AAA Users Groups; Local Accounts; External Authentication)
External Authentication for System Users (Authentication Actions and Policies; Configuring Local Authentication; Configuring External Authentication with Explicit Accounts; Configuring External Authentication with Group Extraction; Creating an External Authentication Policy; Creating local groups in the Command-Line Interface; Binding Groups in the Command-Line Interface; Creating an LDAP Authentication Action in the Command-Line Interface; Creating an Authentication Policy in the Command-Line Interface; Binding the Policy in the Command Line Interface; Authentication Troubleshooting; External Authentication Common Issues)
AAA for Traffic Management (Enabling AAA for Traffic Management; AAA for Application Traffic; Basic AAA Setup for Application Traffic; Workflow for AAA Traffic Management)
Configuration (Creating an Authentication Virtual Server; Creating an Authentication Virtual Server in the Command-Line Interface; Binding an SSL Certificate in the Command-Line Interface; Binding a Virtual Server to an Authentication Policy in the Command-Line Interface; Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface; Configuring Authorization Policies for Traffic Management; Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface; Creating an Authorization Policy to Allow Access
Audit Logging (Audit Logging Troubleshooting)
HTTP Service Callouts
HTTP Callouts
Configuring HTTP Callouts (Configuring HTTP Callouts in the Configuration Utility; Configuring HTTP Callouts in the Command-Line Interface; Callout Examples; HTTP Callout Response Parsing)
HTTP Callout Use Cases (Scenario 1: Filter Clients Based on an IP Address Blacklist; Scenario 2: Fetch and Update Content; HTTP Callout Auditing)
EdgeSight for NetScaler Server Components (Component Installation Scenarios)
EdgeSight for NetScaler Installation Considerations (Installing EdgeSight for Netscaler; SQL Server; SQL Reporting Services; EdgeSight for NetScaler Components; Installing EdgeSight Database Components; Installing EdgeSight Report Console and Data Collector Components; EdgeSight Post-Installation Wizard; Upgrading EdgeSight for NetScaler)
Reporting Services Initial Configuration (NetScaler Configuration Overview; Configuring HTML Injection; Editing the prebody.js script; Configuration Example in the Command-Line Interface; Add NetScaler System to EdgeSight for NetScaler Data Collector; Topology Data Collectors with SSL)
EdgeSight Charts and Reports
EdgeSight Troubleshooting (Troubleshooting OS Components; Troubleshooting HTML Injection; Troubleshooting Injection Request; Troubleshooting Unknown Device; Troubleshooting from the NetScaler Command-Line Interface)
Command Center
Command Center Introduction (Command Center NetScaler Features; NetScaler and WANScaler Support)
Command Center Clients (Connecting to Command Center)
Server Requirements (Disk Space Requirements; MySQL Considerations; MicrosoftSQL Server 2005 Considerations)
Port Setting Requirements (Command Center Installation; Linux Considerations; Installation; Capacity Planning; Backup; Installation Modes; Installation Considerations)
Command Center Functionality (Command Center Home Page; Discovery; Fault Management; Configuration Management; Change Management; Centralized Certificate Management; Performance Monitoring)
Command Center Administration (Security Administration; Administration Operations; Administration Configuration; Server Details)
Command Center Troubleshooting (Microsoft SQL Database Issues; Discovery Issues; Performance Data Issues; Linux Command-Line Interface Access Issues; Reporting Issues)
NetScaler Web Logging
NetScaler Web Logging Introduction (Architecture Overview; Communication Process)
NetScaler System Configuration (Enabling Web Logging in the Configuration Utility; Enabling Web Logging in the Command-Line Interface; Configuring the Buffer Size in the Configuration Utility; Configuring the Buffer Size in the Command-Line Interface)
NSWL Client Installation (Logging System Components; Installing the NSWL Client on Windows; NSWL Options; Windows Service Registry Key)
NSWL Client Configuration (NetScaler IP Addresses; Log Filters; Defining Log Properties; Running NSWL; Verifying the Configuration)
Troubleshooting Web Logging (NSWL Troubleshooting; NetScaler Troubleshooting; Buffer Overflow)
Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This four-day course builds skills in Java’s XML processing APIs. The course is intended for students with a working knowledge of XML — and possibly DTDs or XML Schema — who want to build XML applications or components using the Java language. Everything in the course adheres to W3C and Java standards for completely portable code.
Class goals :
– Understand the use of SAX and DOM APIs for XML parsing.
– Understand the need for JAXP as an additional layer to the standard contract between applications and parsers.
– Parse element and attribute content, processing instructions, and other document information using SAX.
– Parse documents using the DOM.
– Modify, create and delete information in an XML document using the DOM.
– Write simple and complex queries into XML document content using XPath.
– Use XSLT for XML-to-XML, XML-to-HTML, or XML-to-text transformations.
– Build standalone and web applications that build on XSLT transformation logic.
– Use JAXB to generate persistent Java object models based on XML Schema.
– Implement XML persistence using the JAXB.
Content of Training XML for Java Developers
XML Parsing Using Java
The Java API for XML Processing (JAXP)
Parsing XML
SAX and DOM
What the W3C Says
What the W3C Doesn’t Say
Sun and Apache
JAXP
Parser Factories
Pluggable Parsers
Parser Features and Properties
The Simple API for XML (SAX)
Origins of SAX
The SAX Parser
The SAX Event Model
Reading Document Content
Handling Namespaces
SAX Features for Namespaces
Parsing Attributes
Error Handling
DTD Validation
Schema Validation
Handling Processing Instructions
The Document Object Model (DOM)
Origins of the DOM
DOM Levels
DOM2 Structure
The Document Builder
DOM Tree Model
DOM Interfaces
Document, Node and NodeList Interfaces
Element and Text Interfaces
Finding Elements By Name
Walking the Child List
The Attribute Interface
Traversing Associations
The JAXP Transformer Class
Sources and Results
Combining SAX and DOM Processing
Namespaces and the DOM
Manipulating XML Information with the DOM
Modifying Documents
Modifying Elements
Modifying Attributes
Managing Children
Seeking a Document Location
The ProcessingInstruction Interface
Creating New Documents
XML Transformations Using Java
Using the JAXP for Transformations
XPath, XSLT and Java
The Transformer Class
The TransformerFactory Class
Sources and Results
Identity Transformations
Creating Transformations from Stylesheets
Template Parameters
Output Methods and Properties
Evaluating XPath Expressions
XPath
Use of XPath in Other XML Technologies
XPath Expressions
The Axis
The Node Test
The Predicate
XPath Types
XPath Functions
Implied Context
Querying with XPath
XPath and the DOM
Templates and Production
Rule-Based Transformations
Templates and Template Matching
Built-In Template Rules
Recursion Through Templates
Template Context
Output Methods
Controlling Whitespace
Literal Replacement Elements
Formalizing Text, Elements and Attributes
Defining Target Vocabulary
Generating Processing Instructions
XSLT: Dynamic Content and Flow Control
Web Applications Using XSLT
J2EE and JAXP
Deriving Source Content
Getting Source Values
Attribute Value Templates
Copying Source Elements and Trees
Looping
Conditionals
The Java API for XML Binding
The Java API for XML Binding
The Need for Data Binding
XML Schema
Two Paths
JAXB Compilation
Mapping Schema Types to Java
Java-to-XML Mapping Using Annotations
Marshaling and Unmarshaling
Working with JAXB Object Models
Training XML for Java Developers
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …