Welcome!

Industrial IoT Authors: Elizabeth White, Stackify Blog, Yeshim Deniz, SmartBear Blog, Liz McMillan

Blog Feed Post

Core Java (9th Edition) , Volume I and Volume II Book Reviews

This review covers both Core Java Volume I--Fundamentals (9th Edition) and Core Java, Volume II--Advanced Features (9th Edition). Both books are part of the Prentice Hall Core Series.

I actually got Volume II first and liked it so much I ordered Volume I. I felt like I was missing the first half of the story. Especially when I downloaded the code and both volumes were included.

These two books take you on quite a journey. The first volume starts off with a great overview and history of Java. It then goes into how to download, install, and configure both the JDK and Eclipse. The authors uses Eclipse throughout both volumes.

The rest of Volume I is dedicate to covering the fundamental concepts of the Java language and the basics of user-interface programming. I have listed the chapters in Volume I below.

Volume I
Chapter 1. An Introduction to Java
Chapter 2. The Java Programming Environment
Chapter 3. Fundamental Programming Structures in Java
Chapter 4. Objects and Classes
Chapter 5. Inheritance
Chapter 6. Interfaces and Inner Classes
Chapter 7. Graphics Programming
Chapter 8. Event Handling
Chapter 9. User Interface Components with Swing
Chapter 10. Deploying Applications and Applets
Chapter 11. Exceptions, Assertions, Logging, and Debugging
Chapter 12. Generic Programming
Chapter 13. Collections
Chapter 14. Multithreading
Appendix A. Java Keywords

As you can see the first volume covers a ton of topics. They are all covered in depth and without filler. It is amazing that in these two huge books the authors' no nonsense approach uses no blather to fill up pages with unneeded war stories and his personal views on how the language could be better. I mention that because I recently tossed a book on the pile of books I regret buying that was all filler.

Volume II picks up where Volume I left off and continues into enterprise features and advanced user-interface programming. The topics are covered in great detail, but the authors' writing styles make the topics easy to understand, and a pleasure to read.

Volume II
Chapter 1. Streams and Files
Chapter 2. XML
Chapter 3. Networking
Chapter 4. Database Programming
Chapter 5. Internationalization
Chapter 6. Advanced Swing
Chapter 7. Advanced AWT
Chapter 8. JavaBeans Components
Chapter 9. Security
Chapter 10. Scripting, Compiling, and Annotation Processing
Chapter 11. Distributed Objects
Chapter 12. Native Methods

The authors also have a support site that has a List of Frequently Asked Questions, a bug list (Errata), and the downloadable code.

The downloadable code is organized by volume and chapter. Each chapter has its own folder and each example in the chapter also has its own folder. The best part about it is it just runs. Lately that hasn't been the case with a few book I have purchased.

The code along with the in-depth and clear explanations of the topics at hand provide the ultimate Java learning tools.

There are a total of 2092 pages of pure Java learning material. The authors' writing styles make these a good cover to cover read for the beginner that needs to cover everything, but they very well organized and make great references.

I highly recommend these books to beginners as well as advanced developers. When I am coding Java, these two books will definitely be by my side.

Core Java Volume I--Fundamentals (9th Edition)










Core Java, Volume II--Advanced Features (9th Edition)

Read the original blog entry...

More Stories By Tad Anderson

Tad Anderson has been doing Software Architecture for 18 years and Enterprise Architecture for the past few.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...