Written by Lift Scala web framework founder and lead Dave Pollak, Beginning Scala takes a down-to-earth approach to teaching Scala that leads you through simple examples that can be combined to build complex, scalable systems and applications.
Bluetooth for Java describes how to develop wireless Java applications using Bluetooth for a variety of platforms. This includes an API overview of the Java library, development of Bluetooth-based services, highlights of security concerns, and walkthroughs for development with some of the different tools available.
Authors Linwood and Minter describe the Java portlet API, including security, portlet life cycles, and portlet interaction with servlets and JSP. Several example portlets are developed to give you hands-on portlet experience. You'll even learn how to port existing servlet and JSP applications into a new portal environment.
In Building Spring 2 Enterprise Applications, the Spring development team at Interface21 will take you from first steps to integration of other technologies, to give you everything you need to develop your own Spring enterprise applications.
You've developed a killer app for one mobile devicenow it's time to maximize your intellectual investment. With Cracking iPhone and Android Native Development, you'll learn how to quickly retool your app for the full spectrum of mobile platforms and devices.
Creating Mobile Games: Using Java ME Platform to Put the Fun into Your Mobile Device and Cell Phone is a practical build-it-yourself mobile Java games book with lots of complete working code and advice.
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps.
Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation to properly protect your intellectual property.