Jabber Developer's Handbook

Overview

The Internet is evolving into an infrastructure where applications can converse with one another in a much different way than the traditional page-serving architectures of the first generation Web.

Through examples and clear explanations, Jabber Developer¿s Handbook demonstrates how Jabber, currently the world¿s most important open source messaging protocol, can be used to go beyond interactive chat and file sharing to build flexible, reliable, and powerful distributed software ...

See more details below
Other sellers (Paperback)
  • All (9) from $6.98   
  • New (6) from $22.39   
  • Used (3) from $6.98   
Sending request ...

Overview

The Internet is evolving into an infrastructure where applications can converse with one another in a much different way than the traditional page-serving architectures of the first generation Web.

Through examples and clear explanations, Jabber Developer¿s Handbook demonstrates how Jabber, currently the world¿s most important open source messaging protocol, can be used to go beyond interactive chat and file sharing to build flexible, reliable, and powerful distributed software systems. Peer-to-peer applications using the Jabber open source toolkit, and leverage its use with other readily available and open source software and middleware. It explains how to use Jabber peer-to-peer technologies to solve troublesome reliability and interoperability issues with distributed systems. While peer-to-peer computing and Jabber are considered fairly new technologies, the authors have extensive hands-on experience in applying a variety of system messaging technologies.

Jabber Developer¿s Handbook shows how to design, build, and integrate peer-to-peer applications using the Jabber open source toolkit, and leverage its use with other readily available and open source software and middleware. It explains how to use Jabber peer-to-peer technologies to solve troublesome reliability and interoperability issues with distributed systems. While peer-to-peer computing and Jabber are considered fairly new technologies, the authors have extensive hands-on experience in applying a variety of system messaging technologies.

Read More Show Less

Product Details

  • ISBN-13: 9780672325366
  • Publisher: Sams
  • Publication date: 7/9/2003
  • Series: Developer's Library
  • Pages: 504
  • Product dimensions: 7.00 (w) x 8.80 (h) x 1.20 (d)

Meet the Author

Dana Moore is a Senior Scientist with BBN Technologies in Arlington, VA. He joined BBN in June 2001 to focus on ULTRA*LOG, a DARPA initiative to build very large-scale Java-based multi-agent societies. Previously, he was Chief Scientist with Roku Technologies, a P2P infrastructure developer, and prior to that, a Distinguished Member of Technical Staff at AT&T Laboratories Research. He is the coauthor of Peer-to-Peer: Building Secure, Scalable, and Manageable Networks. He is a popular conference speaker on software agent systems and various management topics, a university lecturer, and he has contributed articles for numerous computing publications. Moore holds a master of science degree in Technology Management from the University of Maryland, and a bachelor of science in Industrial Design, also from the University of Maryland.

William Wright is a Division Engineer with BBN Technologies in Arlington, VA. He provides architecture design and development support for several projects utilizing the Cognitive Agent Architecture (Cougaar) distributed software agent framework. He led the integration and demonstration of one of the world's largest software agent systems, and led the development of an extension to Cougaar to bring agent technology to embedded systems. He has recently written for Java Developer's Journal, Dr. Dobb's Journal, and Embedded Systems Programming magazines. He is coauthor of the book Beginning Java Networking. Wright holds an M.S. in computer science from George Mason University and a Bachelor of Music Education from Indiana University.

Read More Show Less

Table of Contents

1 Introduction: Let's Jabber 1
I Jabber In-Depth 5
1 What Is Jabber Technology? 7
2 Installing and Configuring Jabber Software 35
3 All About Jabber Clients 69
4 Jabber Server Architecture 123
5 Extending the Jabber Server 155
6 Jabber Security 225
II Jabber-Based Networked Applications 271
7 What's in a Name: Web Services 273
8 Jabber and Conversational Software Agents 299
9 Jabber and System Control and Administration 327
10 Jabber and JXTA 365
11 Jabber Libraries for Popular Languages 399
III Appendixes 429
A: Glossary 431
B XML Basics 435
C: Resources 439
Index 443
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)