Home > Store

Wireless Internet and Mobile Business How to Program

Register your product to gain access to bonus material or receive a coupon.

Wireless Internet and Mobile Business How to Program

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Signature “Live Code Approach”—Language features are presented in the context of a wide variety of complete working programs. Features thousands of lines of code in hundreds of complete working programs.
    • Enables students to confirm that programs run as expected. Students can also manipulate the code from the CD-ROM in the back of the book or from the book's Companion Website (www.prenhall.com/deitel) or from the author's website (www.deitel.com).

  • Outstanding, consistent and applied pedagogy—Icons throughout identify Software Engineering Observations; Good Programming Practices; Common Programming Errors; Portability Tips; Performance Tips, Testing and Debugging Tips, and Look-and-Feel Observations.
    • Provides hundreds of valuable programming tips and facilitates learning.

  • Extensive set of interesting exercises and substantial projects.
    • Students can apply what they've learned in each chapter.

  • Four way syntax coloring with the use of two colors and shading.
    • Helps students better understand the book's hundreds of programs.

  • Also available with the Multimedia Cyber Classroom CD-ROM —In The Complete Wireless Internet & Mobile Business Programming Training Course, Student Edition (CD-ROM version: 0-13-062336-9; Web-based version: 0-13-065255-5).
    • Provides extra hands-on experience and study aids for a minimal additional cost. Includes many hours of detailed, expert audio walkthroughs of the book's hundreds of live-code examples; post-assessment exams with hundreds of short answer test questions (all with answers); hundreds of self-review exercises drawn from the text (half with answers); hundreds of programming exercises from the main text (these exercises don't have answers in the main text, but half of these exercises have answers in The Complete Training Course); hundreds of tips that are marked with icons and show how to write code that's portable, reusable, and optimized for performance; and full-text searching and hyperlinking.

Each How to Program text can be ordered as a Complete Training Course package, containing the main text and the corresponding Cyber Classroom—an interactive, multimedia, tutorial version of the book. The Complete Training Courses are a great value, giving students additional hands-on experience and study aids for a minimal additional cost.

Each Complete Training Course is compatible with Windows 95, Windows 98, Windows NT and Windows 2000 and includes the following features:

  • The full text, illustrations and program listings of its corresponding How to Program book with full-text searching and hyperlinking.
  • Hours of detailed, expert audio descriptions of thousands of lines of code that help to reinforce concepts.
  • An abundance of self-assessment material:
    • Practice exams that offer students hundreds of short answer test questions and answers.

    • Hundreds of self-review questions that are drawn from the text, all with answers.

    • Hundreds of programming exercises that are drawn from the text, half with answers (the main text does not provide any answers to these exercises).

  • Intuitive browser-based interface, designed to be easy and accessible for anyone who's ever used a Web browser.

We offer the Complete Training Courses in either CD-ROM or Web-based format. When professors order the Web-based version of a Complete Training Course, their students receive the corresponding How to Program book packaged with a URL and password that gives then six months of access to the Cyber Classroom software via the Web.

If your customer has already received Wireless Internet & Mobile Business How to Program, please sample only the corresponding Multimedia Cyber Classroom CD-ROM (0-13-062337-7) to show them the advantages they would get with The Complete Training Course. Please do not sample The Complete Training Course as they will receive a duplicate copy of the main text.

Description

  • Copyright 2002
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-009288-6
  • ISBN-13: 978-0-13-009288-5

The authoritative DEITEL LIVE-CODE introduction to wireless-Internet & mobile-business programming

By 2003, the number of people browsing the Web from wireless devices will exceed the number browsing from desktop computers. This new book by the world's leading programming language textbook authors carefully explains key wireless technologies, such as i-mode, WAP, J2ME, XML/XHTML Basic, Bluetooth and BREW, and their roles in developing multi-tier, Web-based, client-server applications for wireless devices.

Dr. Harvey M. Deitel and Paul J. Deitel are the founders of Deitel & Associates, Inc., the internationally recognized corporate training and content-creation organization specializing in Java, C++, C, Visual C#, Visual Basic®, Visual C++®, .NET, XML, Python, Perl, Internet, Web, wireless and object technologies. The Deitels are the authors of the world's #1 Java and C++ textbooks—Java How to Program, 4/e and C++ How to Program, 3/e—and many other best sellers. In Wireless Internet & Mobile Business How to Program, the Deitels, Tem Nieto and Kate Steinbuhler, discuss key topics, including:

  • WAP/WML/WMLScript/VBScript®
  • i-mode/cHTML
  • XML/XSLT/XHTML Basic
  • Palm OS®/Web Clipping
  • Windows® CE/.NET Wireless/ASP
  • Java Wireless/J2ME/BREW
  • Location-Based Technologies/GPS
  • Bluetooth/Unicode®/Accessibility
  • WTLS/SSL/Wireless Security
  • m-Business/e-Business/Marketing
  • Macromedia® Flash /Multimedia
  • WWAN/WPAN/LMDS/MMDS
  • W-CDMA/GSM/PCS/GPRS/EPOC/SMS
  • Mobile CRM/Micropayments/m-Wallets
Wireless Internet & Mobile Business How to Program has extensive pedagogic features:

  • Numerous LIVE-CODE programs with screen captures that show exact outputs
  • Extensive World Wide Web and Internet resources to encourage further research
  • Hundreds of tips, recommended practices and cautions—all marked with icons
    — Good Programming Practices
    — Software Engineering Observations
    — Performance Tips
    — Look-and-Feel Observations
    — Testing and Debugging Tips
    — Common Programming Errors

Wireless Internet & Mobile Business How to Program is the centerpiece of a family of resources for teaching and learning wireless Internet and Web programming, including Web sites (http://www.deitel.com and http://www.prenhall.com/deitel) with the book's code examples and other information for faculty, students and professionals; an optional interactive CD (Wireless Internet & Mobile Business Programming Multimedia Cyber Classroom) containing hyperlinks, audio walkthroughs of the code examples, solutions to about half the book's exercises; and e-mail access to the authors at:
deitel@deitel.com

For information on worldwide corporate on-site seminars and Web-based training offered by Deitel & Associates, Inc., visit:
http://www.deitel.com

For information on current and forthcoming Deitel/Prentice Hall publications including How to Program Series books, Multimedia Cyber Classrooms, Complete Training Courses (which include Deitel books and Cyber Classrooms) and Web-Based Training Courses please see the last few pages of this book.

Sample Content

Online Sample Chapter

Deitel Introduces Wireless Platforms and Programming Languages

Table of Contents



 1. Introduction to the Internet, World Wide Web and Wireless Communications.


 2. m-Business.


 3. Location-Identification Technologies and Location-Based Services.


 4. e-Marketing and m-Marketing.


 5. e-Payments and m-Payments.


 6. Security.


 7. Legal and Social Issues; Web Accessibility.


 8. International Wireless Communications.


 9. Wireless Communications Technologies: Part 1.


10. Wireless Communications Technologies: Part 2.


11. Palm™ and Palm OS®.


12. Microsoft® Windows® CE, Pocket PC and Stinger.


13. Wireless Markup Language (WML): Part 1.


14. Wireless Markup Language (WML): Part 2.


15. WMLScript: Introduction to Scripting.


16. WMLScript: Functions.


17. WMLScript: Control Structures 1.


18. WMLScript: Control Structures 2.


19. WMLScript: Objects.


20. WMLScript: Strings and Characters.


21. Web Clipping.


22. i-mode.


23. Bluetooth™ Wireless Technology.


24. Introduction to XHTML Basic: Part 1.


25. Introduction to XHTML Basic: Part 2.


26. Case Study: Active Server Pages (ASP).


27. Java-Based Wireless Applications Development and J2ME.


28. Microsoft.NET Mobile Internet Toolkit.


29. Binary Runtime Environment for Wireless (BREW™).


30. Multimedia: Audio, Video and Speech Recognition.


31. Macromedia® Flash™.


Appendix A: Introduction to Java™ 2 Programming.


Appendix B: Career Opportunities.


Appendix C: ASCII Character Set.


Appendix D: Special Characters and the Web.


Appendix E: Unicode®.


Appendix F: Number Systems.


Appendix G: Colors and the Web.


Appendix H: Extensible Markup Language (XML).


Bibliography.


Index.

Preface

Live in fragments no longer. Only connect.
Edward Morgan Forster

We wove a web in childhood,
A web of sunny air.

Charlotte Bronte

Wow! Many of our readers will say, "I had no idea that this wireless stuff was so significant. I have been using cell phones for years, but I never viewed cell phones as vehicles for connecting to the Internet and browsing the Web. Now, all of a sudden, I learn the amazing statistic that the number of people accessing the Web through wireless devices by 2002/2003 will be larger than the number who access the Web through desktop computers! Who could have imagined this?"

So here you are—following the explosive development of the Internet fostered by the World Wide Web. Yes, the world got a dose of reality in 2000/2001 as the stock market lunacy of 1999-2000 discovered gravity and fell back to Earth. For speculators—of which there were far too many in 1999-2000—this was a devastating crash. People "got hurt." But for people following the long-term trends, it is absolutely clear that an increasing portion of business will be done on the Web, and more of your personal lives will become Webcentric. Young people have not seen the ebb and flow of business cycles. Their view is shortterm. Older folks have experienced business cycles. We see forecasts that e-business will be $5-$6 trillion by 2004/2005; more than eighty percent of that will be business-to-business (B2B) transactions.

This book has been a true labor of love. Although there are four authors on the cover, probably 30 people at Deitel & Associates, Inc. made significant contributions. We attended many trade shows to be sure we were current with what is happening in the wireless field. Four of us—Harvey and Abbey Deitel, Kate Steinbuhler and Matt Kowalewski—spent a week at the CTIA (Cellular Telecommunications and Internet Association) trade show in Las Vegas. What a wonderful educational experience for us all—and a fun time. We visited every one of the 1000 (!) exhibitors at the show. While we were there, though, we noticed something unusual—there were no publishers exhibiting their books, nor was there a book store as there normally is at a major trade show. The realization reinforced our commitment to this book.

We see a global explosion in the so-called "wireless Internet," but we do not see books geared to preparing computer-science students, information technology students and professionals for the wireless Web revolution. Wireless Internet & Mobile Business How to Program is intended for the student or professional who sees the enormous potential of this exploding field.

Just look at the bullets on the front cover or the Table of Contents. There is an amazing range of topics covered in this book. Every major technical thrust in wireless Internet programming is covered in these pages.

1. i-mode. The Japanese i-mode system with over 24 million subscribers is the leading wireless Internet system in the world by'a factor of three. You will learn the history of imode and how to mark up text using cHTML.

2. Wireless Application Protocol (WAP) dominates wireless Internet access in the U.S. and Europe, and also is popular in Japan. You will learn how to mark up text using the Wireless Markup Language (WML) and how to create dynamic content on wireless clients with WMLScript.

3. Java 2 Micro Edition (J2ME). You will learn Sun's newest addition to the Java platform that many people feel will eventually dominate in the wireless world. You may have heard the terms "applets" and "servlets;" you will be introduced to MIDlets-a MIDP (Mobile Information Device Profile) application.

4. XHTML. Most programmers have developed HTML-based Web pages. However, the W3C (World Wide Web Consortium) has declared HTML to be a legacy technology that will undergo no further development. HTML is being replaced by XHTML—an XML-based technology certain to become the standard in the development of Web clients over the next few years. However, XHTML, like HTML, is far too rich for wireless clients with their small displays and bandwidth limitations, so the W3C has developed a concise subset of XHTML for wireless clients—XHTML Basic. Both WAP and i-mode are converging on XHTML Basic in impending versions, so we cover XHTML Basic markup in Chapters 24 and 25.

But the client side is only half the picture. What about the server side—where "heavy-duty" business logic is implemented? Active Server Pages (ASP) is popular for implementing business logic on Microsoft Web servers and Java dominates the world of nonMicrosoft Web servers. We explore these powerful technologies by presenting two large, fully implemented and carefully documented case studies. The ASP case study in Chapter 26 prepares wireless content for i-mode (cHTML), WAP (WML and WMLScript) and XHTML clients. The J2ME Java case study uses Java on the server side to prepare content for i-mode, WAP, XHTML and J2ME clients. It was reported at the June 2001 Java-One trade show that 98% of i-mode server-side programming is done in Java—a stunning amount, given the abundance of server-side programming technologies. Many people believe that the wireless world will converge on Java and XML, so we have included Appendix A, Java Programming, and Appendix H, XML.

If you are tired of tripping over wires and installing wired networks in your offices and your homes, get ready for the Bluetooth wireless technology revolution. Bluetooth technology can remove the wires connecting your mouse, your printer or any other peripheral device connections to your computer. Not only this, but you will be able to network your office without wires, and your car—becoming ever more electronic- and gadget-intensive—will no longer need complex wiring. You will be able to use your cell phone to buy products from vending machines, to check into hotels and gain access to your hotel room. The possibilities are endless. Already 2200 companies belong to the Bluetooth Consortium.

We present yet another leading-edge technology—BREW—the Binary Runtime Environment for Wireless&3151;created by Qualcomm. BREW enables wireless application developers to solve the complex problem of developing applications that will run on disparate platforms. Developers need only "write to" BREW which will enable disparate devices with BREW hardware and software installed to run these applications despite the fact that the underlying hardware and software might be quite different.

Although wireless devices have limitations, multimedia developers have nevertheless created impressive wireless capabilities. Chapter 30, Multimedia: Audio, Video and Speech Recognition, and Chapter 31, Flash, detail these interactive elements.

We have all experienced the e-business revolution. Next up is the m-business (mobile business) revolution. In addition to our coverage of wireless technologies, we have included a dozen chapters to help you prepare for m-business, including Introduction to mBusiness; Location-Identification Technologies and Location-Based Services; e-Marketing and m-Marketing; e-Payments and m-Payments; Security; Legal and Social Issues; International Wireless Communications; two chapters of Wireless Communications Technologies; Palm and Palm OS®; and Microsoft CE, Pocket PC and Stinger.

The m-business topics we introduce apply many of the programming technologies you learn in Wireless Internet and Mobile Business How to Program. Companies are equipping their mobile workers with cell phones and PDAs to provide their employees "anywhere, anytime" access to business-critical information. With location-identification technologies and location-based services, companies can track deliveries; marketers can use the mobile communications explosion as a new and effective way to reach mobile customers because they know where the customers are at a given time. Location-tracking capabilities also raise the issue of whether the applications constitute an invasion of privacy. If used in certain arenas, it could indeed be intrusive. On the other hand, tracking cell-phone users could save lives when accident victims cannot communicate.

Imagine if you could use your cell phone to beam payment information when buying merchandise at a local store. M-commerce success hinges on whether cell phones will become widely used payment mechanisms and whether payments can be sent and received securely. Payment and security are discussed in Chapters 5 and 6.

The international community is the leader of wireless communications technology and use. In a few countries, as many as three-quarters of the people own cell phones. For some people, cell-phone calls are the first calls they make because of the relatively high cost of wired telephone service outside the United States. International wireless communications is presented in Chapter 8.

Wireless communications encompasses numerous technologies that we discuss in Chapters 9 and 10. These chapters provide you with an understanding of the breadth of technologies used around the world—hardware, cell-phone networks and wireless platforms—for wireless communications.

Soon your cell phone will be your electronic address book and calendar—as personal digital assistants (PDAs) and cell phones converge. Chapter 11 details the Palm handheld and its applications and Chapter 12 details the Pocket PC handheld and the "smart phone," the so-called "convergence device."

Well, there you have it. You are about to begin what we hope will be an interesting, entertaining and challenging learning experience. As you study from this book, if you have any questions, just send us an e-mail at deitel@deitel.com and we will get back to you promptly. We sincerely hope you enjoy learning from Wireless Internet & Mobile Business How to Program as much as we enjoyed writing it. Our best wishes to you.

Objectives of Wireless Internet & Mobile Business How to Program

Many books about the Web are reference manuals that provide exhaustive listings of features. That is not our style-we concentrate on creating real applications. The live-code examples provided on our Web site (http://www.deitel.com ) enable students to run the applications that we discuss. One of the most appealing features of this text is that it introduces a wide variety of wireless programming languages and technologies.

We are excited about the enormous range of possibilities offered by the wireless Internet and m-business. We performed extensive research for this book and, in doing so, have located hundreds of Internet and Web resources. The resources include general information sites, tutorials and demonstrations of the technologies in this book. Many of the demos are fun to try and can increase students' understanding of topics and technologies.

This book is appropriate for any student or professional with a desire to learn wireless programming. Many of the Internet and Web resources that we include point readers to turn-key solutions (some fee-based and some free) for the creation of m-business applications. However, readers can use the programming technologies presented here to create these applications themselves. Please read the tour of the book in Chapter 1, Introducing the Internet, the Web and Wireless Communications, to familiarize yourself with the technologies that we present.

We have worked hard to create numerous live-code examples to help students master wireless Internet and Web programming quickly and effectively. All of the code examples are available for free download from our Web sites:
http://www.deitel.com
http://www.prenhall.com/deitel

Some Notes to Instructors

Why We Wrote Wireless Internet & Mobile Business How to Program
Today, the wireless Internet, m-business and m-commerce are experiencing explosive growth; as technologies and applications advance from their infant stages, the possibilities for the wireless industry seem endless. Because wireless technologies allow businesses to reach their markets in ways that were never before possible, professionals are eager to incorporate m-business technology—and hire employees who understand wireless marketing—into their organizations. College professors are including m-business and m-commerce in their undergraduate and graduate Internet and business curricula, and students look forward to mastering leading-edge technologies.

Dr. Harvey M. Deitel taught introductory programming courses in universities for 20 years with an emphasis on developing clearly written, well-designed programs. Much of what is taught in these courses represents the basic principles of programming, but concentrates on the effective use of data types, control structures, arrays and functionalization. Our experience has been that students handle the material in this book in about the same way that they handle other introductory and intermediate programming courses. There is one noticeable difference, though: students are highly motivated by the fact that they are learning technologies that will be immediately useful to them as they enter a business world in which the Internet, the World Wide Web and wireless communications have a massive new prominence.

Multimedia-Intensive Communications
People want to communicate. Sure, they have been communicating since the dawn of civilization, but the potential for information exchange has increased drastically with the evolution of various technologies. Until recently, even computer communications have been limited mostly to digits, alphabetic characters and special characters. The next major wave of communication technology is multimedia. People want to transmit color pictures, voices, audio clips and even full-motion color video over the Internet. At some point, they will insist on three-dimensional, moving-image transmission. Current wireless devices and bandwidth severely limit the potential of multimedia. Small screen sizes, black-and-white screens, slow connections and high access costs have proved to be major impediments to graphics and video presentation on wireless devices. However, as wireless technologies progress and the wireless world migrates to 3G technologies, multimedia capabilities now mostly limited to PCs will become a reality on wireless devices. Current wireless devices, which connect to the Internet at speeds as low as 9.6Kbps, will soon be replaced by devices that connect at speeds 50 times faster—appropriate for streaming media and other enhanced multimedia.

Focus of the Book
Our goal was clear: Produce a textbook for college-level courses in programming and business aimed at students with little or no programming experience, yet offer the depth and the rigorous treatment of theory and practice demanded by professionals and students in traditional, upper-level programming and business courses. To meet these objectives, we produced a comprehensive book that patiently teaches the concepts of wireless programming, as well as the principles of control structures, object-based programming and various markup languages (WML, cHTML, XHTML Basic and XML) and scripting languages (WMLScript). We include detailed appendices on Java and XML—the two technologies that are certain to dominate the future of wireless applications development. After mastering the material in this book, students will be well prepared to take advantage of the wireless Internet and the Web as they venture into the rapidly changing business world.

Enabling Multimedia-Based Applications and Communications
Many books about the wireless Internet concentrate on such simple applications for wireless devices as phone books and calendar programs. We do that too, but, as you move towards the back of the book, you will start to see more visually appealing applications involving i-mode and BREW technology. Already, we are starting to see the shift to color displays and more robust devices, which will enable a new generation of wireless applications. Moreover, the key focus of this book is on Web-based applications development. Our audiences want to build real-world, industrial-strength, Web-based applications. Although these audiences are interested in appealing WAP applications, they also care about client/ server systems, databases and distributed computing. Through our explanations and live-code examples, we help students master a wide variety of programming and Internet tools that will maximize their creativity and development abilities.

There have been predictions that the Internet will eventually replace radio and television as we know them today. Similarly, it is not hard to imagine newspapers, magazines and books delivered to "the palm of your hand" via wireless communications. Many newspapers and magazines already offer Web-based versions, and those same services will soon spread to the wireless world. When cellular phones were first introduced, they were large, cumbersome and unmanageable. Today, they are small devices that fit in our pockets and many are equipped with Internet access. Given the current rate of advancement, wireless technology could offer such impressive services as video conference calls and high-power, mufti-player video games in the coming years.

Teaching Approach

Wireless Internet & Mobile Business How to Program contains a rich collection of examples, exercises and projects that give students the opportunity to solve interesting real-world problems. The book concentrates on the principles of m-business and good software engineering, stressing program clarity. We avoid arcane terminology and syntax specifications in favor of teaching by example. The book is written by educators who spend most of their time writing about revolutionary, cutting-edge programming topics—in addition to teaching these technologies in industry classrooms worldwide. The text emphasizes good pedagogy.

Live-Code Teaching Approach
Wireless Internet & Mobile Business How to Program is loaded with numerous live-code examples. This style exemplifies the way we teach and write about programming, as well as being the focus of our multimedia Cyber Classrooms. Each new concept is presented in the context of a complete, working example that is immediately followed by one or more windows showing the program's input/output dialog. We call this method of teaching and writing our live-code approach. We use programming languages to teach programming languages. Reading the examples in the text is much like entering and running them on a computer.

This book begins by explaining cutting-edge technologies and business models that are changing the way that e-commerce is conducted. It then proceeds to explore the creation of m-business applications, starting with WAP/WML and continuing on to programming with Web Clipping, i-mode, XHTML Basic, ASP, J2ME and BREW. There is great stuff to be done in all these languages, so let's get right to it! Wireless programming is not trivial by any means, but it's fun, and students can see immediate results.

World Wide Web Access
All of the examples for Wireless Internet and Mobile Business How to Program (and our other publications) is available on the Internet as downloads from the Web sites:
http://www.deitel.com
http://www.prenhall.com/deitel

We suggest downloading all the examples and then running each program as you read the text. Make changes to the examples and immediately see the effects of those changes—it's a great way to learn programming. As we introduce new technologies in the book, we provide setup instructions for the appropriate wireless simulators and emulators. Each set of instructions assumes that the user is running Windows 2000 and is using Internet Information Services (IIS). Additional setup instructions for Web servers and other software can be found at our Web site along with the examples. Note: You must respect the fact that this is copyrighted material. Feel free to use it as you study, but you may not republish any portion of it in any form without explicit permission from Prentice Hall and the authors.

Objectives
Each chapter begins with Objectives that tell students what to expect and give them an opportunity, after reading the chapter, to determine whether they have met the intended goals. The objectives serve as confidence builders and as a source of positive reinforcement.

Quotations
The chapter objectives are followed by sets of Quotations. Some are humorous, some are philosophical and some offer interesting insights. We have found that students enjoy relating the quotations to the chapter material. Many of the quotations are worth a "second look" after you read each chapter.

Outline
The chapter Outline enables students to approach the material in top-down fashion. Along with the chapter objectives, the outline helps students anticipate what is to come and set a comfortable and effective learning pace.

11,026 Lines of Code in 137 Examples (with Outputs)
We present features in the context of complete, working examples and server-side programs in ASP/VBScript and Java. Ranging from a few lines of code to several hundred, each document is followed by the outputs produced when the document is rendered in a simulator and its scripts are executed. This enables students to confirm that the documents are rendered as expected. (We use a variety of simulators, including Openwave, Nokia and Pixo.) Reading the book carefully is much like entering and running these examples on a computer. Students should download all the code for the book from our Web site and should run each program while studying that program in the text.

523 Illustrations/Figures
An abundance of charts, line drawings and program outputs is included. Screen captures help explain concepts related to wireless technology, such as location-identification and transmission protocols. Other images convey the differences between wireline and wireless clients.

38 e-Facts
The e-Facts offer interesting facts and statistics on the Internet the World Wide Web and e-business.

58 m-Facts
Similar to e-Facts, our m-Facts relate to topics covered in the text and contain interesting facts and statistics on mobile communications and mobile business.

282 Programming Tips
We have included programming tips to help students focus on important aspects of program development. We highlight hundreds of these tips in the form of Good Programming Practices, Common Programming Errors, Testing and Debugging Tips, Performance Tips, Portability Tips, Software Engineering Observations and Look-and-Feel Observations. These tips and practices represent the best of the knowledge we have gleaned over decades of programming and teaching experience. One of our students—a mathematics major—told us that she feels this approach is like the highlighting of axioms, theorems and corollaries in mathematics books; it provides a foundation on which to build good software.

  • 75 Good Programming Practices
    Good Programming Practices are highlighted in the text. These tips call attention to techniques that will help students produce better programs. When we teach introductory courses to nonprogrammers, we state that the "buzzword" of each course is "clarity, " and we tell the students that we will highlight (in these Good Programming Practices) techniques for writing programs that are clearer, more understandable and more maintainable.
  • Common Programming Errors
    Students learning a language—especially in their first programming course—tend to make certain kinds of errors frequently. Pointing out these Common Programming Errors reduces the likelihood that students will make the same mistakes. It also cuts down on long lines outside instructors' offices during office hours!
  • 29 Performance Tips
    In our experience, teaching students to write clear and understandable programs is by far the most important goal of a first programming course. But students want to write programs that run the fastest, use the least memory, require the smallest number of keystrokes or dazzle in other nifty ways. Students really care about performance, and they want to know what they can do to "turbo charge" their programs. For the benefit of such students, we have included Performance Tips that highlight opportunities for the improvement of program performance.
  • 14 Portability Tips
    Software development is a complex and expensive endeavor. Organizations that create software often must produce versions customized to a variety of computers and operating systems. This has excited strong interest in portability (i.e., producing software that will run on various computer systems with few, if any, changes). Achieving portability requires careful and cautious design, and there are many pitfalls. We include Portability Tips to help students write portable code.
  • 51 Software Engineering Observations
    The Software Engineering Observations highlight techniques, structural issues and design issues that affect the architecture and construction of software systems, especially largescale systems. Much of what the student learns here will be useful in upper-level courses and in industry as the student begins to work with large, complex real-world systems.
  • 13 Testing and Debugging Tips
    This "tip type " is somewhat misnamed. When we first decided to incorporate Testing and @Debugging Tips, we thought that the tips would contain suggestions for testing programs to expose bugs and suggestions for removing those bugs. In fact, many of these tips are observations about capabilities and features that prevent bugs from getting into programs in the first place.
  • 12 Look-and-Feel Observations
    We provide Look-and-Feel Observations to highlight graphical user interface (GUI) conventions. These observations help students design their own graphical user interfaces to conform with industry norms.

Summary (1392 Summary bullets)
Each chapter ends with additional pedagogical devices. We present a thorough, bullet-list-style Summary of the chapter. On average, there are 39 summary bullets per chapter, and summaries also are included in several of the appendices. This helps students review and reinforce key concepts.

Terminology (2312 Terms)
We include in a Terminology section an alphabetized list of the important terms defined in the chapter. Again, this serves as further reinforcement. On average, there are 59 terms per chapter.

482 Self-Review Exercises and Answers (Count Includes Separate Parts)
Self-Review Exercises and Answers are included for self-study. These questions and answers give students a chance to build confidence with the material and prepare for the regular exercises. Students should attempt all the self-review exercises and check their answers.

561 Exercises (Solutions in Instructor's Manual; Count Includes Separate Parts)
Each chapter concludes with a set of exercises that involve simple recall of important terminology and concepts, writing individual statements, writing small portions of functions, writing complete functions and scripts and working on larger projects. The exercises cover a wide variety of topics, enabling instructors to tailor their courses to the unique needs of their audiences and to vary course assignments each semester. Instructors can use these exercises to form homework assignments, short quizzes and major examinations. The solutions for the vast majority of the exercises are included in the Instructor's Manual and the Instructor's Manual CD which is available only to instructors through their Prentice-Hall representatives. Solutions to approximately half the exercises are included on the Wireless Internet & Mobile Business How to Program Multimedia Cyber Classroom CD (available in bookstores and computer stores; please see the last few pages of this book or visit our Web site at http://www.deitel.com for ordering instructions).

Approximately 5443 Index Entries (with approximately 7635 Page References)
We have included an extensive Index at the back of the book. Using this resource, students can search for any term or concept by keyword. The terms in the terminology sections generally appear in the index (along with many more index items from each chapter). Students can use the index, in conjunction with the terminology sections to ensure that they have covered the key material in each chapter.

"Double Indexing" of All Live-CodeTM Examples and Exercises
Wireless Internet & Mobile Business How to Program has 137 live-code examples and 561 exercises (including parts). We have "double indexed" each of the live-code examples. For every source-code program in the book, we took the figure caption and indexed it both alphabetically and as a subindex item under "Examples." This makes it easier to find examples that use particular features.

Ancillary Package for Wireless Internet & Mobile Business How to Program

NOTE: Please do not write to us requesting the instructor's manual. Distribution of this publication is strictly limited to college professors teaching from the book. Instructors may obtain the solutions manual only from their regular Prentice Hall representatives. We regret that we cannot provide the solutions to professionals. Wireless Internet & Mobile Business How to Program has extensive ancillary materials available to instructors teaching from the book. The Instructor's Manual CD contains solutions to the vast majority of the end-of-chapter exercises. In addition, we provide PowerPoint® slides containing all the code and figures in the text. You are free to customize these slides to meet your own classroom needs. Prentice Hall provides a Companion Web Site (http://www.prenhall.com/deitel) that includes resources for instructors and students. For instructors, the Web site has a Syllabus Manager for course planning, links to the PowerPoint slides and reference materials from the appendices of the book (such as the operator precedence chart, character sets and Web resources). For students, the Web site provides chapter objectives, true/false self-review exercises and answers, chapter highlights and reference materials.

Wireless Internet & Mobile Business Programming Multimedia Cyber Classroom and The Complete Wireless Internet and Mobile Business Programming Training Course

We have prepared an optional interactive, CD-ROM-based, software version of Wireless Internet & Mobile Business How to Program called the Wireless Internet and Mobile Business Programming Multimedia Cyber Classroom. This resource is loaded with features that are ideal for learning and reference. The Cyber Classroom is wrapped with the textbook at a discount in The Complete Wireless Internet & Mobile Business Programming Training Course. If you already have the book and would like to purchase the Wireless Internet & Mobile Business Programming Multimedia Cyber Classroom separately, please call 1-800811-0912 and ask for ISBN# 0-13-062337-7.

The CD has an introduction with the authors overviewing the Cyber Classroom's features. The 137 live-code example Web documents and server-side programs in the textbook truly "come alive" in the Cyber Classroom. If you want to modify a document and examine the effects of your changes, simply click the floppy-disk icon that causes the source code to be "lifted off' the CD and "dropped into" one of your own directories so that you can edit the document and try out your new version. Click the speaker icon for an audio that talks about the document and "walks you through" the code.

The Cyber Classroom also provides navigational aids, including extensive hyperlinking. The Cyber Classroom remembers in a "history fist" recent sections that you have visited and allows you to move forward or backward in that history list. The thousands of index entries are hyperlinked to their text occurrences. Furthermore, when you key in a term using the "find" feature, the Cyber Classroom will locate occurrences of that term throughout the text. The Table of Contents entries are "hot," so clicking a chapter name takes you to that chapter.

Students like the dozens of solved problems from the textbook that are included with the Cyber Classroom. Studying and running these extra examples is a nice way for students to enhance their learning experience.

Students and professional users of our Cyber Classrooms tell us that they like the interactivity and that the Cyber Classroom is an effective reference because of its extensive hyperlinking and other navigational features. We recently received an e-mail from a person who said that he lives "in the boonies" and cannot take a live course at a university, so the Cyber Classroom provided an ideal solution to his educational needs.

Professors tell us that their students enjoy using the Cyber Classroom, spend more time on the course and master more of the material than in textbook-only courses. In addition, the Cyber Classroom helps shrink lines outside professors' offices during office hours. We have also published The C++ Multimedia Cyber Classroom (3/e), the Visual Basic 6 Multimedia Cyber Classroom, the Java 2 Multimedia Cyber Classroom 4/e, the Internet and World Wide Web Programming Multimedia Cyber Classroom, 2/e, the XML Multimedia Cyber Classroom, the Perl Multimedia Cyber Classroom and will soon publish the Advanced Java Multimedia Cyber Classroom, the Python Multimedia Cyber Classroom and many more.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020