Sold Out
Book Categories |
Preface | ||
Ch. 1 | Introduction | 1 |
Ch. 2 | Converting XML to CSV | 33 |
Ch. 3 | Converting CSV to XML | 65 |
Ch. 4 | Learning to Read XML Schemes | 87 |
Ch. 5 | Validating against Schemes | 135 |
Ch. 6 | Refining the Design | 153 |
Ch. 7 | Converting CSV Files to and from XML, Revisited | 209 |
Ch. 8 | Converting Flat Files to and from XML | 279 |
Ch. 9 | Converting EDI to and from XML | 359 |
Ch. 10 | Converting from One XML Format to Another with XSLT | 457 |
Ch. 11 | Using the Conversion Techniques Together | 513 |
Ch. 12 | Building XML Support into a Business Application | 529 |
Ch. 13 | Security, Transport, Packaging, and Other Issues | 551 |
App. A | GNU General Public License | 563 |
App. B | Pseudocode Conventions | 571 |
App. C | COM Essentials for the Non-COM Programmer | 575 |
Bibliography | 581 | |
Credits | 585 | |
Index | 587 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionUsing XML with Legacy Business Applications
X
This Item is in Your InventoryUsing XML with Legacy Business Applications
X
You must be logged in to review the productsX
X
X
Add
Using XML with Legacy Business Applications,
|