Spring Framework 2.0.4 Reference............................................... 228 12.2.10. Spurious application server warnings when using Hibernate ............................. 229 12.3. JDO ..................................... implemented for remote interfaces ............................................... 352 17.8. Considerations when choosing a technology ................................................................. 352 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 500 页 | 3.60 MB | 1 年前3
Spring Framework 2.0.3 Reference............................................... 226 12.2.10. Spurious application server warnings when using Hibernate ............................. 227 12.3. JDO ..................................... implemented for remote interfaces ............................................... 350 17.8. Considerations when choosing a technology ................................................................. 350 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 495 页 | 3.57 MB | 1 年前3
Spring Framework 2.0.5 Reference............................................... 227 12.2.10. Spurious application server warnings when using Hibernate ............................. 228 12.3. JDO ..................................... implemented for remote interfaces ............................................... 351 17.8. Considerations when choosing a technology ................................................................. 351 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 499 页 | 3.59 MB | 1 年前3
Spring Framework 2.0.2 Reference............................................... 217 12.2.10. Spurious application server warnings when using Hibernate ............................. 218 12.3. JDO ..................................... implemented for remote interfaces ............................................... 340 17.8. Considerations when choosing a technology ................................................................. 340 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 498 页 | 3.55 MB | 1 年前3
Spring Framework 2.0.7 Reference............................................... 229 12.2.10. Spurious application server warnings when using Hibernate ............................. 230 12.3. JDO ..................................... implemented for remote interfaces ............................................... 354 17.8. Considerations when choosing a technology ................................................................. 354 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 502 页 | 3.61 MB | 1 年前3
Spring Framework 2.0.1 Reference............................................... 217 12.2.10. Spurious application server warnings when using Hibernate ............................. 217 12.3. JDO ..................................... implemented for remote interfaces ............................................... 339 17.8. Considerations when choosing a technology ................................................................. 339 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 496 页 | 3.55 MB | 1 年前3
Spring Framework 2.0.6 Reference............................................... 227 12.2.10. Spurious application server warnings when using Hibernate ............................. 228 12.3. JDO ..................................... implemented for remote interfaces ............................................... 351 17.8. Considerations when choosing a technology ................................................................. 351 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 499 页 | 3.60 MB | 1 年前3
Spring Framework 2.0.0 Reference............................................... 217 12.2.10. Spurious application server warnings when using Hibernate ............................. 218 12.3. JDO ..................................... implemented for remote interfaces ............................................... 340 17.7. Considerations when choosing a technology ................................................................. 341 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 491 页 | 3.51 MB | 1 年前3
Spring Framework 2.0.8 Reference............................................... 229 12.2.10. Spurious application server warnings when using Hibernate ............................. 230 12.3. JDO ..................................... implemented for remote interfaces ............................................... 354 17.8. Considerations when choosing a technology ................................................................. 354 18. Enterprise Chapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting0 码力 | 502 页 | 3.61 MB | 1 年前3
Spring Framework 2.5.x ReferenceChapter 1. Introduction Background In early 2004, Martin Fowler asked the readers of his site: when talking about Inversion of Control: “the question is, what aspect of control are [they] inverting initialization of the IoC container using servlet listeners and a web-oriented application context. When using Spring together with WebWork or Struts, this is the package to integrate with. Spring's MVC declarative transaction management features the web application is fully transactional, just as it would be when using container managed transactions as provided by Enterprise JavaBeans. All your custom business0 码力 | 590 页 | 4.31 MB | 1 年前3
共 394 条
- 1
- 2
- 3
- 4
- 5
- 6
- 40













