WHO THIS BOOK IS FOR
When a practitioner with some expertise in programming in Java decides to access this new area, the most they can do is try to find the required information on Java from different sources and then try to merge it. This will not be simple, because in order to build NFC applications using Java language, the practitioner needs to collect scattered information, and then merge it for a better understanding. Even in this case, the amount of information the user would collect would be very small indeed. Some basic information exists in the public domain, but much more exists only in academic literature, which is either not publicly available or not easy for non-academic people to combine with the public information.
Although some basic information exists in the current literature, there is much information that is not yet available at all. For example, we have performed extensive ecosystem analysis in this work and hence recognize the lack of and need for a solid source that contains accurate information and addresses entrepreneurs and programmers. This book is for anyone who is interested in developing projects, ranging from projects that are very simple to those that potentially have worldwide application. The reader may be an entrepreneur who is ambitious to promote their ideas for any reason; or they may be a member of a development team in a company that is eager to fi re up an NFC service. In either case, this book is well designed to satisfy every type of reader who is interested in writing any amount code on NFC.
|Matched Content Ad. by Google|
WHAT THIS BOOK COVERS
Chapter 1 consists of introductory information on NFC technology. It gives some technical history and background information in NFC technology, and continues with the components of an NFC services setup. The component knowledge covers NFC-enabled mobile phones, NFC reader, NFC tags, and other complementary parts. This chapter will provide readers with enough knowledge on NFC at a macro level.
Chapter 2 contains the technical details of NFC technology that an NFC programmer will probably need. Details of NFC devices are initially covered in detail. This chapter consists of the technical details of three NFC operating modes, providing the reader with sufficient technical background, as well as the standards that must be followed when creating compatible programs within a development team. Details of the record types to be exchanged among NFC devices are included in the chapter for the same reason.
Chapter 3 and Chapter 4 consist of details of Android programming, for those who know Java but are not acquainted with Android in enough detail. The coverage of Android programming in this chapter is not extensive, but is enough to enable readers to continue with the later chapters on NFC programming using Android, as well as developing NFC applications further.
|Matched Content Ad. by Google|
All the necessary information on the Android development environment is included as well, to provide the necessary preparation for readers without knowledge about Android programming. Those who are already confident about Android programming can skip these chapters and proceed to the material that follows.
Chapter 5 and Chapter 6 contain instructions on how to program NFC in reader/writer mode, along with some examples. You should follow these instructions in sequence, in order to prevent overlooking important details.
HOW THIS BOOK IS STRUCTURED
This book is structured in a top-down fashion. The chapters are isolated from each other, so that readers who have enough knowledge on the topic can just skip that chapter. The chapters are not integrated with each other in any way. The only exception is that dual chapters are created for the reader/ writer (Chapter 5 and Chapter 6) and peer-to-peer (Chapter 7 and Chapter 8) operating modes — the earlier chapter explains how to program using the related mode, and the later one provides examples of that mode. Hence, the reader who does not have a complete understanding of programming using the related mode should read both chapters, while the reader who is confi dent about the programming of that mode can skip the earlier chapter and browse the later one containing the examples.