Muutke küpsiste eelistusi

Designing Enterprise Applications with the J2EE Platform 2nd edition [Pehme köide]

  • Formaat: Paperback / softback, 448 pages, kõrgus x laius x paksus: 187x234x28 mm, kaal: 812 g
  • Ilmumisaeg: 05-Apr-2002
  • Kirjastus: Addison Wesley
  • ISBN-10: 0201787903
  • ISBN-13: 9780201787900
Teised raamatud teemal:
  • Pehme köide
  • Hind: 59,94 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 448 pages, kõrgus x laius x paksus: 187x234x28 mm, kaal: 812 g
  • Ilmumisaeg: 05-Apr-2002
  • Kirjastus: Addison Wesley
  • ISBN-10: 0201787903
  • ISBN-13: 9780201787900
Teised raamatud teemal:
Sun's own J2EE architects and enterprise development consultants have written the definitive guide to developing complete enterprise solutions with Java 2 Enterprise Edition, Version 1.3. This new edition fully reflects Sun's latest Version 1.3 technologies and enhancements, and covers every component of a complete enterprise solution: client-side, middleware, and back-end. The authors begin by introducing the J2EE Version 1.3 platform, reviewing several scenarios for using it to build Internet and intranet applications, and offering detailed introductions to each key J2EE technology. Using both code snippets and a complete, start-to-finish case study, they walk through the construction of Web-based clients based on Java Servlets and Java ServerPages (JSP), middle-tier solutions utilizing Enterprise JavaBeans, and backend connections based on JDBC technology. Coverage also includes: packaging and deploying J2EE applications; automatic and programmatic techniques for managing transactions; and leveraging J2EE's robust security features. For all software developers, architects, and IT managers working with Java 2 Enterprise Edition or providing J2EE-based products.

Muu info

Sun's own J2EE architects and enterprise development consultants have written the definitive guide to developing complete enterprise solutions with Java 2 Enterprise Edition, Version 1.3. This new edition fully reflects Sun's latest Version 1.3 technologies and enhancements, and covers every component of a complete enterprise solution: client-side, middleware, and back-end. The authors begin by introducing the J2EE Version 1.3 platform, reviewing several scenarios for using it to build Internet and intranet applications, and offering detailed introductions to each key J2EE technology. Using both code snippets and a complete, start-to-finish case study, they walk through the construction of Web-based clients based on Java Servlets and Java ServerPages (JSP), middle-tier solutions utilizing Enterprise JavaBeans, and backend connections based on JDBC technology. Coverage also includes: packaging and deploying J2EE applications; automatic and programmatic techniques for managing transactions; and leveraging J2EE's robust security features. For all software developers, architects, and IT managers working with Java 2 Enterprise Edition or providing J2EE-based products.
Foreword xiii
Preface xv
About the Authors xix
Introduction
1(24)
Challenges of Enterprise Application Development
2(3)
Programming Productivity
3(1)
Integration with Existing Systems
4(1)
Freedom of Choice
4(1)
Response to Demand
4(1)
Maintaining Security
5(1)
The Platform for Enterprise Solutions
5(9)
J2EE Platform Overview
6(4)
J2EE Platform Benefits
10(4)
J2EE Application Scenarios
14(7)
Multitier Application Scenario
16(2)
Stand-Alone Client Scenario
18(1)
Web-Centric Application Scenario
19(1)
Business-to-Business Scenario
20(1)
How This Book Is Organized
21(1)
Summary
22(1)
References and Resources
23(2)
J2EE Platform Technologies
25(26)
Component Technologies
25(7)
Types of J2EE Clients
26(1)
Web Components
27(1)
Enterprise JavaBeans Components
28(3)
Components, Containers, and Services
31(1)
Platform Roles
32(3)
J2EE Product Provider
33(1)
Application Component Provider
33(1)
Application Assembler
34(1)
Deployer
34(1)
System Administrator
34(1)
Tool Provider
34(1)
Platform Services
35(7)
Naming Services
35(1)
Deployment Services
36(1)
Transaction Services
37(3)
Security Services
40(2)
Service Technologies
42(3)
JDBC API
42(1)
Java Transaction API and Service
43(1)
Java Naming and Directory Interface
43(1)
J2EE Connector Architecture
43(1)
Java API for XML Processing Technology
44(1)
Communication Technologies
45(5)
Internet Protocols
45(1)
Remote Method Invocation Protocols
46(1)
Object Management Group Protocols
46(1)
Messaging Technologies
47(2)
Data Formats
49(1)
Summary
50(1)
References and Resources
50(1)
The Client Tier
51(24)
Client Considerations
51(3)
Network Considerations
52(1)
Security Considerations
52(1)
Platform Considerations
53(1)
General Design Issues and Guidelines
54(1)
Design Issues and Guidelines for Browser Clients
54(6)
Presenting the User Interface
55(1)
Validating User Inputs
56(2)
Communicating with the Server
58(1)
Managing Conversational State
59(1)
Design Issues and Guidelines for Java Clients
60(12)
Presenting the User Interface
61(3)
Validating User Inputs
64(1)
Communicating with the Server
65(4)
Managing Conversational State
69(3)
Summary
72(1)
References and Resources
73(2)
The Web Tier
75(54)
The Purpose of the Web Tier
75(1)
Web-Tier Technologies
76(15)
Traditional Web-Tier Technologies
76(2)
Web-Tier Technologies in the J2EE Platform
78(1)
The Web Container
78(1)
Java Servlets
79(1)
JavaServer Pages (JSP) Technology
80(2)
Web-Tier Technology Guidelines
82(9)
Web-Tier Application Structure
91(3)
Web-Tier Application Framework Design
94(32)
Structuring the Web Tier
96(2)
Web-Tier MVC Controller Design
98(12)
Web-Tier MVC View Design
110(3)
Web-Tier MVC Model Design
113(1)
Web Application Frameworks
114(1)
Separating Business Logic from Presentation
115(1)
Web-Tier State
116(7)
Distributable Web Applications
123(3)
Summary
126(1)
References and Resources
127(2)
The Enterprise JavaBeans Tier
129(42)
Business Logic and Business Objects
130(4)
Common Requirements of Business Objects
131(3)
Enterprise Beans as J2EE Business Objects
134(6)
Enterprise Beans and EJB Containers
136(4)
Remote and Local Client Views
140(2)
Guidelines for Using Local or Remote Client Views
141(1)
Entity Beans and Local Client Views
142(1)
Entity Beans
142(7)
Guidelines for Using Entity Beans
143(1)
Entity Bean Persistence
144(5)
When to Use Bean-Managed Persistence
149(1)
Session Beans
149(4)
Stateful Session Beans
150(1)
Stateless Session Beans
151(2)
Message-Driven Beans
153(3)
Uses of Message-Driven Beans
154(1)
Example: Invoice Message-Driven Bean
155(1)
Design Guidelines
156(8)
Remote versus Local Client Access for Entity Beans
157(1)
Session Beans as a Facade to Entity Beans
157(1)
Fine-Grained versus Coarse-Grained Object Access
158(2)
Master-Detail Modeling Using Enterprise Beans
160(1)
Data Access Objects
160(3)
Implementing an Entity Bean without a Create Method
163(1)
Representing References to Entity Beans
163(1)
Portability Guidelines
164(4)
Typecast Remote References
165(1)
Mark Non-Serializable Fields Transient
165(1)
Bean-Managed Persistence and Portability
166(2)
Summary
168(2)
References and Resources
170(1)
Integrating with the Enterprise Information System Tier
171(30)
Integration Scenarios
172(4)
An Internet E-Store Application
172(2)
An Intranet Human Resources Application
174(1)
A Distributed Purchasing Application
174(2)
An Order Fulfillment Application
176(1)
J2EE Integration Technologies
176(5)
J2EE Connector Architecture
177(2)
Java Message Service API
179(1)
JDBC and RDBMS Access
180(1)
Application Integration Design Approaches
181(5)
Synchronous Integration
182(1)
Asynchronous Integration
183(2)
Comparing Approaches
185(1)
Data Integration
185(1)
Developing an Integration Layer
186(13)
Programming Access to Data and Functions
187(1)
Using Tools for EIS Integration
187(1)
Developing EIS Access Objects
188(5)
Guidelines for Connection Management
193(3)
Security Guidelines
196(3)
Summary
199(1)
References and Resources
200(1)
Packaging and Deployment
201(50)
Packaging Components
201(2)
Roles and Tasks
203(4)
Application Component Provider Tasks
204(2)
Application Assembler Tasks
206(1)
Deployer Tasks
206(1)
Packaging J2EE Application
207(16)
EJB Modules
210(1)
EJB Module Packaging Guidelines
210(4)
Web Modules
214(1)
Packaging Components into Web Modules
215(7)
Application Client Modules
222(1)
Resource Adapter Modules
222(1)
Deployment Descriptors
223(19)
J2EE Naming Environment
223(2)
Specifying Deployment Descriptor Elements
225(14)
Naming Convention Recommendations
239(3)
Deployment Tools
242(7)
Deployment Tool Actions
242(2)
Deployment Tool Requirements
244(5)
Summary
249(1)
References and Resources
250(1)
Transaction Management
251(28)
Transactional Concepts
251(5)
ACID Transaction Properties
252(1)
Transaction Participants
253(1)
Transaction Demarcation
253(1)
Distributed Transactions
253(2)
Two-Phase Commit Protocol
255(1)
J2EE Platform Transactions
256(3)
Accessing Multiple Resources within a Transaction
256(2)
Transactions across Servers
258(1)
J2EE Transaction Technologies
259(1)
Client Tier Transactions
260(1)
Web Tier Transaction Guidelines
261(1)
Enterprise JavaBeans Tier Transactions
262(6)
Bean-Managed Transaction Demarcation
263(1)
Container-Managed Transaction Demarcation
264(1)
Transaction Attributes
264(2)
Enterprise JavaBeans Tier Transaction Guidelines
266(2)
EIS Tier Transactions
268(5)
JTA Transactions
268(1)
Resource Manager Local Transactions
269(1)
EIS Tier Transaction Guidelines
269(1)
Compensating Transactions
269(3)
Isolation Level
272(1)
Performance with Multiple Resource Managers
273(1)
J2EE Resource Manager Types
273(3)
JDBC Databases
273(1)
JMS Providers
274(1)
J2EE Connector Architecture
274(2)
Summary
276(1)
References and Resources
277(2)
Security
279(32)
Security Threats and Mechanisms
279(1)
Authentication
280(13)
Protection Domains
281(3)
Authentication Mechanisms
284(8)
Authentication Call Patterns
292(1)
Exposing Authentication Boundaries with References
293(1)
Authorization
293(11)
Declarative Authorization
294(1)
Programmatic Authorization
295(1)
Declarative Versus Programmatic Authorization
296(1)
Isolation
296(1)
Affects of Identity Selection
297(1)
Encapsulation for Access Control
297(1)
Controlling Access to J2EE Resources
298(4)
Example
302(2)
Protecting Messages
304(3)
Integrity Mechanisms
304(1)
Confidentiality Mechanisms
305(1)
Identifying Sensitive Components
305(1)
Ensuring Confidentiality of Web Resources
306(1)
Auditing
307(1)
Summary
308(1)
References and Resources
309(2)
J2EE Internationalization and Localization
311(36)
Internationalization Concepts and Terminology
312(4)
Internationalization, Localization, and Locale
312(1)
Character Sets
313(1)
Encodings
314(2)
Using J2SE Internationalization APLs in J2EE Applications
316(5)
Resource Bundles
316(3)
Message Formatting
319(1)
Date Formatting
320(1)
Collation
320(1)
Web Tier Internationalization
321(11)
Tracking Locales and Encodings
321(4)
Presentation Component Design
325(2)
Internationalizing and Localizing JSP Pages
327(5)
EIS Tier Internationalization
332(4)
Persistent Localized Data
332(2)
Internationalizing Database Schema
334(2)
Internationalized Application Design
336(1)
Internationalizing Applications with XML
337(4)
Generating Localized Dynamic Content with XSLT
337(1)
Communicating Locale within an Application
338(1)
Communicating Locale among Applications
338(3)
Localizing Error and Logging Messages
341(4)
Client Messages and Application Exceptions
341(3)
System Exceptions and Message Logging
344(1)
Summary
345(1)
References and Resources
345(2)
Architecture of the Sample Application
347(38)
J2EE Architecture Approaches
348(4)
Model-View-Controller Architecture
348(2)
J2EE Design Patterns
350(2)
Sample Application Overview
352(1)
Designing the Sample Application
353(6)
Choosing Application Tiers
355(2)
Choosing Local or Distributed Architecture
357(2)
Architecture of the Sample Application
359(23)
Application Web Site Architecture
360(15)
Fulfillment Center Architecture
375(7)
Summary
382(1)
References and Resources
383(2)
Afterword 385(2)
Glossary 387(18)
Index 405


Inderjeet Singh is lead architect on the Java BluePrints Team, where he works with other architects and engineers to define best uses of Java technologies for application design. Beth Stearns is the principal partner of ComputerEase Publishing, a computer consulting firm she founded in 1982. Among her publications are Java Native Interface in The Java Tutorial Continued (Addison-Wesley), The EJB Programming Guide for Inprise Corporation, and Understanding EDT, a guide to Digital Equipment Corporation's text editor.

Mark Johnson is an enterprise computing consultant and author.

0201787903AB09232002