Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Nyberg G., Patrick R. — Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
Nyberg G., Patrick R. — Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications

Àâòîðû: Nyberg G., Patrick R.

Àííîòàöèÿ:

Written by developers affiliated with BEA Systems, this advanced book walks through the design, construction, and deployment of an example WebLogic server application, and suggests best practices for the administration, performance tuning, and configuration of WebLogic server environments. The construction of the example web-based reservation system involves a presentation tier containing servlets and Java server pages, Jakarta Struts, Enterprise JavaBeans, JMS messaging, and direct interaction with the business-tier components.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2003

Êîëè÷åñòâî ñòðàíèö: 743

Äîáàâëåíà â êàòàëîã: 20.08.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
Navigation, JSP view and action pages      57 59
Navigation, paths, core reservation process      97—99
Navigation, presentation tier      51—54
Network Address Translation      See NAT firewall
network appliances      543
Network, channels      474—475 487—488
Network, performance, optimizing      550—551
Network, traffic, managing      339—340 348 650—653
Node Manager      452 471—472 489—493
Normal behavior, finders-load-bean      233—234
NTRealm      414—415
OASIS (Organization for the Advancement of Structured Information Standards)      710
One-way security, SSL/TLS      416 420—421 429—431
Operating system, tuning      544—549
Operating system, WebLogic server domain, configuring      493
Optimistic concurrency strategy      212 219—223
Oracle 9i High-Performance Tuning with STATPACK (Burleson)      579
Oracle database      248—249 501—503
Order, messages      349—350 376
Organization for the Advancement of Structured Information Standards      See OASIS
Overrides, JMS (Java Message Service)      355—356 514
Packaging, enterprise applications, archive file (.ear files)      320—322
Packaging, enterprise applications, described      306—309
Packaging, enterprise applications, descriptor files      312—316
Packaging, enterprise applications, directory structure      309—311
Packaging, enterprise applications, exploded      318—320
Packaging, enterprise applications, utility archives      316—318
Packaging, Web applications, archive file      166—167
Packaging, Web applications, basic steps, listed and illustrated      147—148
Packaging, Web applications, descriptor files      151—160
Packaging, Web applications, directory structure      148—151
Packaging, Web applications, exploded application, creating      164—166
Packaging, Web applications, JSP components, precompiling      160—164
Page directive      10
Pages, attributes, JSP implicit object      11
Pages, display servlet      75—77
Pages, layout details      46
Pages, output caching      23—28
Pages, response caching (CacheFilter)      30—32
Pages, restricting access to specific      658
Pages, servlet filter, directing to certain      29
Paging stores      353—354
PAM (pluggable authentication modules)      413
Parentcascading deletes      253—255
Parentcascading deletes, mapping      262—263
Partitioning, mapping inheritance to database tables      266—267
Pass-by-reference, EJB (Enterprise JavaBean) containers      577—578
Password, connection pool      502
Password, message-level security      713
Password, setting      492
Password, SNMP community names      529
Password, WebLogic Server, booting      448—449
Performance, bottlenecks, identifying and correcting      584—586
Performance, connection-related parameters      562
Performance, current state of JVM threads      591—596
Performance, database access      578—583
Performance, degrading with high disk I/O      591
Performance, described      541—544
Performance, EJB containers      572—578
Performance, erratic response times and CPU utilization on application server      590—591
Performance, execute queues, application-specific      566—567
Performance, execute thread counts, tuning      563—566
Performance, high CPU utilization and poor application server throughput      588—589
Performance, in design      567—569
Performance, JavaServer Pages      571—572
Performance, JVM tuning      551—562
Performance, low activity and CPU utilizations      590
Performance, native I/O muxer      563
Performance, network tuning      550—551
Performance, operating system tuning      544—549
Performance, page output, caching to improve      23—28
Performance, preparing      584
Performance, resolution process      587—588
Performance, servlets      572
Performance, session-specific data, storing      569—571
Performance, slow response time from client and low database usage      590
Persistence, managed by EJB container, BMP, advantages over      194
Persistence, managed by EJB container, cascading deletes      253—255
Persistence, managed by EJB container, changes, handling      219—223
Persistence, managed by EJB container, database      238—240 249—250
Persistence, managed by EJB container, dynamic queries      252—253
Persistence, managed by EJB container, EJB home methods      198—199
Persistence, managed by EJB container, existence, checking for      255—256
Persistence, managed by EJB container, last name, finding people with same      233—234
Persistence, managed by EJB container, lazy retrieval, controlling using field groups      240—243
Persistence, managed by EJB container, methods required      182—185
Persistence, managed by EJB container, numeric primary key, automatically generating      247—249
Persistence, managed by EJB container, relationship caching with      244—246
Persistence, managed by EJB container, select methods      196—198
Persistence, managed by EJB container, SQL support      250—252
Persistence, managed by EJB container, stateless services and      275
Persistence, message queues      330
Persistence, session      7 462
Persistent stores      342 351—355
Person Tracker sample Web application architecture, choosing      56—60
Pettit, Richard (Sun Performance and Tuning: Java and the Internet)      542
Ping command      520 534
Plug-ins      462 494—499
Pluggable Authentication Modules      See PAM
Point-to-point messaging      330
Poison messages      372—375
Policies, application security      444—448
Pool, connection      4—5 501—505 537
Portable stubs      693—694
Ports, listen      453 460
Prepared statements, caching      580
Presentation, described      42
Presentation, display      43—46
Presentation, form update, business tier interaction to update model objects      50—51
Presentation, form update, client-side validation      47—48
Presentation, form update, data extraction      48—49
Presentation, form update, described      42 46—47
Presentation, form update, error display      49—50
Presentation, form update, server-side validation      49
Presentation, form update, warnings if left blank or inconsistent      47—48
Presentation, J2EE application example      68—77
Presentation, navigation requirements      51—54
Presentation, relationships in      84—85
Presentation, requirements, J2EE application example      65—68
Primary key, numeric      247—249
Printing      11 33—36
Private key      See SSL/TLS
Process dumps, generating      592—593
Process encapsulation      260—261
Production environment      650—654
Property, hotel reservation maintenance, availability      140—146
Property, hotel reservation maintenance, components, listed      131—132
Property, hotel reservation maintenance, main form      132—137
Property, hotel reservation maintenance, rate pages      138—140
Property, hotel reservation maintenance, search and selection pages      99—107
Public/private key technology      See SSL/TLS
Queries, data set size, limiting      579
Queries, EJB-QL returning arbitrary data types or bean references      196—198
Queries, n + 1 problem, loading entity beans      232—235
Queries, objects, mapping to relational database      263—264
Queries, string parameters, obtaining      5
Queue, consuming messages from      343—345
Queue, execute, administering and deploying WebLogic Server applications      453 454—458
Queue, execute, application-specific      455 566—567
Queue, execute, WebLogic server domain, configuring      516
Queue, message, defined      330
Queue, producing messages to      341—343
Quotas, JMS (Java Message Service) destination      356—359
Rajagopalan, Suresh (Java Servlet Programming Bible)      1
Rapid Development: Taming Wild Software Schedules (McConnell)      598
Rate pages, reservation application      138—140
Read-mostly entity bean      226—230
Read-only entity bean      218 225—226 234
Reading Java stack traces      594—595
RealmAdapter      402 410
Redelivery, poison messages      373—375
Redirect      658
References, entity bean      194—196
Relational database, mapping objects to      261—267
Relationship, caching with CMP      244—246
Relationship, mapping objects to relational database      264—265
Relationship, read-mostly pattern and      229—230
Remote debugging features      615—618
Remote EJB interfaces      206
remote method invocation      274
Remote Procedure Call      See RPC
Remote start, configuring      490—491
Replay wizards      609—610
Replica-aware stub      466—467
Replication      462 465 644—646
Request, data, accessing      5—6
Request, forwarding to individual methods (service() method)      2
Request, handling multiple in JSP      12
Request, JSP implicit object      10
Request, long-running, finding cause of      535
Request, message exchange with reply      379—382
Request, multiple parallel      3—4
Request, passing to new page      10
Reservation system, calendar      107—108
Reservation system, creation process      118—121
Reservation system, date selection, property reservation application      107—118
Reservation system, drop-down list, reservation form      101
Reservation system, information      92—97
Reservation system, navigation paths, core reservation process      97—99
Reservation system, property maintenance, availability      140—146
Reservation system, property maintenance, components, listed      131—132
Reservation system, property maintenance, main form      132—137
Reservation system, property maintenance, rate pages      138—140
Reservation system, property maintenance, search and selection pages      99—107
Reservation system, targeted offer      121—125
Resolution process      587—588
Response time, erratic      455 590—591
Response time, extended      584—586
Response, buffered, JSP      12—13
Response, caching at page level      30—32
Response, JMS request/reply style message exchange      379—382
Response, JSP implicit object      10
Results, managing with spreadsheet applications      33—36
Retry connections      498
RMI (Remote Method Invocation)      429—431 466—469
Role mapping and credential mapping      128 407
Role-based views      44—45
Roles      444—448
Roman, Ed (Mastering Enterprise JavaBeans)      177
Routing      339—340 462—464
RPC (Remote Procedure Call)      666
Scalability      542
scripting      8 9—10
Scriptlet      9 17—20
Search page, displaying with list of model objects      44
Secure Socket Layer/Transport Layer Security      See SSL/TLS
Security, application      434—443 443—449
Security, default providers, authentication      402—404
Security, default providers, authorization and adjudication of users      406
Security, default providers, configuration, managing      407—409
Security, default providers, events, logging      407
Security, default providers, identity asserters      404—405
Security, default providers, listed with features      400—401
Security, default providers, older version of WebLogic, running      410
Security, default providers, role mapping and credential mapping      407
Security, described      395—397
Security, external stores      410—416
Security, Java clients      425—434
Security, LDAP server, embedded      398—400
Security, production, application data flow      654—655
Security, production, connection filter      656—658
Security, production, firewall layouts      655—656
Security, production, SSL hardware acceleration      663
Security, production, Web applications      658—660
Security, SSL/TLS, client and server verify each other      416 421—425 430 431
Security, SSL/TLS, client verifying server      416 420—421 429—430 431
Security, SSL/TLS, debugging      425
Security, SSL/TLS, described      416—417
Security, SSL/TLS, X.509 certificates, obtaining      418—420
Security, views based on      44—45
Security, Web applications, accessauthorization/authentication administration      126—131
Security, Web applications, descriptor files      152 158
Security, Web applications, session ID cookies      659—660
Security, Web applications, users and groups      174—176
security, Web services      710—715
Select methods      196—198
Selectors, designing      367—369
Self-health monitoring      474
Sending later, messages      350—351
server      See also domain
Server affinity, JMS      342
Server, and client verify each other      416 421—425 430 431
Server, asynchronous JMS messages, consuming      384—389
Server, client verifying      416 420—421 429—431
Server, connections, verifying (PING command)      520
Server, deployment strategies      636—638
Server, forwards, accessJMS resources      509—511
Server, LDAP security      398—400
Server, migrating, WebLogic JMS provider      346—347
Server, precompiling JSP components, benefits of      160
Server, traffic, distributing among multiple      652—653
Server, validating forms      49
Server, WebLogic JMS provider      338
Servlet filter      28—32
Servlet, architecture based on, choosing      56 58—60 68
Servlet, code, viewing generated      36—37
Servlet, converting to JSP      8—9
Servlet, JMS      382—384
Servlet, page display      75—77
Servlet, servlet filter, directing to certain      29
Servlet, Web application      152 154—155
Servlet, WebLogic server performance, optimizing      572
session beans      111 207—211 293—294
Session fa?ade      260—261 568
Session ID, securing      659—660
Session, API, JMS 1.02b      332—333
Session, configuration      152 158
Session, data, storing      569—571
Session, JavaServer Pages, efficient use of      571
Session, JSP implicit object      11
Session, multicast JMS      378—379
Session, replication      462 644—645
Session, response data, cached      125
Session, routing based on      462—464
session, tracking      6—8 12
session, web services      696—697
SFSB (stateful session beans)      180—181
Shared secret credential      405
Shell interface      608—609
Shutdown, forcing WebLogic Server      471—472
Simple Network Management Protocol      See SNMP
Simple Object Access Protocol      See SOAP
Single-site deployment strategies, complex clusters      641—643
Single-site deployment strategies, described      638—639
Single-site deployment strategies, Simple WebLogic Server cluster      639—641
single-threaded servlets      4—5
Sites, distributing traffic among multiple      See global traffic management
Skeleton application, constructing      91—92
Skoczylas, Robert (Developing Java Web Services: Architecting and Developing Secure Web Services Using Java)      665
SLSB (stateless session beans)      178—179
SNMP (Simple Network Management Protocol)      529—533
SOAP (simple object access protocol)      666 702—708
Socket muxer      453 458—460 596
Socket, connections, managing      453 458—460 596
Socket, maximum number open      484
Socket, tuning      545
Software, required      598—601
Solaris operating system      413 545—547
Sorting messages      349—350 376
Sources, refusing traffic from unknown or untrusted      See connection filter
1 2 3 4 5
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå