Flylib.com
Professional Java Servlets 2.3
Professional Java Servlets 2.3
ISBN: 186100561X
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
Andrew Harbourne-Thomas
,
Sam Dalton
,
Simon Brown
,
Bjarki Holm
,
Tony Loton
,
Meeraj Kunnumpurath
,
Subrahmanyam Allamaraju
,
John Bell
,
Sing Li
BUY ON AMAZON
Table of Contents
BackCover
Professional Java Servlets 2.3
Introduction
What s Covered in this Book
What You Need to Use this Book
Conventions
Customer Support and Feedback
Chapter 1: Servlets in the Enterprise
Enterprise Architecture
The J2EE Container Architecture
J2EE Web Components
Using Servlets with Other J2EE APIs
Servlet Roles in Web Applications
Summary
Chapter 2: The Servlet 2.3 API
The javax.servlet Package
The Servlet Interface
The GenericServlet Class
The Request-Response Cycle
Input and Output Streams
Servlet-Container Communication
Additional Interfaces
Servlet Exception Classes
Personal Portal Web Application
Summary
Chapter 3: HTTP Servlets
Application Layer Protocols
Hypertext Transfer Protocol
HTTP and Servlets
Implementing HTTP Servlets
Servlets and Custom Clients
Summary
Chapter 4: Deploying Web Applications
What is a Web Application?
The Structure of a Web Application
The ServletContext
Lifecycle of a Web Application
The Deployment Descriptor
Deploying a Sample Web Application
Advanced Deployment Issues
Chapter 5: Session Handling
The Stateless Nature of HTTP
Why Track Client Identity and State?
How do we Maintain Sessions?
Session Management Using the Servlet API
Summary
Chapter 6: Servlet Persistence and Resources
Persistent Resources
Servlet Initialization and Configuration
Resource Binding with JNDI
Data Source Binding
Accessing Persistent Resources
Servlet Persistence
Summary
Chapter 7: Filters
What is a Filter?
Understanding Filters
Configuring Filters
Using Filters
Chaining Filters
Summary
Chapter 8: JavaServer Pages
JSP Fundamentals
JSP Scripting Elements
JSP Implicit Objects
Directives
JSP Actions
Using Servlets and JSP Together
Summary
Chapter 9: Security and Container Authentication
The Java 2 Security Model on the Server
Secure Socket Layer
Servlet 2.3 Security
Using Declarative Security
Programmatic Security
Summary
Chapter 10: Servlet Debugging Techniques
Servlet Debugging Issues
Debugging Techniques
Debugging with Filters
Debugging with Event Listeners
Debugging with the JPDA
Visualizing the Debug Trace
Choosing a Debugging Technique
Logging Enhancements in J2SE 1.4
Runtime Reverse Engineering with UML
Summary
Chapter 11: Class Loading and Synchronization
Class Loading
Class Loading in the Servlet Container
The Effect of Class Loading on Application Logic
Servlet Loading and Reloading
Threading and Synchronization
Summary
Chapter 12: Designing Web Applications and Servlet Patterns
Why is Good Application Design Important?
J2EE Web Application Design
Documenting Design Principals
Creating a Web-Based Discussion Forum
Building the Forum Using Model 1 Architecture
Refactoring Applications
Building the Forum Using Model 2 Architecture
Summary
Chapter 13: Performance and Scalability
Good Coding Practice
Architectural Considerations
Analysis Tools
A Custom Performance Monitoring Tool
Summary
Chapter 14: Web Services and Servlet Agents
Web Services
Using Web Services
Apache SOAP
Servlet Agents
Aggregation and Conglomeration
Present and Future Challenges
Transactions and Web Services
Summary
Appendix A: Installing Tomcat 4.0
Appendix B: HTTP Reference
HTTP Versions
HTTP Transactions
Mime Types
Status Codes
Further Information
Appendix C: Servlet 2.3 API Reference
javax.servlet
javax.servlet.http
Professional Java Servlets 2.3
ISBN: 186100561X
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
Andrew Harbourne-Thomas
,
Sam Dalton
,
Simon Brown
,
Bjarki Holm
,
Tony Loton
,
Meeraj Kunnumpurath
,
Subrahmanyam Allamaraju
,
John Bell
,
Sing Li
BUY ON AMAZON
Oracle Developer Forms Techniques
Avoiding Confusion Between DO_KEY and the Corresponding KEY- Trigger
Summary
Deficiencies in Forms Error-Message Handling
Summary
Does Subclassing Exhibit Intelligence?
Twisted Network Programming Essentials
Adding Twisted Utilities to Your Path
Parsing HTTP Requests
Sending Mail Using SMTP
Posting a Message to an NNTP Server
Using NNTP as a User Interface
Sap Bw: a Step By Step Guide for Bw 2.0
Creating a Source System
Create an InfoPackage to Load Transaction Data
InfoCube Design
Creating an R/3 Source System
Creating Views in R/3
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Range Object
Properties Merged from OLEObject or OLEControl
Introduction to Words XML Features
How a COM Add-In Is Registered
The Pitfalls of MsCoree.dll
Comparing, Designing, and Deploying VPNs
Review Questions
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Defeating Virtual Private Databases
Running Operating System Commands
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies