Flylib.com
Professional Java Servlets 2.3
Professional Java Servlets 2.3
ISBN: 186100561X
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
Andrew Harbourne-Thomas
,
Sam Dalton
,
Simon Brown
,
Bjarki Holm
,
Tony Loton
,
Meeraj Kunnumpurath
,
Subrahmanyam Allamaraju
,
John Bell
,
Sing Li
BUY ON AMAZON
Table of Contents
BackCover
Professional Java Servlets 2.3
Introduction
What s Covered in this Book
What You Need to Use this Book
Conventions
Customer Support and Feedback
Chapter 1: Servlets in the Enterprise
Enterprise Architecture
The J2EE Container Architecture
J2EE Web Components
Using Servlets with Other J2EE APIs
Servlet Roles in Web Applications
Summary
Chapter 2: The Servlet 2.3 API
The javax.servlet Package
The Servlet Interface
The GenericServlet Class
The Request-Response Cycle
Input and Output Streams
Servlet-Container Communication
Additional Interfaces
Servlet Exception Classes
Personal Portal Web Application
Summary
Chapter 3: HTTP Servlets
Application Layer Protocols
Hypertext Transfer Protocol
HTTP and Servlets
Implementing HTTP Servlets
Servlets and Custom Clients
Summary
Chapter 4: Deploying Web Applications
What is a Web Application?
The Structure of a Web Application
The ServletContext
Lifecycle of a Web Application
The Deployment Descriptor
Deploying a Sample Web Application
Advanced Deployment Issues
Chapter 5: Session Handling
The Stateless Nature of HTTP
Why Track Client Identity and State?
How do we Maintain Sessions?
Session Management Using the Servlet API
Summary
Chapter 6: Servlet Persistence and Resources
Persistent Resources
Servlet Initialization and Configuration
Resource Binding with JNDI
Data Source Binding
Accessing Persistent Resources
Servlet Persistence
Summary
Chapter 7: Filters
What is a Filter?
Understanding Filters
Configuring Filters
Using Filters
Chaining Filters
Summary
Chapter 8: JavaServer Pages
JSP Fundamentals
JSP Scripting Elements
JSP Implicit Objects
Directives
JSP Actions
Using Servlets and JSP Together
Summary
Chapter 9: Security and Container Authentication
The Java 2 Security Model on the Server
Secure Socket Layer
Servlet 2.3 Security
Using Declarative Security
Programmatic Security
Summary
Chapter 10: Servlet Debugging Techniques
Servlet Debugging Issues
Debugging Techniques
Debugging with Filters
Debugging with Event Listeners
Debugging with the JPDA
Visualizing the Debug Trace
Choosing a Debugging Technique
Logging Enhancements in J2SE 1.4
Runtime Reverse Engineering with UML
Summary
Chapter 11: Class Loading and Synchronization
Class Loading
Class Loading in the Servlet Container
The Effect of Class Loading on Application Logic
Servlet Loading and Reloading
Threading and Synchronization
Summary
Chapter 12: Designing Web Applications and Servlet Patterns
Why is Good Application Design Important?
J2EE Web Application Design
Documenting Design Principals
Creating a Web-Based Discussion Forum
Building the Forum Using Model 1 Architecture
Refactoring Applications
Building the Forum Using Model 2 Architecture
Summary
Chapter 13: Performance and Scalability
Good Coding Practice
Architectural Considerations
Analysis Tools
A Custom Performance Monitoring Tool
Summary
Chapter 14: Web Services and Servlet Agents
Web Services
Using Web Services
Apache SOAP
Servlet Agents
Aggregation and Conglomeration
Present and Future Challenges
Transactions and Web Services
Summary
Appendix A: Installing Tomcat 4.0
Appendix B: HTTP Reference
HTTP Versions
HTTP Transactions
Mime Types
Status Codes
Further Information
Appendix C: Servlet 2.3 API Reference
javax.servlet
javax.servlet.http
Professional Java Servlets 2.3
ISBN: 186100561X
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
Andrew Harbourne-Thomas
,
Sam Dalton
,
Simon Brown
,
Bjarki Holm
,
Tony Loton
,
Meeraj Kunnumpurath
,
Subrahmanyam Allamaraju
,
John Bell
,
Sing Li
BUY ON AMAZON
MySQL Stored Procedure Programming
Conclusion
Using MySQL Stored Programs with .NET
Tuning Stored Programs and Their SQL
Best Practices in MySQL Stored Program Development
Dynamic SQL
C++ How to Program (5th Edition)
Exercises
(Optional) Software Engineering Case Study: Incorporating Inheritance into the ATM System
Introduction
STL Internet and Web Resources
G.8. Class BankDatabase
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 21. Broadcast Your GPS Position
Hack 38. Graph Your Wireless Performance
Hack 61. Unwire Your Pistol Mouse
Hack 77. Manage Multiple AirPort Base Stations
Hacks 94100: Introduction
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Troubleshooting Structured Wiring
Computer Network Basics
Troubleshooting and Maintaining Lighting Control Systems
Troubleshooting and Maintaining a Home Security System
Appendix B Home Technology Integration Glossary
Extending and Embedding PHP
Returning Values
Summary
Implementing a Wrapper
ext_skel
PECL_Gen
Comparing, Designing, and Deploying VPNs
Implementing QoS for MPLS Layer 3 VPNs
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Summary
Understanding IPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies