Flylib.com
Professional Java Servlets 2.3
Professional Java Servlets 2.3
ISBN: 186100561X
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
Andrew Harbourne-Thomas
,
Sam Dalton
,
Simon Brown
,
Bjarki Holm
,
Tony Loton
,
Meeraj Kunnumpurath
,
Subrahmanyam Allamaraju
,
John Bell
,
Sing Li
BUY ON AMAZON
Table of Contents
BackCover
Professional Java Servlets 2.3
Introduction
What s Covered in this Book
What You Need to Use this Book
Conventions
Customer Support and Feedback
Chapter 1: Servlets in the Enterprise
Enterprise Architecture
The J2EE Container Architecture
J2EE Web Components
Using Servlets with Other J2EE APIs
Servlet Roles in Web Applications
Summary
Chapter 2: The Servlet 2.3 API
The javax.servlet Package
The Servlet Interface
The GenericServlet Class
The Request-Response Cycle
Input and Output Streams
Servlet-Container Communication
Additional Interfaces
Servlet Exception Classes
Personal Portal Web Application
Summary
Chapter 3: HTTP Servlets
Application Layer Protocols
Hypertext Transfer Protocol
HTTP and Servlets
Implementing HTTP Servlets
Servlets and Custom Clients
Summary
Chapter 4: Deploying Web Applications
What is a Web Application?
The Structure of a Web Application
The ServletContext
Lifecycle of a Web Application
The Deployment Descriptor
Deploying a Sample Web Application
Advanced Deployment Issues
Chapter 5: Session Handling
The Stateless Nature of HTTP
Why Track Client Identity and State?
How do we Maintain Sessions?
Session Management Using the Servlet API
Summary
Chapter 6: Servlet Persistence and Resources
Persistent Resources
Servlet Initialization and Configuration
Resource Binding with JNDI
Data Source Binding
Accessing Persistent Resources
Servlet Persistence
Summary
Chapter 7: Filters
What is a Filter?
Understanding Filters
Configuring Filters
Using Filters
Chaining Filters
Summary
Chapter 8: JavaServer Pages
JSP Fundamentals
JSP Scripting Elements
JSP Implicit Objects
Directives
JSP Actions
Using Servlets and JSP Together
Summary
Chapter 9: Security and Container Authentication
The Java 2 Security Model on the Server
Secure Socket Layer
Servlet 2.3 Security
Using Declarative Security
Programmatic Security
Summary
Chapter 10: Servlet Debugging Techniques
Servlet Debugging Issues
Debugging Techniques
Debugging with Filters
Debugging with Event Listeners
Debugging with the JPDA
Visualizing the Debug Trace
Choosing a Debugging Technique
Logging Enhancements in J2SE 1.4
Runtime Reverse Engineering with UML
Summary
Chapter 11: Class Loading and Synchronization
Class Loading
Class Loading in the Servlet Container
The Effect of Class Loading on Application Logic
Servlet Loading and Reloading
Threading and Synchronization
Summary
Chapter 12: Designing Web Applications and Servlet Patterns
Why is Good Application Design Important?
J2EE Web Application Design
Documenting Design Principals
Creating a Web-Based Discussion Forum
Building the Forum Using Model 1 Architecture
Refactoring Applications
Building the Forum Using Model 2 Architecture
Summary
Chapter 13: Performance and Scalability
Good Coding Practice
Architectural Considerations
Analysis Tools
A Custom Performance Monitoring Tool
Summary
Chapter 14: Web Services and Servlet Agents
Web Services
Using Web Services
Apache SOAP
Servlet Agents
Aggregation and Conglomeration
Present and Future Challenges
Transactions and Web Services
Summary
Appendix A: Installing Tomcat 4.0
Appendix B: HTTP Reference
HTTP Versions
HTTP Transactions
Mime Types
Status Codes
Further Information
Appendix C: Servlet 2.3 API Reference
javax.servlet
javax.servlet.http
Professional Java Servlets 2.3
ISBN: 186100561X
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
Andrew Harbourne-Thomas
,
Sam Dalton
,
Simon Brown
,
Bjarki Holm
,
Tony Loton
,
Meeraj Kunnumpurath
,
Subrahmanyam Allamaraju
,
John Bell
,
Sing Li
BUY ON AMAZON
Beginning Cryptography with Java
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Resource Risk
Quantifying and Analyzing Activity Risks
Managing Project Risk
Closing Projects
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Access Control
Operations Security
Understanding Certification and Accreditation
Initiation of the System Authorization Process
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
The Development of E-tail Logistics
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
GO! with Microsoft Office 2003 Brief (2nd Edition)
Project 4A. Garden Newsletter
Objective 8. Prepare a Worksheet for Printing
Objective 5. Add Records to a Table
Problem Solving Assessments
Getting Started with PowerPoint 2003
MPLS Configuration on Cisco IOS Software
Implementing Route-Reflectors in MPLS VPN Networks
Carrier Supporting Carriers
Command Reference
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
Case Study 6: Implementing Class-Based Tunnel Selection with MPLS Traffic Engineering
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies