Flylib.com
Javaв„ў and JMX: Building Manageable Systems
Javaв„ў and JMX: Building Manageable Systems
ISBN: 0672324083
EAN: 2147483647
Year: 2000
Pages: 115
Authors:
Heather Kreger
,
Ward Harold
,
Leigh Williamson
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Introduction
This Book s Intended Audience
What You Need to Know before Reading This Book
What You Will Learn from Reading This Book
Software Needed to Complete the Examples
How This Book Is Organized
Where to Download the Associated Code for This Book
Conventions Used in This Book
About the Cover
Acknowledgments
Part I: JMX Introduction
Chapter 1. Management Concepts
1.1 Progress of Management
1.2 Management Architectures
1.3 Management Technologies
1.4 Managing the Lifecycle
1.5 Management Disciplines
1.6 Managed Resource Responsibilities
1.7 Management Patterns
1.8 Management Applications
1.9 Summary
1.10 General References
Notes
Chapter 2. Introduction to JMX 1
2.1 Why We Need JMX
2.2 Which Applications Should Be Manageable?
2.3 The Goals of JMX
2.4 History
2.5 JMX Overview
2.6 Quick Tour of JMX
2.7 Summary
Notes
Part II: JMX Details
Chapter 3. All about MBeans
3.1 MBean Fundamentals
3.2 MBean Construction
3.3 Design Guidelines
3.4 Summary
Chapter 4. Model MBeans
4.1 Introduction
4.2 The ModelMBean Interface
4.3 Managed Resources
4.4 ModelMBeanInfo
4.5 Descriptors
4.6 Behavior of the Model MBean
4.7 XML Service: Priming ModelMBeanInfo from XML Files
4.8 Using Model MBeans
4.9 Common Mistakes with Model MBeans
4.10 Caveats
4.11 Summary
4.12 XML File Example
Notes
Chapter 5. The MBeanServer
5.1 The MBeanServerFactory Class
5.2 Object Naming
5.3 The MBeanServer Interface
5.4 The MBeanServerDelegate MBean
5.5 Finding MBeans
5.6 Notifications
5.7 Summary
Chapter 6. Monitors and Monitoring
6.1 The JMX Monitor Service
6.2 Concrete Monitors
6.3 Summary
Chapter 7. JMX Agent Services
7.1 Timer Service
7.2 Dynamic MBean Loading Service
7.3 Relation Service
7.4 JMX Connectors
7.5 Summary
Chapter 8. Securing JMX
8.1 JMX Security Exposures
8.2 Permission-Based Security Fundamentals
8.3 JMX Permissions
8.4 Using JMX Security
8.5 Summary
Chapter 9. Designing with JMX
9.1 MBeanServer Deployment Patterns
9.2 Instrumentation Patterns
9.3 MBean Registration and Lifecycle
9.4 Best Practices
9.5 Summary
Part III: Application of JMX
Chapter 10. J2EE and JMX
10.1 Java 2 Enterprise Edition
10.2 J2EE Management
10.3 Management Tool Access: The MEJB
10.4 J2EE Management Models
10.5 Standard Management Functions
10.6 Application-Specific Extensions
10.7 Areas Missing from J2EE Management
10.8 The Vision
10.9 Sample JSR 77 Code
10.10 Summary
Notes
Chapter 11. Web Services and JMX
11.1 Web Services Overview
11.2 Web Service Registry Management
11.3 Web Service Execution Environment Management
11.4 Web Service Management
11.5 Summary
11.6 Code Listings
Notes
JMX in Products
A.1 JMX Agent Implementations
A.2 JMX Managers
A.3 JMX-Enabled Products
Notes
Index
Javaв„ў and JMX: Building Manageable Systems
ISBN: 0672324083
EAN: 2147483647
Year: 2000
Pages: 115
Authors:
Heather Kreger
,
Ward Harold
,
Leigh Williamson
BUY ON AMAZON
MySQL Stored Procedure Programming
Using Non-SELECT SQL in Stored Programs
Numeric Functions
Conclusion
Tuning Anti-Joins Using Subqueries
Coding Style and Conventions
CISSP Exam Cram 2
Mastering the Inner Game
Answers to Exam Prep Questions
Computer System Architecture
Change Management
Computer Crimes
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Five Stimulating Interest
Chapter Nine Selling When You re Not First
Chapter Twelve Controlling the Buying Process
Chapter Thirteen Closing: Reaching Final Agreement
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Twisted Network Programming Essentials
Running an HTTP Proxy Server
Sharing Web Services with SOAP
Mail Servers
Using SMTP as a User Interface
Services, Processes, and Logging
Ruby Cookbook (Cookbooks (OReilly))
Making Sure a Sorted Array Stays Sorted
Extracting Portions of Arrays
Finding the Files You Want
Listing Methods Unique to an Object
Extracting Data from a Documents Tree Structure
802.11 Wireless Networks: The Definitive Guide, Second Edition
WEP Cryptographic Operations
Management Architecture
Gaussian Frequency Shift Keying (GFSK)
Windows Computer Authentication
Using Antennas to Tailor Coverage
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies