Flylib.com
Javaв„ў and JMX: Building Manageable Systems
Javaв„ў and JMX: Building Manageable Systems
ISBN: 0672324083
EAN: 2147483647
Year: 2000
Pages: 115
Authors:
Heather Kreger
,
Ward Harold
,
Leigh Williamson
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Introduction
This Book s Intended Audience
What You Need to Know before Reading This Book
What You Will Learn from Reading This Book
Software Needed to Complete the Examples
How This Book Is Organized
Where to Download the Associated Code for This Book
Conventions Used in This Book
About the Cover
Acknowledgments
Part I: JMX Introduction
Chapter 1. Management Concepts
1.1 Progress of Management
1.2 Management Architectures
1.3 Management Technologies
1.4 Managing the Lifecycle
1.5 Management Disciplines
1.6 Managed Resource Responsibilities
1.7 Management Patterns
1.8 Management Applications
1.9 Summary
1.10 General References
Notes
Chapter 2. Introduction to JMX 1
2.1 Why We Need JMX
2.2 Which Applications Should Be Manageable?
2.3 The Goals of JMX
2.4 History
2.5 JMX Overview
2.6 Quick Tour of JMX
2.7 Summary
Notes
Part II: JMX Details
Chapter 3. All about MBeans
3.1 MBean Fundamentals
3.2 MBean Construction
3.3 Design Guidelines
3.4 Summary
Chapter 4. Model MBeans
4.1 Introduction
4.2 The ModelMBean Interface
4.3 Managed Resources
4.4 ModelMBeanInfo
4.5 Descriptors
4.6 Behavior of the Model MBean
4.7 XML Service: Priming ModelMBeanInfo from XML Files
4.8 Using Model MBeans
4.9 Common Mistakes with Model MBeans
4.10 Caveats
4.11 Summary
4.12 XML File Example
Notes
Chapter 5. The MBeanServer
5.1 The MBeanServerFactory Class
5.2 Object Naming
5.3 The MBeanServer Interface
5.4 The MBeanServerDelegate MBean
5.5 Finding MBeans
5.6 Notifications
5.7 Summary
Chapter 6. Monitors and Monitoring
6.1 The JMX Monitor Service
6.2 Concrete Monitors
6.3 Summary
Chapter 7. JMX Agent Services
7.1 Timer Service
7.2 Dynamic MBean Loading Service
7.3 Relation Service
7.4 JMX Connectors
7.5 Summary
Chapter 8. Securing JMX
8.1 JMX Security Exposures
8.2 Permission-Based Security Fundamentals
8.3 JMX Permissions
8.4 Using JMX Security
8.5 Summary
Chapter 9. Designing with JMX
9.1 MBeanServer Deployment Patterns
9.2 Instrumentation Patterns
9.3 MBean Registration and Lifecycle
9.4 Best Practices
9.5 Summary
Part III: Application of JMX
Chapter 10. J2EE and JMX
10.1 Java 2 Enterprise Edition
10.2 J2EE Management
10.3 Management Tool Access: The MEJB
10.4 J2EE Management Models
10.5 Standard Management Functions
10.6 Application-Specific Extensions
10.7 Areas Missing from J2EE Management
10.8 The Vision
10.9 Sample JSR 77 Code
10.10 Summary
Notes
Chapter 11. Web Services and JMX
11.1 Web Services Overview
11.2 Web Service Registry Management
11.3 Web Service Execution Environment Management
11.4 Web Service Management
11.5 Summary
11.6 Code Listings
Notes
JMX in Products
A.1 JMX Agent Implementations
A.2 JMX Managers
A.3 JMX-Enabled Products
Notes
Index
Javaв„ў and JMX: Building Manageable Systems
ISBN: 0672324083
EAN: 2147483647
Year: 2000
Pages: 115
Authors:
Heather Kreger
,
Ward Harold
,
Leigh Williamson
BUY ON AMAZON
Qshell for iSeries
Introduction to Qshell
The EDTF Text Editor
Using Parameters and Variables
The Exit Status and Decision-Making
Writing Programs for Qshell
Software Configuration Management
Configuration Status Accounting
A Practical Approach to Configuration Verification and Audit
Configuration Change Management
Appendix G Sample Inspection Plan
Appendix S Sample Maintenance Plan
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Basics and Creating Database Files
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Understanding SQL Transactions and Transaction Logs
Working with Functions, Parameters, and Data Types
Working with Stored Procedures
802.11 Wireless Networks: The Definitive Guide, Second Edition
Contention-Based Data Service
Power Management and the PCF
The Original Direct Sequence PHY
Security Definition and Analysis
11 Network Analysis
Comparing, Designing, and Deploying VPNs
Review Questions
L2TPv3 Pseudowire Operation
Summary
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Understanding IKE in an IPsec Remote Access VPN Environment
Python Programming for the Absolute Beginner, 3rd Edition
A Regression Test Script
User-Friendly Program Launchers
Listboxes and Scrollbars
Advanced GUI Coding Techniques
HTMLgen: Web Pages from Objects
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies