Flylib.com
Applying Enterprise JavaBeans(TM): Component-Based Development for the J2EE(TM) Platform
Applying Enterprise JavaBeans(TM): Component-Based Development for the J2EE(TM) Platform
ISBN: 0201702673
EAN: 2147483647
Year: 2003
Pages: 110
Authors:
Vlada Matena
,
Beth Stearns
BUY ON AMAZON
Main Page
Table of content
Copyright
The Java Series
Foreword
Preface
Conventions Used in This Book
Other Sources of Information
Note about the Example Applications
Contents of the Book
Acknowledgments
Chapter 1. Advantages of the Enterprise JavaBeans Architecture
1.1 From a Two-Tier to a J2EE Architecture
1.2 Advantages of the Architecture
1.3 Conclusion
Chapter 2. Enterprise JavaBeans Architecture Overview
2.1 Enterprise JavaBeans Applications
2.2 Business Entities and Processes, and Enterprise Bean Types
2.3 Structure of Enterprise Beans
2.4 Container Tools and Services
2.5 Conclusion
Chapter 3. Enterprise JavaBeans Roles
3.1 EJB Roles
3.2 Tools
3.3 Conclusion
Chapter 4. Working with Session Beans
4.1 When to Use Session Beans
4.2 Understanding the State of a Session Object
4.3 Overview of the Example Application
4.4 EnrollmentEJB Stateful Session Bean in Detail
4.5 PayrollEJB Stateless Session Bean
4.6 Database Schemas
4.7 Container-Provided Benefits
4.8 Conclusion
Chapter 5. Session Bean in Its Container
5.1 Container Artifacts
5.2 How the Container Manages Session Beans at Runtime
5.3 Conclusion
Chapter 6. Using Message-Driven Beans and Connectors
6.1 JMS and Communication Modes
6.2 Message-Driven Bean Concepts
6.3 Using a Message-Driven Bean in the Benefits Application
6.4 Using JMS and Connectors for Communication
6.5 Conclusion
Chapter 7. Understanding Entity Beans
7.1 Client View of an Entity Bean
7.2 Bean Developer View of an Entity Bean
7.3 Timer Service
7.4 Conclusion
Chapter 8. Entity Bean Application Example
8.1 Application Overview
8.2 Parts Developed by Wombat
8.3 Parts Developed at Star Enterprise
8.4 Conclusion
Chapter 9. Using Enterprise JavaBeans in Web Services
9.1 Introduction to Web Services
9.2 Developing a Web Service Using Stateless Session Beans
9.3 Stateless Session Bean Web Service Example
9.4 Accessing a Web Service from an Enterprise Bean
9.5 Document-Oriented Web Services
9.6 Conclusion
Chapter 10. Understanding Transactions
10.1 Declarative Transaction Demarcation
10.2 Programmatic Transaction Demarcation
10.3 Conclusion
Chapter 11. Managing Security
11.1 Responsibilities of the System Administrator
11.2 Responsibilities of the Container Provider
11.3 Application Provider s View of Security
11.4 Deployer s Responsibility
11.5 Conclusion
Appendix A. Code Samples
A.1 Session Bean Helper Classes
A.2 EnrollmentBean Source Code
A.3 PayrollEJB Session Bean Class
A.4 Entity Application EnrollmentBean Implementation
A.5 SelectionBean Implementation
A.6 PlanBean Implementation Class
A.7 EmployeeBeanBMP Class
A.8 PayrollBean Implementation Class Using Connectors
A.9 CCI Interface Classes
A.10 InsurancePlanAdminBean Class
A.11 InsurancePlanAdmin WSDL Description
A.12 ProvidencePlanBean Class
A.13 ProvidenceDoctorBean Class
A.14 Command Beans
Glossary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index V
Index W
Applying Enterprise JavaBeans(TM): Component-Based Development for the J2EE(TM) Platform
ISBN: 0201702673
EAN: 2147483647
Year: 2003
Pages: 110
Authors:
Vlada Matena
,
Beth Stearns
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
SSL and TLS
Appendix C Using the Bouncy Castle API for Elliptic Curve
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Schedule Risk
Identifying Project Resource Risk
Monitoring and Controlling Risky Projects
Closing Projects
SQL Hacks
Hack 29. Other Ways to COUNT
Hack 42. Present Data Graphically Using SVG
Hack 61. Set Security Based on Rows
Hack 91. Export and Import Table Definitions
Hack 94. Create Users and Administrators
Microsoft VBScript Professional Projects
Errors, Constants, and Variables
Project Case Study Desktop Customization and Deployment
Using Configuration Files to Control Script Execution
Project Case Study Creating a Centralized Report Management Station
Collecting Remote Summary Reports
FileMaker 8 Functions and Scripts Desk Reference
Exact()
GetAsBoolean()
NumToJText()
Administering FileMaker Server from the Command Line
Query Parameters for XML/XSLT URL Requests
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies