Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Building Web Applications in WebLogic
Table 1.1: Information Available in the HttpServletRequest
Table 1.2: JSP Syntax Elements
Table 1.3: JSP Implicit Objects
Table 1.4: Custom Tag Sources
Chapter 4: Building an Example Web Application
Table 4.1: Core Reservation Process Primary Components
Table 4.2: Property Maintenance Primary Components
Chapter 5: Packaging and Deploying WebLogic Web Applications
Table 5.1: Sections of the web.xml Descriptor File
Table 5.2: Sections of the weblogic.xml Descriptor File
Table 5.3: Redeployment Behavior Depends on Production Mode and Application Location
Chapter 6: Building Enterprise JavaBeans in WebLogic Server
Table 6.2: A Comparison of Select Methods and Finder Methods
Table 6.3: Exclusive Concurrency Example
Table 6.4: Database Concurrency Example
Table 6.5: Optimistic Concurrency Example
Table 6.6: Caching-between-Transactions
Table 6.7: Finder Behavior for Cached Read-Only Beans
Table 6.8: Finder Behavior for Cached Beans Using Cache between Transactions
Chapter 7: Building an Example EJB Application
Table 7.1: Summary of Business-Tier Requirements
Table 7.2: Stateless Service JDBC Architecture Requirements Analysis
Table 7.3: Stateless Service Entity Bean Architecture Requirements Analysis
Table 7.4: Combined Architecture Requirements Analysis
Table 7.5: Required Files for Simple EJB Application
Chapter 8: Packaging and Deploying WebLogic EJB Applications
Table 8.1: Sections of the application.xml Descriptor File
Table 8.2: Sections of the weblogic-application.xml Descriptor File
Chapter 10: Using WebLogic Security
Table 10.1: Embedded LDAP Server Directory Structure and Usage
Table 10.2: Security Provider Types and Features
Table 10.3: Required SSL Configuration Data
Table 10.4: Default Roles and Groups
Table 10.5: Default Policy
Chapter 11: Administering and Deploying Applications in WebLogic Server
Table 11.1: Example Admin Server Configuration Wizard Values
Table 11.2: Managed Servers External Listen Address Attribute Values
Table 11.3: CSA Network Channel Configuration Parameter Values
Table 11.4: BigRezPool Connection Pool Configuration Parameters
Table 11.5: JMS JDBC-Based Store Connection Pool Configuration Parameters
Table 11.6: Server1s JDBC-Based JMS Store Configuration Parameters
Table 11.7: Distributed Destination Threshold and Quotas Configuration Parameters
Table 11.8: JMS Connection Factory Configuration Parameters
Table 11.9: BigRezPool Targets Attribute Change Trap Configuration Parameters
Table 11.10: BigRezDataSource Deployment Log Filter Trap Configuration Parameters
Chapter 12: Optimizing WebLogic Server Performance
Table 12.1: Guidelines for Adjusting Execute Queue Thread Count
Previous page
Table of content
Next page
Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
ISBN: 047128128X
EAN: 2147483647
Year: 2003
Pages: 125
Authors:
Gregory Nyberg
,
Robert Patrick
,
Paul Bauerschmidt
,
Jeff McDaniel
,
Raja Mukherjee
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Looping Commands
Number Crunching Mathematical and Relational Operators and Commands
Basic Graphics Commands
Playing Some Tunes CD Audio, MIDI and MP3 Music
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.4 How to Generate a Key Using PuTTY
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 5.1 General Troubleshooting
Appendix - Sample sshd_config File
C++ GUI Programming with Qt 3
Getting Started
Customizing Qt Widgets
Scroll Views
Reimplementing Event Handlers
Drag and Drop
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 5. Connect Windows XP with a Bluetooth Phone
Hack 6. Use Your Treo as a Modem
Hack 41. Visualize a Network
Hack 43. Control Wireless Access by MAC
Hack 70. Pebble
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Deployment Scenarios
Troubleshooting AAA
Architectural Overview
Optional Commands
System Monitoring
Digital Character Animation 3 (No. 3)
Chapter Four. Basics of Animation
Understanding Motion
Acting Technique
Acting and the Body
Other Techniques
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies