Flylib.com
Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
ISBN: 047128128X
EAN: 2147483647
Year: 2003
Pages: 125
Authors:
Gregory Nyberg
,
Robert Patrick
,
Paul Bauerschmidt
,
Jeff McDaniel
,
Raja Mukherjee
BUY ON AMAZON
Table of Contents
BackCover
Mastering BEA WebLogic Server - Best Practices for Building and Deploying J2EE Applications
Introduction
Organization of the Book
Who Should Read This Book
Tools You Will Need
Online Resources
Chapter 1: Building Web Applications in WebLogic
Web Application Best Practices
Chapter Review
Chapter 2: Choosing a Web Application Architecture
Architecture Key Concepts
Presentation-Tier Architecture Selection
Candidate Presentation-Tier Architectures
Chapter Review
Chapter 3: Designing an Example J2EE Application
Application Requirements
Business Domain Models
Presentation Requirements
Web Application Architecture
Presentation Approach
Business-Tier Interfaces
Chapter Review
Chapter 4: Building an Example Web Application
Overview of Application Components
Constructing the Application Skeleton
Constructing the User Site Components
Construction of Administration Site Components
Chapter Review
Chapter 5: Packaging and Deploying WebLogic Web Applications
Packaging Web Applications
Deploying Web Applications
Chapter Review
Chapter 6: Building Enterprise JavaBeans in WebLogic Server
EJB Technology Overview
EJB Component Types
WebLogic Server EJB Container
General WebLogic Server EJB Features
Session Bean Features
Entity Bean Features
Message-Driven Bean Features
Chapter Review
Chapter 7: Building an Example EJB Application
Business-Tier Requirements
Business-Tier Architecture Options
EJB Construction Options
Construction of Business-Tier Components
Chapter Review
Chapter 8: Packaging and Deploying WebLogic EJB Applications
Creating an EJB Archive File
Packaging Enterprise Applications
Deploying EJB Applications
Chapter Review
Chapter 9: Using WebLogic JMS
The WebLogic JMS Provider
WebLogic JMS Application Design
WebLogic JMS Programming
External JMS Providers
Chapter Review
Chapter 10: Using WebLogic Security
WebLogic Security Overview
WebLogic Security Framework
Using External Security Stores
Setting Up SSLTLS
Writing Security-Aware Java Clients
Managing Application Security
Chapter Review
Chapter 11: Administering and Deploying Applications in WebLogic Server
WebLogic Administration Key Concepts
Configuring a WebLogic Server Domain
Monitoring WebLogic Server Applications
Managing WebLogic Server Applications
Chapter Review
Chapter 12: Optimizing WebLogic Server Performance
Overview of System Performance
Performance Best Practices
Troubleshooting Performance Problems
Chapter Review
Chapter 13: Development Environment Best Practices
Defining Required Hardware and Software
Installing WebLogic Server Software
Configuring the Working Directory
Managing Configuration Information
Establishing a Build Process
Choosing Development Tools
Creating a Unit-Testing Infrastructure
Chapter Review
Chapter 14: Production Environment Best Practices
Deployment Strategies
Global and Local Traffic Management
Production Security Strategies
Chapter Review
Chapter 15: Developing and Deploying Web Services
Creating Web Services with WebLogic Server
Moving Past the Basics
Adding Web Services to bigrez.com
Chapter Review
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
List of Listings
Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
ISBN: 047128128X
EAN: 2147483647
Year: 2003
Pages: 125
Authors:
Gregory Nyberg
,
Robert Patrick
,
Paul Bauerschmidt
,
Jeff McDaniel
,
Raja Mukherjee
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.1 Authentication with Public Keys
Step 4.6 How to use PuTTY Passphrase Agents
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Appendix - Sample sshd_config File
Software Configuration Management
Configuration Identification
Appendix A Project Plan
Appendix C Sample Data Dictionary
Appendix G Sample Inspection Plan
Appendix U Acronyms and Glossary
Network Security Architectures
Attacker Types
Host Operating Systems
Network Design Refresher
What Is the Campus?
Medium Network Campus Security Design
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Microsoft WSH and VBScript Programming for the Absolute Beginner
Constants, Variables, and Arrays
Processing Collections of Data
Using Procedures to Organize Scripts
Appendix A WSH Administrative Scripting
Appendix C Whats on the CD-ROM?
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Setting Up a Drawing
Using Layers to Organize Your Drawing
Dimensioning a Drawing
Printing an AutoCAD Drawing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies