书籍详情
J2EE学习指南:Sun Certified Enterprise Architect for J2EE(Exam 310-051)
作者:PAUL R ALLEN
出版社:人民邮电出版社
出版时间:2003-08-01
ISBN:9787115113702
定价:¥75.00
购买这本书可以去
内容简介
本书集学术和实践于一体,是一本全面的系统分析和设计的经典教材!当今社会要求学生更加“面向客户型”,要“实践”所学的知识,而不仅仅是学习知识。作者在写作此书的过程中力求达到:1)平衡概念、工具。技术以及应用等各方面内容所占的比重;2)同其他书相比,提供更丰富的系统分析和设计的例子;3)平衡传统方法(如结构化分析和信息工程)和新方法(如面向对象分析和快速应用开发)内容所占的比重。JeffreyL.Whitten美国普度大学计算机技术系教授,现任普度大学信息技术部门的企业应用部副总裁。Whitten教授自1979年在普度大学计算机技术系任教以来.长期讲授系统分析和设计课程.曾两次荣获JamesG.Dwyer最佳教师奖。1984年升任教授后,开始编著《系统分析与设计方法》一书,目前已经出版到第5版。该书长期处于同类书销售排行榜第1名,被7多所学校采纳作为教材。whitten教授是多个学术组织的活跃成员.其中包括:信息技术专业学会(AITP)、信息系统学会(AIS)、计算机学会(ACM)。信息管理协会(SIM)。LonnieD.Bentley美国普度大学计算机技术系教授,主要教学和研究领域包括:系统分析和设计、企业应用系统、业务过程重构。计算机辅助软件工程(CASE),快速应用开发(RAD)和图形用户界面设计。KevinC.Dittman美国普度大学计算机技术系助理教授,主要教学和研究领域包括:系统分析和设计、计算机辅助软件工程(CASE)、快速应用开发(RAD)和图形用户界面设计。
作者简介
暂缺《J2EE学习指南:Sun Certified Enterprise Architect for J2EE(Exam 310-051)》作者简介
目录
1 Sun Certification for Enterprise Architect
Widespread Capabilities for Application Development
Java Is the Glue That Binds the Application Development
Companies Increasingly Need the Internet to Compete
Challenges of Application Development for the Enterprise
Increasing Programmer Productivity
J2EE Architecture Must REspond to /Consumer Demand
The Architect Must Be Able to Integrate J2EE and Legacy Systems
The J2EE Standard Promotes Competition and Choices
Design Goals fo J2EE Architecture
J2EE Architects Should Strive for Service Availability
J2EE Architecture and Connectivity to Existing Data
Expanded User Definition: Customers, Employees, and Partners
Flexible User Interaction
Flexible Business Component Model
Sun Certified Enterprise Architect Distinguishes the Java Professional
General SCEA Test Preparation Tips
2 Common Architectures and Protocols
Types of Architecture
System Arcvhitecture
REference Architecture
Flexible REference Architecture
Architectural Design and Principles
Where Architecture Fits in Analysis, DEgign, and Development
Architectural Terminology
Abstraction
Surface Area
Boundaries
Brittleness
Capabilities, Friction, and Layering
Principles of Architecture
Layering
Tiers
Capabilities of an Architecture
Creating an Architecture Using Distributed Service and J2EE
Enterprise JavaBeans
Distributed Application Lifecycle
Iterative Development/MVC
Simplified Architecture and Development
Component-Based Application Models
J2EE APIs and Certification
J2EE Specification
J2EE Reference Implementation
Sun BluePrint Design Guidelines for J2EE
XML and J2EE
Why Use XML?
Electronic Data Exchange and E-Commerce
Electronic Data Interchange(EDI)
Enterprise Application Integration(EAI)
Software DEvelopment and XML
XML Technology and the Java Platform
Distridbuted Programming Services
Naming and REgistration
Remote Method Invocation(RMI)
Protocols
Distributed Object Frameworks
Given an Architecture Described in Terms of Network Layout, List Benefits and Potential Weaknesses Associated with It
Exercise 2-1: Role of Architect
Exercise 2-2: Architecture Terminology
Exercise 2-3: Abstraction, Boundaries, Brittleness, and Capabilities
Exercise 2-4: Fundamentals of System Architecture
Exercise 2-5: Abstraction
Two-Minute Drill
Self Test
self Test Answers
3 Object-oriented Analysis and Design
Analysis and Deign of Object-Oriented Architecture
Key Features of OOP: Objects and Classes
Defining Object-Oriented Analysis and Design
Project Lifecycle
Unified Modeling Language
Elements Used in UML
RElationships Used in UML
Diagrams Used in UML
Stereotypes
Practical use of UML Diagrams
Two-Minute Drill
Self Test
Self Test Answers
4 Applicability of J2EE Technology
Explain the J2EE Architecture and System REquirements
J2EE Technology Layers Applied
J2EE Application Components
J2EE Architecture
Exercise 4-1: J2EE Architecture and the Nonfunctional Requirements of a System
Development Moehodology and Process
Explain the Use of Patterns in the J2EE Framework
Use of Patterns is the J2EE Framework
Exercise 4-2: Patterns in the J2EE Framework and Development
Describe te Concepts of "BEst Practices" and "guidelines"
Identifying the Need for Best Practices
Best Practice-Client Tier
Illustrate the Use of J2EE for Workflow
Best Practive-MVC Pattern
Exercise 4-3: Structuring Development
Exercise 4-4: Defining Best Practice and Guideline
Review Best Practices Applicable for All Tiers
Review Best Practices for the Client Tier
Enumerate the Components and Categories of the Web Tier
Explain How to Apply MVC to Web Tier
Review the Best Practices for the Presentation Layer
Exercise 4-5: Illustrate the Use of J2EE for Workflow
REview the Internationalization and Localization
Internationalization, Localization, and Locale
Exercise 4-6: Localization and Internalization
The EJB Tier
J2EE Best Practices--Data Access Objects
J2EE Best Practices--Value Objects
J2EE Best Practices--Session Bean Facade
J2EE Best Practices--Master Detail
Exercise 4-7: Data Access Objects
Exercise 4-8: Value Objects
Exercise 4-9: Facades
J2EE Best Practices--EIS Integration Tier
J2EE Connector Overview
Illustrate When to Use of J2EE Technology Use for Given Situations
EIS Guidelines--Data Access
EIS Access Objects
Guidelines--Connections
Performance-Related Best Practices Data Caching
J2EE Best Practices Services
Security
Security Terminology
Authentication in the EJB and EIS Integration Tiers
Transactions
Transaction Guidelines in EIS
Exercise 4-10: Security Guidelines
Exercise 4-11: The Role of Transactions
Two Minute Drill
Self Test
Self Test Answers
5 Design Patterns
Identify the Benefits of Using Design Patterns
The Gang of Four's Design Patterns
Identify the Most Appropriate Design Pattern for a Given Scenario
GoF Creational Design Patterns
GoF Structural Design Patterns
GoF Behavioral Design Patterns
J2EE Patterns
State the Name of a Gamma et al. Design Pattern Given the UML Diagram and/or a Brief Description of the Pattern's Functionality
Identify Benefits of a Specified Gamma et al. Design Pattern
Identify the Gamma et al. Design Pattern Associated with a Specified J2EE Technology Feature
Two-Minute Drill
Self Test
Self Test Answers
6 Legacy Connectivity
Introduction to Legacy Connectivity
Legacy Connectivity Using Java: the Classic Approach
Legacy Connectivity Using J2EE Connector
Java Connector Architecture
J2EE Connector Architecture: a General Integration Strategy
The Structure of the JCA
Basic JCA Adapter Implementation
Distinguish Appropriate from Inappropriate Techniques for Providing Access to a Legacy System from Java Technology Code Given an Outline Description of That Legacy System
Exercise 6-1: Techniques and Best Practices
Exercise 6-2: Implementing Data Validation and Referential Integrity Constraints
Exercise 6-3: Legacy Mapping
Exercise 6-4: Transaction Monitors
Exercise 6-3: Off-Board Servers
Exercise 6-6: JDBCvs. ODBC
Exercise 6-7: Accessing Legacy System Software
Exercise 6-8: Accessing COM Objects
Exercise 6-9: RMI vs. CORBA
Two-Minute Drill
Self Test
Self Test Answers
7 Enterprise JavaBeans and the EJB Container Model
List the Required Classes/Interfaces That Must Be Provided for an Enterprise JavaBeans Component
Classes and Interfaces for EJB
Distinguish Between Session and Entity Beans
Session and Entity Beans
Recognize Appropriate Uses for Entity, Stateful Session, and Stateless Session Beans
When to Use Entity and Session JavaBeans
Distinguish Between Stateful and Stateless Session Beans
Using Session Beans
Exercise 7-1: Review Code for a Stateless Session Bean
Exercise 7-2: Review Code for a Stateful Session Bean
Using Entity Beans
Exercise 7-3: Review Code for Entity Bean Using Container-Managed Persistence
A Closer Look at Entity Beans
State the Benefits and Costs of Container-Managed Persistence
Managing Persistence
EJB Clients
State the Transactional Behavior in a Given Scenario for an Enterprise Bean Method with a Specified Transactional Attributed as Defined in the Deployment Descriptor
Transactions and Transaction Management
Given a Requirement Specification Detailing Security and Flexibility Needs, Identify Architectures that Would Fulfill Those Requirements
Security
EJB Framework
Identify Costs and Benefits of Using an Intermediate Data Access Object Between an Entity Bean and the Data Resource
Using Data Access Objects for Entity Beans
State the Benefits of Bean Pooling in an EJB Container
Bean Pooling in the EJB Container
Explain How the Enterprise JavaBeans Container Does Lifecycle Management and Has the Capability to Increase Scalability
The Lifecycle of an EJB
Two-Minute Drill
Self Test
Self Test Answers
8 Messaging
Messaging Basics
Messages
Middleware
Message-Oriented Middleware
Communication Modes
Identify Scenarios That Are Appropriate to Implementation Using Messaging
List Benefits of Synchronous and Asynchronous Messaging
Identify Scenarios That Are More Appropriate to Implementation Using Asynchronous Messaging, Rather Than Synchronous
Identify Scenarios That Are More Appropriate to Implementation Using Synchronous Messaging, Rather Than Asynchronous
Java Message Service
Handling Exceptions
Managing Sessions
Components of a JMS Message
Required Components of a JMS Application
Objects Used to Create and Receive Messages in a JMS Client Application
How the Point-to Point Message Model Works
How the Publish/Subscribe Message Model Works
Message-Driven Bean (MDB) Component
Identify Scenarios That Are Appropriate to Implementation Using Messaging, Enterprise JavaBeans Technology, or Both
Two-Minute Drill
Self Test
Self Test Answers
9 Internationalization and Localization
State Three Aspects of Any Application That Might Need to Be Varied or Customized in Different Deployment Locales
Internationalization and Localization
Overview of Internationalizing an Application
List Three Features of the Java Programming Language That Can Be Used to Create an Internationalizable/Localizable Application
Java Support for Internationalization and Localization
Using Java Internationalization APIs in J2EE Applications
Web Tier Internationalization
Logging and Error Messages
Two-Minute Drill
SelfTest
Self Test Answers
10 Security
Security
Identify Security Restrictions That Java 2 Technology Environments Normally Impose on Applets Running in a Browser
Applets in a Browser
Given an Architectural System Specification, Identify Appropriate Locations for Implementation of Specified Security Features and Select Suitable Technologies for Implementation of Those Features and Authentication
Authorization
Two-Minute Drill
SelfTest
Self Test Answers
11 Case Study: Overview of Securities Trading System
The Case Study Infrastructure
WebSphere Application Server
Continuous Trade Processing
SQLBIS Database Server
Model and Develop the Case Study
Actor Definition
Business Process Model
Sequence Diagrams
Class Descriptions
Class Diagrams
State Transition (Lifecycle) Diagrams
Trade System Design and Implementation
Stock Order Entry Screen
Trade Application Packages
Trade Application Implementation Infrastructure
Glossary
A About the CD
System REquirements
Code on the CD
Installing and Running asterExam
MasterExam
Electronic Book
Help
Removing Installation(s)
Technical Support
LearnKey Technical Support
LearnKey Online Training
Index
Widespread Capabilities for Application Development
Java Is the Glue That Binds the Application Development
Companies Increasingly Need the Internet to Compete
Challenges of Application Development for the Enterprise
Increasing Programmer Productivity
J2EE Architecture Must REspond to /Consumer Demand
The Architect Must Be Able to Integrate J2EE and Legacy Systems
The J2EE Standard Promotes Competition and Choices
Design Goals fo J2EE Architecture
J2EE Architects Should Strive for Service Availability
J2EE Architecture and Connectivity to Existing Data
Expanded User Definition: Customers, Employees, and Partners
Flexible User Interaction
Flexible Business Component Model
Sun Certified Enterprise Architect Distinguishes the Java Professional
General SCEA Test Preparation Tips
2 Common Architectures and Protocols
Types of Architecture
System Arcvhitecture
REference Architecture
Flexible REference Architecture
Architectural Design and Principles
Where Architecture Fits in Analysis, DEgign, and Development
Architectural Terminology
Abstraction
Surface Area
Boundaries
Brittleness
Capabilities, Friction, and Layering
Principles of Architecture
Layering
Tiers
Capabilities of an Architecture
Creating an Architecture Using Distributed Service and J2EE
Enterprise JavaBeans
Distributed Application Lifecycle
Iterative Development/MVC
Simplified Architecture and Development
Component-Based Application Models
J2EE APIs and Certification
J2EE Specification
J2EE Reference Implementation
Sun BluePrint Design Guidelines for J2EE
XML and J2EE
Why Use XML?
Electronic Data Exchange and E-Commerce
Electronic Data Interchange(EDI)
Enterprise Application Integration(EAI)
Software DEvelopment and XML
XML Technology and the Java Platform
Distridbuted Programming Services
Naming and REgistration
Remote Method Invocation(RMI)
Protocols
Distributed Object Frameworks
Given an Architecture Described in Terms of Network Layout, List Benefits and Potential Weaknesses Associated with It
Exercise 2-1: Role of Architect
Exercise 2-2: Architecture Terminology
Exercise 2-3: Abstraction, Boundaries, Brittleness, and Capabilities
Exercise 2-4: Fundamentals of System Architecture
Exercise 2-5: Abstraction
Two-Minute Drill
Self Test
self Test Answers
3 Object-oriented Analysis and Design
Analysis and Deign of Object-Oriented Architecture
Key Features of OOP: Objects and Classes
Defining Object-Oriented Analysis and Design
Project Lifecycle
Unified Modeling Language
Elements Used in UML
RElationships Used in UML
Diagrams Used in UML
Stereotypes
Practical use of UML Diagrams
Two-Minute Drill
Self Test
Self Test Answers
4 Applicability of J2EE Technology
Explain the J2EE Architecture and System REquirements
J2EE Technology Layers Applied
J2EE Application Components
J2EE Architecture
Exercise 4-1: J2EE Architecture and the Nonfunctional Requirements of a System
Development Moehodology and Process
Explain the Use of Patterns in the J2EE Framework
Use of Patterns is the J2EE Framework
Exercise 4-2: Patterns in the J2EE Framework and Development
Describe te Concepts of "BEst Practices" and "guidelines"
Identifying the Need for Best Practices
Best Practice-Client Tier
Illustrate the Use of J2EE for Workflow
Best Practive-MVC Pattern
Exercise 4-3: Structuring Development
Exercise 4-4: Defining Best Practice and Guideline
Review Best Practices Applicable for All Tiers
Review Best Practices for the Client Tier
Enumerate the Components and Categories of the Web Tier
Explain How to Apply MVC to Web Tier
Review the Best Practices for the Presentation Layer
Exercise 4-5: Illustrate the Use of J2EE for Workflow
REview the Internationalization and Localization
Internationalization, Localization, and Locale
Exercise 4-6: Localization and Internalization
The EJB Tier
J2EE Best Practices--Data Access Objects
J2EE Best Practices--Value Objects
J2EE Best Practices--Session Bean Facade
J2EE Best Practices--Master Detail
Exercise 4-7: Data Access Objects
Exercise 4-8: Value Objects
Exercise 4-9: Facades
J2EE Best Practices--EIS Integration Tier
J2EE Connector Overview
Illustrate When to Use of J2EE Technology Use for Given Situations
EIS Guidelines--Data Access
EIS Access Objects
Guidelines--Connections
Performance-Related Best Practices Data Caching
J2EE Best Practices Services
Security
Security Terminology
Authentication in the EJB and EIS Integration Tiers
Transactions
Transaction Guidelines in EIS
Exercise 4-10: Security Guidelines
Exercise 4-11: The Role of Transactions
Two Minute Drill
Self Test
Self Test Answers
5 Design Patterns
Identify the Benefits of Using Design Patterns
The Gang of Four's Design Patterns
Identify the Most Appropriate Design Pattern for a Given Scenario
GoF Creational Design Patterns
GoF Structural Design Patterns
GoF Behavioral Design Patterns
J2EE Patterns
State the Name of a Gamma et al. Design Pattern Given the UML Diagram and/or a Brief Description of the Pattern's Functionality
Identify Benefits of a Specified Gamma et al. Design Pattern
Identify the Gamma et al. Design Pattern Associated with a Specified J2EE Technology Feature
Two-Minute Drill
Self Test
Self Test Answers
6 Legacy Connectivity
Introduction to Legacy Connectivity
Legacy Connectivity Using Java: the Classic Approach
Legacy Connectivity Using J2EE Connector
Java Connector Architecture
J2EE Connector Architecture: a General Integration Strategy
The Structure of the JCA
Basic JCA Adapter Implementation
Distinguish Appropriate from Inappropriate Techniques for Providing Access to a Legacy System from Java Technology Code Given an Outline Description of That Legacy System
Exercise 6-1: Techniques and Best Practices
Exercise 6-2: Implementing Data Validation and Referential Integrity Constraints
Exercise 6-3: Legacy Mapping
Exercise 6-4: Transaction Monitors
Exercise 6-3: Off-Board Servers
Exercise 6-6: JDBCvs. ODBC
Exercise 6-7: Accessing Legacy System Software
Exercise 6-8: Accessing COM Objects
Exercise 6-9: RMI vs. CORBA
Two-Minute Drill
Self Test
Self Test Answers
7 Enterprise JavaBeans and the EJB Container Model
List the Required Classes/Interfaces That Must Be Provided for an Enterprise JavaBeans Component
Classes and Interfaces for EJB
Distinguish Between Session and Entity Beans
Session and Entity Beans
Recognize Appropriate Uses for Entity, Stateful Session, and Stateless Session Beans
When to Use Entity and Session JavaBeans
Distinguish Between Stateful and Stateless Session Beans
Using Session Beans
Exercise 7-1: Review Code for a Stateless Session Bean
Exercise 7-2: Review Code for a Stateful Session Bean
Using Entity Beans
Exercise 7-3: Review Code for Entity Bean Using Container-Managed Persistence
A Closer Look at Entity Beans
State the Benefits and Costs of Container-Managed Persistence
Managing Persistence
EJB Clients
State the Transactional Behavior in a Given Scenario for an Enterprise Bean Method with a Specified Transactional Attributed as Defined in the Deployment Descriptor
Transactions and Transaction Management
Given a Requirement Specification Detailing Security and Flexibility Needs, Identify Architectures that Would Fulfill Those Requirements
Security
EJB Framework
Identify Costs and Benefits of Using an Intermediate Data Access Object Between an Entity Bean and the Data Resource
Using Data Access Objects for Entity Beans
State the Benefits of Bean Pooling in an EJB Container
Bean Pooling in the EJB Container
Explain How the Enterprise JavaBeans Container Does Lifecycle Management and Has the Capability to Increase Scalability
The Lifecycle of an EJB
Two-Minute Drill
Self Test
Self Test Answers
8 Messaging
Messaging Basics
Messages
Middleware
Message-Oriented Middleware
Communication Modes
Identify Scenarios That Are Appropriate to Implementation Using Messaging
List Benefits of Synchronous and Asynchronous Messaging
Identify Scenarios That Are More Appropriate to Implementation Using Asynchronous Messaging, Rather Than Synchronous
Identify Scenarios That Are More Appropriate to Implementation Using Synchronous Messaging, Rather Than Asynchronous
Java Message Service
Handling Exceptions
Managing Sessions
Components of a JMS Message
Required Components of a JMS Application
Objects Used to Create and Receive Messages in a JMS Client Application
How the Point-to Point Message Model Works
How the Publish/Subscribe Message Model Works
Message-Driven Bean (MDB) Component
Identify Scenarios That Are Appropriate to Implementation Using Messaging, Enterprise JavaBeans Technology, or Both
Two-Minute Drill
Self Test
Self Test Answers
9 Internationalization and Localization
State Three Aspects of Any Application That Might Need to Be Varied or Customized in Different Deployment Locales
Internationalization and Localization
Overview of Internationalizing an Application
List Three Features of the Java Programming Language That Can Be Used to Create an Internationalizable/Localizable Application
Java Support for Internationalization and Localization
Using Java Internationalization APIs in J2EE Applications
Web Tier Internationalization
Logging and Error Messages
Two-Minute Drill
SelfTest
Self Test Answers
10 Security
Security
Identify Security Restrictions That Java 2 Technology Environments Normally Impose on Applets Running in a Browser
Applets in a Browser
Given an Architectural System Specification, Identify Appropriate Locations for Implementation of Specified Security Features and Select Suitable Technologies for Implementation of Those Features and Authentication
Authorization
Two-Minute Drill
SelfTest
Self Test Answers
11 Case Study: Overview of Securities Trading System
The Case Study Infrastructure
WebSphere Application Server
Continuous Trade Processing
SQLBIS Database Server
Model and Develop the Case Study
Actor Definition
Business Process Model
Sequence Diagrams
Class Descriptions
Class Diagrams
State Transition (Lifecycle) Diagrams
Trade System Design and Implementation
Stock Order Entry Screen
Trade Application Packages
Trade Application Implementation Infrastructure
Glossary
A About the CD
System REquirements
Code on the CD
Installing and Running asterExam
MasterExam
Electronic Book
Help
Removing Installation(s)
Technical Support
LearnKey Technical Support
LearnKey Online Training
Index
猜您喜欢