J2EE学习指南:Sun Certified Enterprise Architect for J2EE(Exam 310-051)

J2EE学习指南:Sun Certified Enterprise Architect for J2EE(Exam 310-051)
作 者: PAUL R ALLEN
出版社: 人民邮电出版社
丛编项: 英文版
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: J2EE
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《J2EE学习指南:Sun Certified Enterprise Architect for J2EE(Exam 310-051)》作者简介

内容简介

本书集学术和实践于一体,是一本全面的系统分析和设计的经典教材!当今社会要求学生更加“面向客户型”,要“实践”所学的知识,而不仅仅是学习知识。作者在写作此书的过程中力求达到:1)平衡概念、工具。技术以及应用等各方面内容所占的比重;2)同其他书相比,提供更丰富的系统分析和设计的例子;3)平衡传统方法(如结构化分析和信息工程)和新方法(如面向对象分析和快速应用开发)内容所占的比重。JeffreyL.Whitten美国普度大学计算机技术系教授,现任普度大学信息技术部门的企业应用部副总裁。Whitten教授自1979年在普度大学计算机技术系任教以来.长期讲授系统分析和设计课程.曾两次荣获JamesG.Dwyer最佳教师奖。1984年升任教授后,开始编著《系统分析与设计方法》一书,目前已经出版到第5版。该书长期处于同类书销售排行榜第1名,被7多所学校采纳作为教材。whitten教授是多个学术组织的活跃成员.其中包括:信息技术专业学会(AITP)、信息系统学会(AIS)、计算机学会(ACM)。信息管理协会(SIM)。LonnieD.Bentley美国普度大学计算机技术系教授,主要教学和研究领域包括:系统分析和设计、企业应用系统、业务过程重构。计算机辅助软件工程(CASE),快速应用开发(RAD)和图形用户界面设计。KevinC.Dittman美国普度大学计算机技术系助理教授,主要教学和研究领域包括:系统分析和设计、计算机辅助软件工程(CASE)、快速应用开发(RAD)和图形用户界面设计。

图书目录

1 Sun Certification for Enterprise Architect

Widespread Capabilities for Application Development

Java Is the Glue That Binds the Application Development

Companies Increasingly Need the Internet to Compete

Challenges of Application Development for the Enterprise

Increasing Programmer Productivity

J2EE Architecture Must REspond to /Consumer Demand

The Architect Must Be Able to Integrate J2EE and Legacy Systems

The J2EE Standard Promotes Competition and Choices

Design Goals fo J2EE Architecture

J2EE Architects Should Strive for Service Availability

J2EE Architecture and Connectivity to Existing Data

Expanded User Definition: Customers, Employees, and Partners

Flexible User Interaction

Flexible Business Component Model

Sun Certified Enterprise Architect Distinguishes the Java Professional

General SCEA Test Preparation Tips

2 Common Architectures and Protocols

Types of Architecture

System Arcvhitecture

REference Architecture

Flexible REference Architecture

Architectural Design and Principles

Where Architecture Fits in Analysis, DEgign, and Development

Architectural Terminology

Abstraction

Surface Area

Boundaries

Brittleness

Capabilities, Friction, and Layering

Principles of Architecture

Layering

Tiers

Capabilities of an Architecture

Creating an Architecture Using Distributed Service and J2EE

Enterprise JavaBeans

Distributed Application Lifecycle

Iterative Development/MVC

Simplified Architecture and Development

Component-Based Application Models

J2EE APIs and Certification

J2EE Specification

J2EE Reference Implementation

Sun BluePrint Design Guidelines for J2EE

XML and J2EE

Why Use XML?

Electronic Data Exchange and E-Commerce

Electronic Data Interchange(EDI)

Enterprise Application Integration(EAI)

Software DEvelopment and XML

XML Technology and the Java Platform

Distridbuted Programming Services

Naming and REgistration

Remote Method Invocation(RMI)

Protocols

Distributed Object Frameworks

Given an Architecture Described in Terms of Network Layout, List Benefits and Potential Weaknesses Associated with It

Exercise 2-1: Role of Architect

Exercise 2-2: Architecture Terminology

Exercise 2-3: Abstraction, Boundaries, Brittleness, and Capabilities

Exercise 2-4: Fundamentals of System Architecture

Exercise 2-5: Abstraction

Two-Minute Drill

Self Test

self Test Answers

3 Object-oriented Analysis and Design

Analysis and Deign of Object-Oriented Architecture

Key Features of OOP: Objects and Classes

Defining Object-Oriented Analysis and Design

Project Lifecycle

Unified Modeling Language

Elements Used in UML

RElationships Used in UML

Diagrams Used in UML

Stereotypes

Practical use of UML Diagrams

Two-Minute Drill

Self Test

Self Test Answers

4 Applicability of J2EE Technology

Explain the J2EE Architecture and System REquirements

J2EE Technology Layers Applied

J2EE Application Components

J2EE Architecture

Exercise 4-1: J2EE Architecture and the Nonfunctional Requirements of a System

Development Moehodology and Process

Explain the Use of Patterns in the J2EE Framework

Use of Patterns is the J2EE Framework

Exercise 4-2: Patterns in the J2EE Framework and Development

Describe te Concepts of "BEst Practices" and "guidelines"

Identifying the Need for Best Practices

Best Practice-Client Tier

Illustrate the Use of J2EE for Workflow

Best Practive-MVC Pattern

Exercise 4-3: Structuring Development

Exercise 4-4: Defining Best Practice and Guideline

Review Best Practices Applicable for All Tiers

Review Best Practices for the Client Tier

Enumerate the Components and Categories of the Web Tier

Explain How to Apply MVC to Web Tier

Review the Best Practices for the Presentation Layer

Exercise 4-5: Illustrate the Use of J2EE for Workflow

REview the Internationalization and Localization

Internationalization, Localization, and Locale

Exercise 4-6: Localization and Internalization

The EJB Tier

J2EE Best Practices--Data Access Objects

J2EE Best Practices--Value Objects

J2EE Best Practices--Session Bean Facade

J2EE Best Practices--Master Detail

Exercise 4-7: Data Access Objects

Exercise 4-8: Value Objects

Exercise 4-9: Facades

J2EE Best Practices--EIS Integration Tier

J2EE Connector Overview

Illustrate When to Use of J2EE Technology Use for Given Situations

EIS Guidelines--Data Access

EIS Access Objects

Guidelines--Connections

Performance-Related Best Practices Data Caching

J2EE Best Practices Services

Security

Security Terminology

Authentication in the EJB and EIS Integration Tiers

Transactions

Transaction Guidelines in EIS

Exercise 4-10: Security Guidelines

Exercise 4-11: The Role of Transactions

Two Minute Drill

Self Test

Self Test Answers

5 Design Patterns

Identify the Benefits of Using Design Patterns

The Gang of Four's Design Patterns

Identify the Most Appropriate Design Pattern for a Given Scenario

GoF Creational Design Patterns

GoF Structural Design Patterns

GoF Behavioral Design Patterns

J2EE Patterns

State the Name of a Gamma et al. Design Pattern Given the UML Diagram and/or a Brief Description of the Pattern's Functionality

Identify Benefits of a Specified Gamma et al. Design Pattern

Identify the Gamma et al. Design Pattern Associated with a Specified J2EE Technology Feature

Two-Minute Drill

Self Test

Self Test Answers

6 Legacy Connectivity

Introduction to Legacy Connectivity

Legacy Connectivity Using Java: the Classic Approach

Legacy Connectivity Using J2EE Connector

Java Connector Architecture

J2EE Connector Architecture: a General Integration Strategy

The Structure of the JCA

Basic JCA Adapter Implementation

Distinguish Appropriate from Inappropriate Techniques for Providing Access to a Legacy System from Java Technology Code Given an Outline Description of That Legacy System

Exercise 6-1: Techniques and Best Practices

Exercise 6-2: Implementing Data Validation and Referential Integrity Constraints

Exercise 6-3: Legacy Mapping

Exercise 6-4: Transaction Monitors

Exercise 6-3: Off-Board Servers

Exercise 6-6: JDBCvs. ODBC

Exercise 6-7: Accessing Legacy System Software

Exercise 6-8: Accessing COM Objects

Exercise 6-9: RMI vs. CORBA

Two-Minute Drill

Self Test

Self Test Answers

7 Enterprise JavaBeans and the EJB Container Model

List the Required Classes/Interfaces That Must Be Provided for an Enterprise JavaBeans Component

Classes and Interfaces for EJB

Distinguish Between Session and Entity Beans

Session and Entity Beans

Recognize Appropriate Uses for Entity, Stateful Session, and Stateless Session Beans

When to Use Entity and Session JavaBeans

Distinguish Between Stateful and Stateless Session Beans

Using Session Beans

Exercise 7-1: Review Code for a Stateless Session Bean

Exercise 7-2: Review Code for a Stateful Session Bean

Using Entity Beans

Exercise 7-3: Review Code for Entity Bean Using Container-Managed Persistence

A Closer Look at Entity Beans

State the Benefits and Costs of Container-Managed Persistence

Managing Persistence

EJB Clients

State the Transactional Behavior in a Given Scenario for an Enterprise Bean Method with a Specified Transactional Attributed as Defined in the Deployment Descriptor

Transactions and Transaction Management

Given a Requirement Specification Detailing Security and Flexibility Needs, Identify Architectures that Would Fulfill Those Requirements

Security

EJB Framework

Identify Costs and Benefits of Using an Intermediate Data Access Object Between an Entity Bean and the Data Resource

Using Data Access Objects for Entity Beans

State the Benefits of Bean Pooling in an EJB Container

Bean Pooling in the EJB Container

Explain How the Enterprise JavaBeans Container Does Lifecycle Management and Has the Capability to Increase Scalability

The Lifecycle of an EJB

Two-Minute Drill

Self Test

Self Test Answers

8 Messaging

Messaging Basics

Messages

Middleware

Message-Oriented Middleware

Communication Modes

Identify Scenarios That Are Appropriate to Implementation Using Messaging

List Benefits of Synchronous and Asynchronous Messaging

Identify Scenarios That Are More Appropriate to Implementation Using Asynchronous Messaging, Rather Than Synchronous

Identify Scenarios That Are More Appropriate to Implementation Using Synchronous Messaging, Rather Than Asynchronous

Java Message Service

Handling Exceptions

Managing Sessions

Components of a JMS Message

Required Components of a JMS Application

Objects Used to Create and Receive Messages in a JMS Client Application

How the Point-to Point Message Model Works

How the Publish/Subscribe Message Model Works

Message-Driven Bean (MDB) Component

Identify Scenarios That Are Appropriate to Implementation Using Messaging, Enterprise JavaBeans Technology, or Both

Two-Minute Drill

Self Test

Self Test Answers

9 Internationalization and Localization

State Three Aspects of Any Application That Might Need to Be Varied or Customized in Different Deployment Locales

Internationalization and Localization

Overview of Internationalizing an Application

List Three Features of the Java Programming Language That Can Be Used to Create an Internationalizable/Localizable Application

Java Support for Internationalization and Localization

Using Java Internationalization APIs in J2EE Applications

Web Tier Internationalization

Logging and Error Messages

Two-Minute Drill

SelfTest

Self Test Answers

10 Security

Security

Identify Security Restrictions That Java 2 Technology Environments Normally Impose on Applets Running in a Browser

Applets in a Browser

Given an Architectural System Specification, Identify Appropriate Locations for Implementation of Specified Security Features and Select Suitable Technologies for Implementation of Those Features and Authentication

Authorization

Two-Minute Drill

SelfTest

Self Test Answers

11 Case Study: Overview of Securities Trading System

The Case Study Infrastructure

WebSphere Application Server

Continuous Trade Processing

SQLBIS Database Server

Model and Develop the Case Study

Actor Definition

Business Process Model

Sequence Diagrams

Class Descriptions

Class Diagrams

State Transition (Lifecycle) Diagrams

Trade System Design and Implementation

Stock Order Entry Screen

Trade Application Packages

Trade Application Implementation Infrastructure

Glossary

A About the CD

System REquirements

Code on the CD

Installing and Running asterExam

MasterExam

Electronic Book

Help

Removing Installation(s)

Technical Support

LearnKey Technical Support

LearnKey Online Training

Index