Sold Out
Book Categories |
Preface | xi | |
How the Book Is Organized | xii | |
Common Resources | xiii | |
Feedback | xiii | |
Acknowledgments | xiii | |
1. | Project Development Team and Project Life Cycle | 1 |
Project Development Team: Roles and Responsibilities | 1 | |
Technical Architect | 2 | |
Project Manager | 5 | |
Business Analyst | 5 | |
Layout Designer | 6 | |
Presentation-Tier Developer | 6 | |
Business Logic Developer | 7 | |
Data Modeler | 7 | |
Database Administrator | 7 | |
Data Migration Specialist | 8 | |
Infrastructure Specialist | 8 | |
Testing Specialist | 8 | |
Project Life Cycle Approaches | 9 | |
Waterfall Approach | 9 | |
Iterative Approaches | 9 | |
Rational Unified Process | 10 | |
Which Approach Is Most Popular? | 11 | |
Consider a Hybrid Approach | 11 | |
Further Reading | 12 | |
Section 1 | Planning J2EE Applications | 13 |
2. | Defining the Project | 15 |
Identifying Project Scope | 17 | |
Identifying the Actors | 17 | |
Writing Use Cases | 19 | |
Common Mistakes | 22 | |
Architect's Exercise: ProjectTrak | 23 | |
Prototyping | 24 | |
Further Reading | 25 | |
3. | Scope Definition and Estimation | 27 |
Defining Scope | 27 | |
Basics of Estimating | 28 | |
An Algorithm for Estimating | 29 | |
Architect's Exercise: ProjectTrak | 31 | |
Further Reading | 32 | |
4. | Designing External Application Interfaces | 33 |
Selecting a Communication Method | 34 | |
Asynchronous Communication | 35 | |
Synchronous Communication | 35 | |
Comparing the Two Methods | 37 | |
Common Mistakes | 39 | |
Determining a Data Structure | 39 | |
Error-Handling Requirements | 42 | |
Error Notification Procedures | 42 | |
Retry Procedures | 42 | |
External Interface Guidelines | 43 | |
Architect's Exercise | 45 | |
Section 2 | Designing J2EE Applications | 47 |
5. | A Layered Approach to J2EE Design | 49 |
Overview of the Layering Concept | 49 | |
Data Access Object Layer | 52 | |
Choosing a Database Persistence Method | 53 | |
Simplified Data Access Pattern | 56 | |
Supporting Multiple Databases | 57 | |
Value Object Layer | 59 | |
Common Patterns | 59 | |
Business Logic Layer | 60 | |
Common Patterns | 61 | |
Deployment Layer | 63 | |
Choosing Deployment Wrappers | 63 | |
Common Patterns | 65 | |
Presentation Layer | 66 | |
Architectural Component Layer | 68 | |
Further Reading | 70 | |
6. | Creating the Object Model | 71 |
Identifying Objects | 72 | |
Object Identification Example | 73 | |
Turning Objects into Classes | 75 | |
Determining Relationships | 75 | |
Identifying Attributes | 77 | |
Identifying Methods | 78 | |
Shortcuts | 79 | |
Architect's Exercise: ProjectTrak | 81 | |
Further Reading | 84 | |
7. | Creating the Data Model | 85 |
Key Terms and Concepts | 86 | |
Design Practices and Normal Form | 89 | |
Architect's Exercise: ProjectTrak | 91 | |
Creating Database Schema Definitions | 93 | |
Common Mistakes | 94 | |
Creating XML Document Formats | 95 | |
Common Mistakes | 98 | |
Further Reading | 98 | |
8. | Network Architecture | 99 |
Key Terms and Concepts | 100 | |
Networking Basics | 102 | |
Security | 104 | |
Architecting Application Security | 105 | |
Scalability and High Availability | 105 | |
Architecting Scalability and Availability | 107 | |
Network Diagram Example | 108 | |
Further Reading | 108 | |
9. | Planning Construction | 109 |
Task Order and Dependencies | 110 | |
Critical Path | 115 | |
Common Mistakes | 116 | |
Further Reading | 117 | |
Section 3 | Building J2EE Applications | 119 |
10. | Building Value Objects | 121 |
Implementation Tips and Techniques | 123 | |
Value Objects Made Easy | 130 | |
Common Mistakes | 133 | |
Architect's Exercise: ProjectTrak | 134 | |
11. | Building XML Access Objects | 139 |
An XAO Example | 140 | |
Architectural Guidelines | 145 | |
Overview of JAXB | 145 | |
JAXB Usage Guidelines | 149 | |
Using XSLT Within Java | 150 | |
XSLT Usage Guidelines | 151 | |
Internet Resources | 152 | |
Further Reading | 152 | |
12. | Building Database Access Objects | 153 |
Data Access Object Coding Guidelines | 154 | |
Using Entity Beans | 157 | |
A Hibernate Example | 159 | |
JDBC Best Practices | 163 | |
Architect's Exercise: ProjectTrak | 169 | |
Other Code Reduction Paradigms | 173 | |
Java Data Objects (JDO) | 173 | |
CocoBase | 173 | |
TopLink | 173 | |
OJB | 173 | |
Further Reading | 174 | |
13. | Building Business Objects | 175 |
Transaction Management | 176 | |
Business Object Coding Guidelines | 180 | |
Architect's Exercise: ProjectTrak | 182 | |
Further Reading | 184 | |
14. | Building Deployment Layer Objects | 185 |
Session Beans | 186 | |
Message-Driven Beans | 191 | |
Web Services | 194 | |
Architect's Exercise: ProjectTrak | 195 | |
Further Reading | 197 | |
15. | Building the Presentation Layer | 199 |
Presentation Components | 201 | |
Page Display | 201 | |
User Input Validation | 204 | |
Data Processing | 206 | |
Navigation | 208 | |
Security | 208 | |
Presentation Layer Coding Guidelines | 209 | |
Common Mistakes | 210 | |
Further Reading | 210 | |
16. | Building Architectural Components | 211 |
Component Quality | 212 | |
Making Components Easy to Use | 213 | |
Making Components Easy to Configure and Control | 216 | |
Open Source Alternatives | 217 | |
Resolving Technical Issues | 218 | |
Mitigating Political Risk | 219 | |
Component Usage Guidelines | 219 | |
17. | Application Architecture Strategies | 223 |
Logging Strategies | 223 | |
Sample Strategy | 225 | |
Exception-Handling Strategies | 225 | |
Sample Strategy | 234 | |
Threading Strategies | 234 | |
Sample Threading Guidelines | 237 | |
Configuration Management Strategies | 237 | |
Further Reading | 240 | |
Section 4 | Testing and Maintaining J2EE Applications | 241 |
18. | Functional Testing Guidelines | 243 |
Testing Assumptions | 244 | |
Testing Coverage | 245 | |
Test Case Coding Overview and Examples | 246 | |
Combining Test Cases into Suites | 248 | |
Testing Best Practices | 249 | |
19. | Performance Tuning and Load Testing | 251 |
Measuring Performance | 252 | |
Memory Leaks Defined | 253 | |
Testing for Memory Leaks | 254 | |
Diagnosing Performance Problems | 256 | |
Using HPROF to Measure CPU Usage | 257 | |
Using HPROF to Measure Memory Usage | 260 | |
Further Reading | 262 | |
20. | Postimplementation Activities | 263 |
Application-Monitoring Guidelines | 264 | |
Bug-Fighting Guidelines | 265 | |
Top Refactoring Indicators | 266 | |
Common Refactoring Techniques | 267 | |
Extract and Delegate | 267 | |
Extract and Extend | 269 | |
Extract and Decouple with Interface | 270 | |
Further Reading | 271 | |
Bibliography | 273 | |
The Apache Software License, Version 1.1 | 276 | |
Index | 277 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe J2EE Architect's Handbook: How to be a successful technical architect for J2EE applications
X
This Item is in Your InventoryThe J2EE Architect's Handbook: How to be a successful technical architect for J2EE applications
X
You must be logged in to review the productsX
X
X
Add The J2EE Architect's Handbook: How to be a successful technical architect for J2EE applications, This book is written for technical architects and senior developers tasked with designing and leading the development of J2EE java applications. This book will guide the architect through the entire process from analysis through application deployment pro, The J2EE Architect's Handbook: How to be a successful technical architect for J2EE applications to the inventory that you are selling on WonderClubX
X
Add The J2EE Architect's Handbook: How to be a successful technical architect for J2EE applications, This book is written for technical architects and senior developers tasked with designing and leading the development of J2EE java applications. This book will guide the architect through the entire process from analysis through application deployment pro, The J2EE Architect's Handbook: How to be a successful technical architect for J2EE applications to your collection on WonderClub |