๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Building Java Enterprise Applications. Architecture

โœ Scribed by Brett McLaughlin


Publisher
O'Reilly Media
Year
2002
Tongue
English
Leaves
274
Series
O'Reilly Java
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Volume 1 of this advanced 3-volume guide explores the infrastructure issues so important to good application design. It isn't just a book about Entity Beans and JNDI. It takes you step by step through building the back end, designing the data store so that it gives you convenient access to the data your application needs; designing a directory; figuring out how to handle security and where to store security credentials you need; and so on.


๐Ÿ“œ SIMILAR VOLUMES


Building Java Enterprise Applications, V
โœ Brett McLaughlin ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› O'Reilly Media ๐ŸŒ English

After reading the synopsis I was ready to delve into some planning and best practices reading material. While the book focuses on a core example, it doesn't not provide enough information on WHY certain decisions were made and does not provide enough look into alternatives. The book would be much

Java Connector Architecture: Building En
โœ Atul Apte ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Sams ๐ŸŒ English

I paid $0.51 for this book. It was too much. This is the only book that I have ever just thrown away out of pure frustration because of how terrible it is. The book is about 345 pages long. Not until page 131 does a discussion of the JCA even begin. You then get about 30 pages of text that is very

Java Connector Architecture: Building En
โœ Atul Apte ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Sams ๐ŸŒ English

<P><I>Java Connector Architecture</I> (JCA) presents the JCA and identifies the scope in which a JCA-based adapter operates. The book quickly moves to the design methodologies employed in adapter using the JCA. The book then progresses to information about testing and deploying adapters in a product

Scalable Data Architecture with Java: Bu
โœ Sinchan Banerjee ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Orchestrate data architecting solutions using Java and related technologies to evaluate, recommend and present the most suitable solution to leadership and clients</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to adapt to the ever-evolving data architecture techn

Scalable Data Architecture with Java: Bu
โœ Sinchan Banerjee ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Orchestrate data architecting solutions using Java and related technologies to evaluate, recommend and present the most suitable solution to leadership and clients</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to adapt to the ever-evolving data architecture techn

Enterprise Java Security: Building Secur
โœ Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography