After reading the synopsis I was ready to delve into some planning and best practices reading material. While the book focuses on a core example, it doesn't not provide enough information on WHY certain decisions were made and does not provide enough look into alternatives. The book would be much
Building Java Enterprise Applications. Architecture
โ Scribed by Brett McLaughlin
- Publisher
- O'Reilly Media
- Year
- 2002
- Tongue
- English
- Leaves
- 274
- Series
- O'Reilly Java
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Volume 1 of this advanced 3-volume guide explores the infrastructure issues so important to good application design. It isn't just a book about Entity Beans and JNDI. It takes you step by step through building the back end, designing the data store so that it gives you convenient access to the data your application needs; designing a directory; figuring out how to handle security and where to store security credentials you need; and so on.
๐ SIMILAR VOLUMES
I paid $0.51 for this book. It was too much. This is the only book that I have ever just thrown away out of pure frustration because of how terrible it is. The book is about 345 pages long. Not until page 131 does a discussion of the JCA even begin. You then get about 30 pages of text that is very
<P><I>Java Connector Architecture</I> (JCA) presents the JCA and identifies the scope in which a JCA-based adapter operates. The book quickly moves to the design methodologies employed in adapter using the JCA. The book then progresses to information about testing and deploying adapters in a product
<p><span>Orchestrate data architecting solutions using Java and related technologies to evaluate, recommend and present the most suitable solution to leadership and clients</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to adapt to the ever-evolving data architecture techn
<p><span>Orchestrate data architecting solutions using Java and related technologies to evaluate, recommend and present the most suitable solution to leadership and clients</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to adapt to the ever-evolving data architecture techn
Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography