Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography
Building Java Enterprise Applications. Architecture Volume 1
โ Scribed by Brett McLaughlin
- Book ID
- 127446542
- Publisher
- O'Reilly Media
- Year
- 2002
- Tongue
- English
- Weight
- 3 MB
- Series
- O'Reilly Java
- Edition
- 1
- Category
- Library
- ISBN
- 0596001231
No coin nor oath required. For personal study only.
โฆ Synopsis
Volume 1 of this advanced 3-volume guide explores the infrastructure issues so important to good application design. It isn't just a book about Entity Beans and JNDI. It takes you step by step through building the back end, designing the data store so that it gives you convenient access to the data your application needs; designing a directory; figuring out how to handle security and where to store security credentials you need; and so on.
๐ SIMILAR VOLUMES
Presents case studies which show how the Java 2 Platform, Enterprise Edition has helped ten companies or organizations develop distributed applications and deal with such issues as connecting dispersed users with centralized applications, building applications quickly and efficiently, and connecting
Characterized by ease of use, richness of expression, and concise syntax, Python has remained a premier programming language for more than a decade, and is used by novices and professionals alike. In particular, its close relationship to Java(TM) makes the two languages, when used in combination, id