๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Core J2EE Patterns

โœ Scribed by Deepak Alur, John Crupi, Dan Malks


Book ID
127433578
Publisher
Pearson Education
Year
2001
Tongue
English
Weight
3 MB
Edition
1st
Category
Library
ISBN
0130648841

No coin nor oath required. For personal study only.

โœฆ Synopsis


This guide presents the best practices for development using J2EE technologies and details 21 design patterns that produce applications notable for their performance, scalability, and robustness. A multi- tier case study illustrates every stage of enterprise development, and sample code is provided. Common mistakes are identified, so they can be avoided. The authors are Java architects and engineers


๐Ÿ“œ SIMILAR VOLUMES


Core J2EE patterns
โœ Alur D., Crupi J., Malks D. ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English โš– 3 MB

Over the last few years, Java 2 Platform, Enterprise Edition (J2EE) technology has emerged and matured as a standard platform for building enterprise applications. While the platform has matured into a solid offering for developing and deploying enterprise applications, it does offer its challenges.

Core J2EE Patterns: Best Practices and D
โœ Deepak Alur, Dan Malks, John Crupi ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice-Hall ๐ŸŒ English โš– 4 MB

Developers often confuse learning the technology with learning to design with the technology. In this book, senior architects from the Sun Java Center share their cumulative design experience on Java 2 Platform, Enterprise Edition (J2EE) technology.The primary focus of the book is on patterns, best

J2EE Design Patterns
โœ William Crawford, Jonathan Kaplan ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› O'Reilly Media ๐ŸŒ English โš– 1 MB

Architects of buildings and architects of software have more in common than most people think. Both professions require attention to detail, and both practitioners will see their work collapse around them if they make too many mistakes. It's impossible to imagine a world in which buildings get built

Core Security Patterns: Best Practices a
โœ Christopher Steel, Ramesh Nagappan, Ray Lai ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Prentice Hall ๐ŸŒ English โš– 7 MB

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and

J2EE Antipatterns
โœ Bill Dudney, Stephen Asbury, Joseph Krozak, Kevin Wittkopf ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Wiley Pub ๐ŸŒ English โš– 3 MB

Intended for experienced J2EE developers, this book documents bad practices in the form of antipatterns. Each antipattern summarizes background information on the technology, identifies the symptoms and consequences of the problem, and provides a code example. The second half of each chapter offers

J2EE best practices: Java design pattern
โœ Darren Broemmer ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Wiley ๐ŸŒ English โš– 4 MB

There are a number of best practices you need to consider to build highly effective J2EE components and integrate them into applications. These practices include evaluating and selecting the right set of software components and services to handle the job.In this book, Darren Broemmer supplies you wi