This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li
Rapid J2EE(TM) Development: An Adaptive Foundation for Enterprise Applications
โ Scribed by Alan Monnox
- Publisher
- Prentice Hall
- Year
- 2005
- Tongue
- English
- Leaves
- 432
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Coverage includes * Defining end-to-end J2EE development strategies that promote speed without compromising quality * Understanding how your design-time decisions impact overall project schedules * Building agile application architectures that promote rapid development * Using UML modeling to streamline system design and validation * Speeding database development with code generation and object-relational mapping * Practical test-driven development: constructing automated unit test suites and using mock objects to "test from the inside out" * Leveraging the full value of Eclipse and other IDEsIf you're a J2EE developer, project leader, or manager, you're under constant pressure to deliver quality applications more rapidly. Rapid J2EE Development gives you all the skills and resources you need to respond.
๐ SIMILAR VOLUMES
This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li
Enterprise Javaa Security: Building Secure J2EEa Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehe
Enterprise Javaa Security: Building Secure J2EEa Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehe
The quality of this book varies but most of it is outright horrible. The problem is that it seems to be written not by engineers but by techincal writers. People who don't really understand what is important, what is not, and how the things are connected. There are many details but the text goes on
Written for application component developers who are building Connector architecture applications, explaining how to connect applications not only to one another but also to a multitude of EISs and legacy systems. Softcover.