Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
About the Authors
About the Technical Editor
Contents
Acknowledgments
Preface
Introduction
1. The Oracle Certified Master, Java EE 6 Enterprise Architect Exam and Certification
Widespread Capabilities for Application Development
Java Is the Glue That Binds the Application Development Process
Companies Increasingly Need the Internet to Compete
Challenges of Application Development for the Enterprise
Increasing Programmer Productivity
JEE Architecture Must Respond to Consumer Demand
The Architect Must Be Able to Integrate JEE and Legacy Systems
The JEE Standard Promotes Competition and Choices
Design Goals of JEE Architecture
JEE Architects Should Strive for Service Availability
JEE Architecture and Connectivity to Existing Data
Expanded User Definition: Customers, Employees, and Partners
Flexible User Interaction
Flexible Business Component Model
The New Architect Role: Comprehensive Skill Set Required
Large-scale, Distributed Enterprise Systems and Integration Risk
Quality of Service
Nonfunctional Requirements
Risk Evaluation and Control
Technology Responsibilities
Management Responsibilities
Difference between Architecture and Design
Architectural Principles
Registering for Oracle Certified Master, Java EE 6 Enterprise Architect Distinguishes the Java Professional
Objectives of the Exam
Starting Point
General OCMJEA Test Preparation Tips
Essay Test Preparation Tips
2. Application Design Concepts and Principles
Identify Nonfunctional and Quality of Service Requirements That Influence Application Design
Nonfunctional Requirements
Quality of Service and Architecture
Identify How the Separation of Concerns Principle Applies to the Component Model of a Java EE Application
Decomposition and the Separation of Concerns
Tiers
Identify the Correct Interpretation of Separation of Concerns as It Applies to the Java EE Service Layers
Layers
Identify the Effects of an Object-Oriented Approach to System Design
Fundamental Object-Oriented Concepts
Analysis and Design of Object-Oriented Architecture
Modeling and the Software Development Process
Exercise 2-1: Design Activities
Unified Modeling Language
UML Diagrams
UML Tools
Elements Used in UML
Relationships Used in UML
Diagrams Used in UML
Stereotypes
Practical Use of UML Diagrams
Two-Minute Drill
Q&A Self Test
Self Test Answers
3. Common Architectures
Identify the Appropriate Strategy for Deploying Client Applications to Desktop and Mobile Platforms, the Principles for Designing a User Interface, and the Benefits of Applying Client Tier Patterns
Client Tier Design Principles
Identify Best Practices for Exception Handling, Logging, and Business Tier Patterns
Exceptions in General
Exception Handling Overview
Exercise 3-1: Issue Resolution
Logging for All Applications
Identify Design Patterns That Address Specific Challenges in the Web Tier, Including Authentication, Authorization, and Scaling and Clustering to Meet Demand
Security Patterns by Tier
Scaling and Clustering Patterns
JEE Clustering
Identify Java EE Technologies, Including JMS, JCA, and Web Services, and Design Patterns That Address Specific Challenges in Enterprise Integration
Java EE Technologies: JMS and Design Patterns in Enterprise Integration
Exercise 3-2: Publish/Subscribe Messaging
Java EE Technologies: JCA and Design Patterns in Enterprise Integration
Java EE Technologies: Web Services and Design Patterns in Enterprise Integration
Identify the Challenges in Integrating Enterprise Resources, the Java EE Technologies That Address Them (Including JPA and JDBC), and the Communication Protocols That Support Tier-to-Tier Communication (Including RMI, IIOP, and CORBA)
Integration of Enterprise Resources
The Evolution of Enterprise Integration
Two-Minute Drill
Q&A Self Test
Self Test Answers
4. Integration and Messaging
Identify the APIs Available for a Java EE Technology-Based System to Communicate with External Resources. Outline the Benefits and Drawbacks of Each Approach
Java Message Service (JMS)
Java EE Connector Architecture (JCA)
Java API for XML-based Web Services (JAX-WS)
Java API for RESTful Web Services (JAX-RS)
Java Database Connectivity (JDBC)
Java Persistence API (JPA)
Common Object Request Broker Architecture (CORBA)
Remote Method Invocation (Java/RMI)
Identify and Detail the Technologies Used to Integrate Business Components with External Resources, Including JMS and JCA
Messaging Basics
Java Message Service
Message-Driven Bean (MDB)
Java EE Connector Architecture (JCA)
Describe the Technologies Used to Integrate Business Components with Web Services, Including XML over HTTP, JSON, SOAP, and REST.
What Are Web Services?
Extensible Markup Language (XML)
JavaScript Object Notation (JSON)
SOAP
Representational State Transfer (REST)
Identify How a Service-Oriented Architecture (SOA) Facilitates System Integration and Best Practices
Architecture and Design for SOA
Business Process Execution Language (BPEL)
Service Component Architecture (SCA) and Service Data Objects (SDO)
Enterprise Service Bus (ESB)
Best Practices for SOA
SOA Governance
Comparing Integration Technologies
Two-Minute Drill
Q&A Self Test
Self Test Answers
5. Business Tier Technologies
Background on New Features in Java EE 6
Identify the Correct EJB Technology to Apply for a Given Scenario, Including Entity Classes, Session Beans, Message-Driven Beans, Timers, Interceptors, and POJOs
Enterprise Bean Overview
Entity Class
Entity Bean
Session Bean
Message-Driven Bean (MDB)
Timer Service
Interceptors (AOP)
Identify Benefits and Drawbacks of Different Persistence Technologies such as BMP, CMP, and JPA, Including Ease of Development, Performance, Scalability, Extensibility, and Security
Gauging Benefits and Drawbacks
Bean-Managed Persistence (BMP)
Container-Managed Persistence (CMP)
Java Data Objects (JDO)
Java Database Connectivity (JDBC)
Java Persistence API (JPA)
Comparing Persistence Types
Identify the Benefits and Drawbacks of Implementing Web Services in the EJB Component Container
Web Services
Enterprise Beans and Web Services
Select the Appropriate Use of JPA and JPQL in a Given Scenario
Java Persistence API (JPA)
Java Persistence Query Language (JPQL)
Two-Minute Drill
Q&A Self Test
Self Test Answers
6. Web Tier Technologies
Web Tier Development Roles
Identify the Benefits and Drawbacks of Using URL Rewriting and Cookies to Manage HTTP Session State
HttpSession Object
Session State Tracking: Should We Use Cookies or URL Rewrite?
Maintaining State Using JEE Session Beans
Exercise 6-1: Session State
Servlets
Identify Appropriate Uses for JSP and Servlet Technology, and JavaServer Faces in a Given Java EE Application
Servlets
JavaServer Page
JavaServer Faces
Scripting Languages
Web Tier Input Data Validation
Control and Logic Concerns
Web Flow
Identify the Benefits of Using an EJB Container with a Web Container Instead of a Web Container Alone
Benefits of Enterprise Beans
Session Beans
Message-Driven Bean (MDB)
Identify the Differences between Client Pull and Server Push Architectures
Identify the Benefits and Drawbacks of Using a Browser to Access Asynchronous, Lightweight Processes on the Server
Browser Asynchronous APIs
Two-Minute Drill
Q&A Self Test
Self Test Answers
7. Design Patterns
Benefits of Using Design Patterns
Design Patterns by Gamma et al., AKA the “Gang of Four” (GoF)
Benefits of a Specified GoF Design Pattern
Select an Appropriate Gang of Four (GoF) Pattern for a Given Application Challenge
GoF Creational Design Patterns
GoF Structural Design Patterns
GoF Behavioral Design Patterns
Identify a Gang of Four (GoF) Design Pattern, Using a Description of Its Features
Java EE Patterns
Demonstrate Knowledge of Java EE Design Patterns
Identify the Use of the Law of Leaky Abstractions or a Specific Anti-Pattern in a Given Scenario
Two-Minute Drill
Q&A Self Test
Self Test Answers
8. Security
Identify Elements of the Security Model in the Java SE Environments for Remote Clients, Including Web Start, Applets, and the Role of the SecurityManager Class
Java Web Start
Java Applet
The Security Manager
More Java SE Security Features/Mechanisms
Select Appropriate Locations to Implement Java EE Security Technologies or Features in a UML Component and Deployment Diagram
Java EE Security Depicted within UML Component Diagram
Java EE Security Depicted within UML Deployment Diagram
Classify Security Threats to an Enterprise Application and Select the Measures an Architect Can Propose to Mitigation Them
Security Architectures
Security Threats
Identify Techniques Associated with Declarative and Programmatic Security, Including the Use of Annotations, Deployment Descriptors, and JAAS Technology
Security Model
Securing Web Components
Securing Enterprise Bean Components
Java Authentication and Authorization Service (JAAS)
Identify the Security Technologies That Apply to an Application’s Code, Messaging, and Transport Layers
Application-Layer Security
Message-Layer Security
Transport-Layer Security
Two-Minute Drill
Q&A Self Test
Self Test Answers
A. Java (EE) Enterprise Architect Certified Master Assignment
Scenario
WebSphere Application Server
Continuous Trade Processing System
SQLBIS Database Server
Model and Develop the Case Study
Actor Definition
Business Process Model
Sequence Diagrams
Class Descriptions
Class Diagrams
State Transition (Life Cycle) Diagrams
Trade System Design and Implementation
Stock Order Entry Screen
Trade Application Packages
Trade Application Implementation Infrastructure
Deployment Diagrams
Final Tips
B. Java (EE) Enterprise Architect Certified Master Essay Exam
The Case Study Infrastructure
Application Servers
Continuous Trade Processing
SQLBIS Database Server
Essay Questions and Sample Answers
How Does Your Design Handle Availability?
How Does Your Design Handle Reliability?
How Does Your Design Handle Scalability?
How Does Your Design Handle Performance?
How Does Your Design Handle Security?
How Does Your Design Handle Extensibility?
How Does Your Design Handle Maintainability?
How Does Your Design Handle Manageability?
How Does Your Design Handle Persistence?
How Does Your Design Handle the Presentation Tier?
Before the Exam: Prepare and Practice
How to Proceed at the Exam
C. About the Download
System Requirements
Installing and Running Total Tester
About Total Tester
Technical Support
Glossary
Index
← Prev
Back
Next →
← Prev
Back
Next →