Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover  Title Page Copyright Page About the Authors
About the Technical Editor
Contents  Acknowledgments Preface Introduction 1. The Oracle Certified Master, Java EE 6 Enterprise Architect Exam and Certification
Widespread Capabilities for Application Development Java Is the Glue That Binds the Application Development Process Companies Increasingly Need the Internet to Compete Challenges of Application Development for the Enterprise
Increasing Programmer Productivity JEE Architecture Must Respond to Consumer Demand The Architect Must Be Able to Integrate JEE and Legacy Systems The JEE Standard Promotes Competition and Choices
Design Goals of JEE Architecture
JEE Architects Should Strive for Service Availability JEE Architecture and Connectivity to Existing Data Expanded User Definition: Customers, Employees, and Partners Flexible User Interaction Flexible Business Component Model
The New Architect Role: Comprehensive Skill Set Required Large-scale, Distributed Enterprise Systems and Integration Risk
Quality of Service Nonfunctional Requirements Risk Evaluation and Control Technology Responsibilities Management Responsibilities Difference between Architecture and Design
Architectural Principles Registering for Oracle Certified Master, Java EE 6 Enterprise Architect Distinguishes the Java Professional
Objectives of the Exam Starting Point
General OCMJEA Test Preparation Tips
Essay Test Preparation Tips
2. Application Design Concepts and Principles
Identify Nonfunctional and Quality of Service Requirements That Influence Application Design
Nonfunctional Requirements Quality of Service and Architecture
Identify How the Separation of Concerns Principle Applies to the Component Model of a Java EE Application
Decomposition and the Separation of Concerns Tiers
Identify the Correct Interpretation of Separation of Concerns as It Applies to the Java EE Service Layers
Layers
Identify the Effects of an Object-Oriented Approach to System Design
Fundamental Object-Oriented Concepts Analysis and Design of Object-Oriented Architecture Modeling and the Software Development Process Exercise 2-1: Design Activities Unified Modeling Language UML Diagrams UML Tools Elements Used in UML Relationships Used in UML Diagrams Used in UML Stereotypes Practical Use of UML Diagrams
Two-Minute Drill Q&A Self Test Self Test Answers
3. Common Architectures
Identify the Appropriate Strategy for Deploying Client Applications to Desktop and Mobile Platforms, the Principles for Designing a User Interface, and the Benefits of Applying Client Tier Patterns
Client Tier Design Principles
Identify Best Practices for Exception Handling, Logging, and Business Tier Patterns
Exceptions in General Exception Handling Overview Exercise 3-1: Issue Resolution Logging for All Applications
Identify Design Patterns That Address Specific Challenges in the Web Tier, Including Authentication, Authorization, and Scaling and Clustering to Meet Demand
Security Patterns by Tier Scaling and Clustering Patterns JEE Clustering
Identify Java EE Technologies, Including JMS, JCA, and Web Services, and Design Patterns That Address Specific Challenges in Enterprise Integration
Java EE Technologies: JMS and Design Patterns in Enterprise Integration Exercise 3-2: Publish/Subscribe Messaging Java EE Technologies: JCA and Design Patterns in Enterprise Integration Java EE Technologies: Web Services and Design Patterns in Enterprise Integration
Identify the Challenges in Integrating Enterprise Resources, the Java EE Technologies That Address Them (Including JPA and JDBC), and the Communication Protocols That Support Tier-to-Tier Communication (Including RMI, IIOP, and CORBA)
Integration of Enterprise Resources The Evolution of Enterprise Integration
Two-Minute Drill Q&A Self Test Self Test Answers
4. Integration and Messaging
Identify the APIs Available for a Java EE Technology-Based System to Communicate with External Resources. Outline the Benefits and Drawbacks of Each Approach
Java Message Service (JMS) Java EE Connector Architecture (JCA) Java API for XML-based Web Services (JAX-WS) Java API for RESTful Web Services (JAX-RS) Java Database Connectivity (JDBC) Java Persistence API (JPA) Common Object Request Broker Architecture (CORBA) Remote Method Invocation (Java/RMI)
Identify and Detail the Technologies Used to Integrate Business Components with External Resources, Including JMS and JCA
Messaging Basics Java Message Service Message-Driven Bean (MDB) Java EE Connector Architecture (JCA)
Describe the Technologies Used to Integrate Business Components with Web Services, Including XML over HTTP, JSON, SOAP, and REST.
What Are Web Services? Extensible Markup Language (XML) JavaScript Object Notation (JSON) SOAP Representational State Transfer (REST)
Identify How a Service-Oriented Architecture (SOA) Facilitates System Integration and Best Practices
Architecture and Design for SOA Business Process Execution Language (BPEL) Service Component Architecture (SCA) and Service Data Objects (SDO) Enterprise Service Bus (ESB) Best Practices for SOA SOA Governance Comparing Integration Technologies
Two-Minute Drill Q&A Self Test Self Test Answers
5. Business Tier Technologies
Background on New Features in Java EE 6 Identify the Correct EJB Technology to Apply for a Given Scenario, Including Entity Classes, Session Beans, Message-Driven Beans, Timers, Interceptors, and POJOs
Enterprise Bean Overview Entity Class Entity Bean Session Bean Message-Driven Bean (MDB) Timer Service Interceptors (AOP)
Identify Benefits and Drawbacks of Different Persistence Technologies such as BMP, CMP, and JPA, Including Ease of Development, Performance, Scalability, Extensibility, and Security
Gauging Benefits and Drawbacks Bean-Managed Persistence (BMP) Container-Managed Persistence (CMP) Java Data Objects (JDO) Java Database Connectivity (JDBC) Java Persistence API (JPA) Comparing Persistence Types
Identify the Benefits and Drawbacks of Implementing Web Services in the EJB Component Container
Web Services Enterprise Beans and Web Services
Select the Appropriate Use of JPA and JPQL in a Given Scenario
Java Persistence API (JPA) Java Persistence Query Language (JPQL)
Two-Minute Drill Q&A Self Test Self Test Answers
6. Web Tier Technologies
Web Tier Development Roles Identify the Benefits and Drawbacks of Using URL Rewriting and Cookies to Manage HTTP Session State
HttpSession Object Session State Tracking: Should We Use Cookies or URL Rewrite? Maintaining State Using JEE Session Beans Exercise 6-1: Session State Servlets
Identify Appropriate Uses for JSP and Servlet Technology, and JavaServer Faces in a Given Java EE Application
Servlets JavaServer Page JavaServer Faces Scripting Languages Web Tier Input Data Validation Control and Logic Concerns Web Flow
Identify the Benefits of Using an EJB Container with a Web Container Instead of a Web Container Alone
Benefits of Enterprise Beans Session Beans Message-Driven Bean (MDB)
Identify the Differences between Client Pull and Server Push Architectures Identify the Benefits and Drawbacks of Using a Browser to Access Asynchronous, Lightweight Processes on the Server
Browser Asynchronous APIs
Two-Minute Drill Q&A Self Test Self Test Answers
7. Design Patterns
Benefits of Using Design Patterns Design Patterns by Gamma et al., AKA the “Gang of Four” (GoF) Benefits of a Specified GoF Design Pattern Select an Appropriate Gang of Four (GoF) Pattern for a Given Application Challenge
GoF Creational Design Patterns GoF Structural Design Patterns GoF Behavioral Design Patterns
Identify a Gang of Four (GoF) Design Pattern, Using a Description of Its Features
Java EE Patterns
Demonstrate Knowledge of Java EE Design Patterns Identify the Use of the Law of Leaky Abstractions or a Specific Anti-Pattern in a Given Scenario Two-Minute Drill Q&A Self Test Self Test Answers
8. Security
Identify Elements of the Security Model in the Java SE Environments for Remote Clients, Including Web Start, Applets, and the Role of the SecurityManager Class
Java Web Start Java Applet The Security Manager More Java SE Security Features/Mechanisms
Select Appropriate Locations to Implement Java EE Security Technologies or Features in a UML Component and Deployment Diagram
Java EE Security Depicted within UML Component Diagram Java EE Security Depicted within UML Deployment Diagram
Classify Security Threats to an Enterprise Application and Select the Measures an Architect Can Propose to Mitigation Them
Security Architectures Security Threats
Identify Techniques Associated with Declarative and Programmatic Security, Including the Use of Annotations, Deployment Descriptors, and JAAS Technology
Security Model Securing Web Components Securing Enterprise Bean Components Java Authentication and Authorization Service (JAAS)
Identify the Security Technologies That Apply to an Application’s Code, Messaging, and Transport Layers
Application-Layer Security Message-Layer Security Transport-Layer Security
Two-Minute Drill Q&A Self Test Self Test Answers
A. Java (EE) Enterprise Architect Certified Master Assignment
Scenario
WebSphere Application Server Continuous Trade Processing System SQLBIS Database Server
Model and Develop the Case Study
Actor Definition Business Process Model Sequence Diagrams Class Descriptions Class Diagrams State Transition (Life Cycle) Diagrams
Trade System Design and Implementation
Stock Order Entry Screen Trade Application Packages Trade Application Implementation Infrastructure Deployment Diagrams Final Tips
B. Java (EE) Enterprise Architect Certified Master Essay Exam
The Case Study Infrastructure
Application Servers Continuous Trade Processing SQLBIS Database Server
Essay Questions and Sample Answers
How Does Your Design Handle Availability? How Does Your Design Handle Reliability? How Does Your Design Handle Scalability? How Does Your Design Handle Performance? How Does Your Design Handle Security? How Does Your Design Handle Extensibility? How Does Your Design Handle Maintainability? How Does Your Design Handle Manageability? How Does Your Design Handle Persistence? How Does Your Design Handle the Presentation Tier?
Before the Exam: Prepare and Practice
How to Proceed at the Exam
C. About the Download
System Requirements Installing and Running Total Tester
About Total Tester
Technical Support
Glossary Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion