Addison wesley enterprise java programming with IBM websphere 2nd edition dec 2003 ISBN 032118579x

1.3K 457 0
Addison wesley enterprise java programming with IBM websphere 2nd edition dec 2003 ISBN 032118579x

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

• • • Table of Contents Index Examples Enterprise Java™ Programming with IBM® WebSphere®, Second Edition By Kyle Brown, Gary Craig, Greg Hester, Russell Stinehour, W David Pitt, Mark Weitzel, Jim Amsden, Peter M Jakab, Daniel Berg Publisher : Addison Wesley Pub Date : December 15, 2003 ISBN : 0-321-18579-X Pages : 960 Enterprise Java Programming with IBM WebSphere, Second Edition is the definitive guide tobuilding mission-critical enterprise systems with J2EE, WebSphere, and WebSphere StudioApplication Developer Fully updated for Versions 5.x of WebSphere Application Server andWebSphere Studio Application Developer, it combines expert architectural best practices with acase study that walks you through constructing an entire system The authors are an extraordinary team of WebSphere insiders: developers, consultants,instructors, and IBM WebSphere development team members Together, they offer unprecedentedinsight into the use and behavior of WebSphere's APIs in real-world environmentsandsystematic guidance for delivering systems of exceptional performance, robustness, and businessvalue Coverage includes Sum Practical introductions to J2EE, WebSphere Application Server 5.0, and Web application architecture Sum Detailed coverage of Web application construction, including MVC partitioning with Struts, servlets/JSP, and session management Sum Step-by-step guidance for building and testing application business models, including JUnit testing Sum In-depth insight into EJB architecture, including transactions, security, and advanced object relational mapping Sum Web services: examples and best practices leveraging WebSphere Application Server 5.x's latest enhancements • • • Table of Contents Index Examples Enterprise Java™ Programming with IBM® WebSphere®, Second Edition By Kyle Brown, Gary Craig, Greg Hester, Russell Stinehour, W David Pitt, Mark Weitzel, Jim Amsden, Peter M Jakab, Daniel Berg Publisher : Addison Wesley Pub Date : December 15, 2003 ISBN : 0-321-18579-X Pages : 960 Copyright IBM Press Series�Information Management On Demand Computing Books DB2 Books More Books from IBM Press Foreword Preface Here We Go Again About Us The Goals We Have Set Acknowledgements and Thanks Chapter 1 Introduction Section 1.1 Why Software Development Must Consider the Whole Enterprise Section 1.2 How Iterative Development Addresses Key IT Management Issues Section 1.3 Today's Enterprise Applications Have New Requirements Section 1.4 What Is the Starting Point? Section 1.5 What Is a Layered Architecture? Section 1.6 Layered Architecture Benefits Section 1.7 Summary Chapter 2 Introduction to the Case Study Section 2.1 Case Study Analysis and Design Artifacts Section 2.2 Use Case Definitions Section 2.3 Designing the Case Study Domain Model Section 2.4 Using the Case Study in Our Book Section 2.5 Summary Chapter 3 J2EE Overview Section 3.0.1 J2EE Component Design Section 3.0.2 Configurable Implementations Section 3.0.3 Configurable Algorithms Section 3.0.4 Who Defines These Specifications? Section 3.1 Why J2EE? Section 3.2 J2EE Architecture Section 3.3 J2EE Platform Roles Section 3.4 J2EE Versions and Evolution Section 3.5 A J2EE Perspective Section 3.6 Summary Chapter 4 What Is WebSphere? Section 4.1 WebSphere Foundation and Tools Section 4.2 The WAS Core Architecture Section 4.3 Administering a local WAS Server Section 4.4 Leveraging the Scalability of WAS ND Section 4.5 Summary Chapter 5 Presentation Layer Patterns Section 5.1 Java User Interface Technologies Section 5.2 Decoupling the User Interface Section 5.3 Mediating Logical View Logic Section 5.4 Summary Chapter 6 Servlets Section 6.1 HTTP Technology Primer Section 6.2 Servlet Concepts Section 6.3 Servlet Life Cycle Section 6.4 An Example Servlet Section 6.5 Web Deployment Descriptors Section 6.6 Filters Section 6.7 Servlet API Classes and Interfaces Section 6.8 Summary Chapter 7 Developing Servlets Using IBM WebSphere Studio Application Developer Section 7.1 The IBM WebSphere Studio Family of Tools Section 7.2 Building an Example Servlet with WSAD Section 7.3 Some Problems with This Example Section 7.4 Summary Chapter 8 Testing Servlets Using WSAD Section 8.1 Edit the Web Deployment Descriptor Section 8.2 Summary Chapter 9 Managing Session State Section 9.1 Some Client-Side Session Approaches Section 9.2 Servlets and Session State Section 9.3 Choosing the Right Approach Section 9.4 Session Persistence Section 9.5 Summary Chapter 10 JavaServer Pages Concepts Section 10.1 Page Templates and Server-Side Scripting Section 10.2 A Short History of Java Server Pages Section 10.3 B.4 Using the Existing J2SE Client Now that we have a working service within WSAD, we would like to use our exiting J2SE client to invoke it This requires a few simple changes to the main method of the WSRandomIDGeneratorClient.java file in the WSUtilityClientJ2SE project First, the URL of the WSDL file should be provided in the create service method The service's URL is http://localhost:9080/WSUtilityGroupRouter/wsdl/com/wsbook/casestudy/ejb/utilities/R Next, since the service endpoint was generated by WSAD, the service name and port do not contain the WS prefix that was used earlier, making it necessary to update the service name and the port name in the code The following is the updated createService and getPort methods: public static void main (String[] args) throws Exception { try{Service aService = ServiceFactory.newInstance().crea new URL ("http://localhost:9080/WSUtilityGroupRouter/wsd /utilities/RandomIDGenerator.wsdl"), new QName ("http://utilities.ejb.casestudy.wsbook.com","RandomIDGenerator WSRandomIDGenerator idGenService = (WSRandomIDGenerator) aService.getPort( new QName("http://utilities.ejb.casestudy.wsbook "RandomIDGenerator"), WSRandomIDGenerator.class); Note that in the last line of the code, the class file still contains the WS prefix The WSRandomIDGenerator.class is the client side interface that resides in the com.wsbook.casestudy.ejb.utilities package within the WSUtilityClientJ2SE project The client can be executed from the Run menu option just as in Chapter 33 The results will be a random number conveniently displayed in the console B.5 Summary WSAD 5.1 includes a robust, feature-rich tool set the helps the developer create and use industry standard, WS-I compliant Web services for the J2EE platform Bibliography [Alur] Deepak Alur, John Crupi, and Dan Malks, Core J2EE Patterns: Best Practices and Design Strategies, (Reading, MA: Addison-Wesley, 2001) [Beck] Kent Beck, Extreme Programming Explained: Embrace Change (Reading, MA: Addison-Wesley, 2000) [Blueprints] Sun Microsystems, Java Blueprints, available from: http://java.sun.com/blueprints/ [Booch] Grady Booch, Object-Oriented Analysis and Design with Applications, 2nd Ed (Reading, MA: Addison-Wesley, 1993) [Brooks] Frederick Brooks, The Mythical Man Month: Essays on Software Engineering, Ann Ed (Reading, MA: Addison-Wesley, 1995) [Brown00] Kyle Brown, "Choosing the Right EJB Type," VisualAge Developer's Domain, October 2000, available at: http://www7.software.ibm.com/vad.nsf/data/document2361? OpenDocument&p=1&BCT=1&Footer=1 [Buschmann] Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, and Michael Stal, Pattern Oriented Software Engineering: A System of Patterns (West Sussex, England: John Wiley & Sons, 1996) [EJB] Sun Microsystems, EJB 2.0 Specification, available from: http://java.sun.com/products/ejb/docs.html [Evans] Eric Evans, Domain Driven Design: Tackling Complexity at the Heart of Software (Reading, MA: Addison-Wesley, 2003) [Fowler99] Martin Fowler and Kendall Scott, UML Distilled: A Brief Guide to the Standard Object Modeling Language, 2nd Ed (Reading, MA: Addison-Wesley, 1999) [Fowler] Martin Fowler with David Rice, Matthew Foemmel, Edward Hieatt, Robert Mee, and Randy Stafford, Patterns of Enterprise Application Architecture, (Reading, MA: Addison-Wesley, 2002) [Francis ] Tim Francis, Eric Herness, Rob High, Jim Knutson, Kim Rochet, and Chris Vignola, Professional IBM WebSphere 5.0 Application Server (Birmingham, United Kingdom: Wrox Books, 2003) [Gamma] Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns: Elements of Reusable Object-Oriented Design (Reading, MA: Addison-Wesley, 1996) [Hohpe] Gregor Hohpe and Bobby Woolf with Conrad D'Cruz, Sean Neville, Jonathan Simon, Martin Fowler, and Kyle Brown, Patterns and Best Practices for Enterprise Integration (Reading, MA: Addison-Wesley, 2003) [IBM-JMS] MQ Series Using Java, available from: http://www.ibm.com/software/integration/mqfamily/library/manualsa/csqzaw04/csqzaw [Jacobson] Ivar Jacobson, Grady Booch, and James Rumbaugh, The Unified Software Development Process, (Reading, MA: Addison-Wesley, 1999) [JDBC] Sun Microsystems, JDBC 2.0 Specification, available at: http://java.sun.com/products/jdbc/download.html [MacKinnon] Tim MacKinnon, "Endotesting: Unit Testing with Mock Objects," available at http://www.mockobjects.com/endotesting.html [Marinescu] Floyd Marinescu, EJB Design Patterns: Advanced Patterns, Processes and Idioms (New York, NY: John Wiley & Sons, 2001) [Monson-Haefel] Richard Monson-Haefel, Enterprise JavaBeans, 3rd Ed (Sebastapol, CA: O'Reilly & Associates, 2001) [Orfali] Robert Orfali and Dan Harkey, Client Server Programming with Java and CORBA, 2nd Ed (New York, NY: John Wiley & Sons, 1998) [RFC 2396] W3C RFC 2396, Uniform Resource Identifiers Generic Syntax, available at: http://www.ietf.org/rfc/rfc2396.txt [Shavor] Sherry Shavor, Jim D'Anjou, Dan Kehn, Scott Fairbrother, Dan Kellerman, and Pat McCarthy, The Java Developer's Guide to Eclipse (Reading, MA: Addison-Wesley, 2003) [Sun] Sun Microsystems, Web Services blueprints, available from: http://java.sun.com/blueprints/webservices [Willenborg] Ruth Willenborg, "WebSphere version 5.0 Performance Report," available from: http://www.ibm.com [WSDL] W3C, Web Services Definition Language Specification, available from: http://www.w3.org/TR/wsdl [WS-I] Web Services Interoperability Organization, WS-I Basic Profile, available from: http://www.ws-i.org/Documents.aspx LICENSE AGREEMENT AND LIMITED WARRANTY READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY BEFORE OPENING THIS CD PACKAGE THIS LEGAL DOCUMENT IS AN AGREEMENT BETWEEN YOU AND PRENTICE-HALL, INC (THE "COMPANY") BY OPENING THIS SEALED CD PACKAGE, YOU ARE AGREEING TO BE BOUND BY THESE TERMS AND CONDITIONS IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, DO NOT OPEN THE CD PACKAGE PROMPTLY RETURN THE UNOPENED CD PACKAGE AND ALL ACCOMPANYING ITEMS TO THE PLACE YOU OBTAINED THEM FOR A FULL REFUND OF ANY SUMS YOU HAVE PAID GRANT OF LICENSE: In consideration of your purchase of this book, and your agreement to abide by the terms and conditions of this Agreement, the Company grants to you a nonexclusive right to use and display the copy of the enclosed software program (hereinafter the "SOFTWARE") on a single computer (i.e., with a single CPU) at a single location so long as you comply with the terms of this Agreement The Company reserves all rights not expressly granted to you under this Agreement OWNERSHIP OF SOFTWARE: You own only the magnetic or physical media (the enclosed CD) on which the SOFTWARE is recorded or fixed, but the Company and the software developers retain all the rights, title, and ownership to the SOFTWARE recorded on the original CD copy(ies) and all subsequent copies of the SOFTWARE, regardless of the form or media on which the original or other copies may exist This license is not a sale of the original SOFTWARE or any copy to you COPY RESTRICTIONS: This SOFTWARE and the accompanying printed materials and user manual (the "Documentation") are the subject of copyright You may not copy the Documentation or the SOFTWARE, except that you may make a single copy of the SOFTWARE for backup or archival purposes only You may be held legally responsible for any copying or copyright infringement which is caused or encouraged by your failure to abide by the terms of this restriction USE RESTRICTIONS: You may not network the SOFTWARE or otherwise use it on more than one computer or computer terminal at the same time You may physically transfer the SOFTWARE from one computer to another provided that the SOFTWARE is used on only one computer at a time You may not distribute copies of the SOFTWARE or Documentation to others You may not reverse engineer, disassemble, decompile, modify, adapt, translate, or create derivative works based on the SOFTWARE or the Documentation without the prior written consent of the Company TRANSFER RESTRICTIONS: The enclosed SOFTWARE is licensed only to you and may not be transferred to any one else without the prior written consent of the Company Any unauthorized transfer of the SOFTWARE shall result in the immediate termination of this Agreement TERMINATION: This license is effective until terminated This license will terminate automatically without notice from the Company and become null and void if you fail to comply with any provisions or limitations of this license Upon termination, you shall destroy the Documentation and all copies of the SOFTWARE All provisions of this Agreement as to warranties, limitation of liability, remedies or damages, and our ownership rights shall survive termination MISCELLANEOUS: This Agreement shall be construed in accordance with the laws of the United States of America and the State of New York and shall benefit the Company, its affiliates, and assignees LIMITED WARRANTY AND DISCLAIMER OF WARRANTY: The Company warrants that the SOFTWARE, when properly used in accordance with the Documentation, will operate in substantial conformity with the description of the SOFTWARE set forth in the Documentation The Company does not warrant that the SOFTWARE will meet your requirements or that the operation of the SOFTWARE will be uninterrupted or error-free The Company warrants that the media on which the SOFTWARE is delivered shall be free from defects in materials and workmanship under normal use for a period of thirty (30) days from the date of your purchase Your only remedy and the Company's only obligation under these limited warranties is, at the Company's option, return of the warranted item for a refund of any amounts paid by you or replacement of the item Any replacement of SOFTWARE or media under the warranties shall not extend the original warranty period The limited warranty set forth above shall not apply to any SOFTWARE which the Company determines in good faith has been subject to misuse, neglect, improper installation, repair, alteration, or damage by you EXCEPT FOR THE EXPRESSED WARRANTIES SET FORTH ABOVE, THE COMPANY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE EXCEPT FOR THE EXPRESS WARRANTY SET FORTH ABOVE, THE COMPANY DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATION REGARDING THE USE OR THE RESULTS OF THE USE OF THE SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY, CURRENTNESS, OR OTHERWISE IN NO EVENT, SHALL THE COMPANY OR ITS EMPLOYEES, AGENTS, SUPPLIERS, OR CONTRACTORS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR IN CONNECTION WITH THE LICENSE GRANTED UNDER THIS AGREEMENT, OR FOR LOSS OF USE, LOSS OF DATA, LOSS OF INCOME OR PROFIT, OR OTHER LOSSES, SUSTAINED AS A RESULT OF INJURY TO ANY PERSON, OR LOSS OF OR DAMAGE TO PROPERTY, OR CLAIMS OF THIRD PARTIES, EVEN IF THE COMPANY OR AN AUTHORIZED REPRESENTATIVE OF THE COMPANY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO EVENT SHALL LIABILITY OF THE COMPANY FOR DAMAGES WITH RESPECT TO THE SOFTWARE EXCEED THE AMOUNTS ACTUALLY PAID BY YOU, IF ANY, FOR THE SOFTWARE SOME JURISDICTIONS DO NOT ALLOW THE LIMITATION OF IMPLIED WARRANTIES OR LIABILITY FOR INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS MAY NOT ALWAYS APPLY THE WARRANTIES IN THIS AGREEMENT GIVE YOU SPECIFIC LEGAL RIGHTS AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY IN ACCORDANCE WITH LOCAL LAW ACKNOWLEDGMENT YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, UNDERSTAND IT, AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS YOU ALSO AGREE THAT THIS AGREEMENT IS THE COMPLETE AND EXCLUSIVE STATEMENT OF THE AGREEMENT BETWEEN YOU AND THE COMPANY AND SUPERSEDES ALL PROPOSALS OR PRIOR AGREEMENTS, ORAL, OR WRITTEN, AND ANY OTHER COMMUNICATIONS BETWEEN YOU AND THE COMPANY OR ANY REPRESENTATIVE OF THE COMPANY RELATING TO THE SUBJECT MATTER OF THIS AGREEMENT Should you have any questions concerning this Agreement or if you wish to contact the Company for any reason, please contact in writing at the address below Robin Short Prentice Hall PTR One Lake Street Upper Saddle River, New Jersey 07458 About the CD-ROMs Contents Disc 1 IBM® WebSphere® Studio Application Developer, Version 5.0.2, for Windows® (Trial Edition) IBM® DB2® Universal Database™ Personal Edition, Version 8.1.2, for Windows® Operating Environments (Evaluation Copy) Disc 2 IBM® WebSphere® Studio Application Developer, Version 5.0.2, for Windows® (Trial Edition) Disc 3 IBM® WebSphere® Application Server Version 5.0, for Windows® (Trial Edition) IBM® WebSphere® Application Server, 5.0.2 Update Examples and source code from the book The CD-ROMs can be used on Microsoft Windows® 2000 and XP License Agreement Use of the material on these CDs is subject to the terms of the License Agreement and Limited Warranty, found on the previous two pages Warranty Addison-Wesley warrants the enclosed CD-ROM to be free of defects in materials and faulty workmanship under normal use for a period of ninety days after purchase If a defect is discovered in the CD-ROM during this warranty period, a replacement CD-ROM can be obtained at no charge by sending the defective CD-ROM, postage prepaid, with proof of purchase to: Editorial Department Addison-Wesley Professional/Pearson Technology Group 75 Arlington Street, Suite 300 Boston, MA 02116 Email: AWPro@aw.com Addison-Wesley makes no warranty or representation, either expressed or implied, with respect to this software, its quality, performance, merchantability, or fitness for a particular purpose In no event will Addison-Wesley, its distributors, or dealers be liable for direct, indirect, special, incidental, or consequential damages arising out of the use or inability to use the software The exclusion of implied warranties is not permitted in some states Therefore, the above exclusion may not apply to you This warranty provides you with specific legal rights There may be other rights that you may have that vary from state to state The contents of this CD-ROM are intended for personal use only More information and updates are available at: http://www.awprofessional.com/ [M] [M] message URL http //localhost 9080/TimeSheetGroup/services/WSReportActionProcessorFacade/wsdl/WSRe //schemas.xmlsoap.org/soap/encoding/ 2nd ... Sum Web services: examples and best practices leveraging WebSphere Application Server 5.x's latest enhancements • • • Table of Contents Index Examples Enterprise Java Programming with IBM WebSphere , Second Edition By Kyle Brown, Gary Craig, Greg Hester, Russell Stinehour, W... Publisher : Addison Wesley Pub Date : December 15, 2003 ISBN : 0-321-18579-X Pages : 960 Copyright IBM Press Series�Information Management On Demand Computing Books DB2 Books More Books from IBM Press... Developing Servlets Using IBM WebSphere Studio Application Developer Section 7.1 The IBM WebSphere Studio Family of Tools Section 7.2 Building an Example Servlet with WSAD Section 7.3 Some Problems with This Example

Ngày đăng: 26/03/2019, 16:03

Mục lục

  • Enterprise Java Programming with IBM WebSphere, Second Edition

  • Table of Contents

  • Copyright

  • IBM Press Series-Information Management

    • On Demand Computing Books

    • DB2 Books

    • More Books from IBM Press

    • Foreword

    • Preface

      • Here We Go Again

      • About Us

      • The Goals We Have Set

      • Acknowledgements and Thanks

      • Chapter 1. Introduction

        • 1.1 Why Software Development Must Consider the Whole Enterprise

        • 1.2 How Iterative Development Addresses Key IT Management Issues

        • 1.3 Today's Enterprise Applications Have New Requirements

        • 1.4 What Is the Starting Point?

        • 1.5 What Is a Layered Architecture?

        • 1.6 Layered Architecture Benefits

        • 1.7 Summary

        • Chapter 2. Introduction to the Case Study

          • 2.1 Case Study Analysis and Design Artifacts

          • 2.2 Use Case Definitions

Tài liệu cùng người dùng

Tài liệu liên quan