舉報

會員
Developing Middleware in Java EE 8
Abdalla Mahmoud 著
更新時間:2021-07-23 19:25:09
開會員,本書免費讀 >
Enterprisearchitects,designers,developers,andprogrammerswhoareinterestedinlearninghowtobuildrobustmiddlewaresolutionsforenterprisesoftwarewillfindthisbookuseful.PriorknowledgeofJavaEEisessential.
最新章節
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- Summary
- Designing and implementing the frontend
- Designing and implementing the backend
- Seat-booking application
品牌:中圖公司
上架時間:2021-07-23 17:43:56
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Leave a review - let other readers know what you think 更新時間:2021-07-23 19:25:09
- Other Books You May Enjoy
- Summary
- Designing and implementing the frontend
- Designing and implementing the backend
- Seat-booking application
- Using encoders
- Maintaining user state
- Accepting path parameters
- Lifecycle events
- Creating a client web page
- Creating an endpoint
- Sending and receiving messages
- How does WebSockets work?
- Understanding WebSockets
- Making Interactive Applications with WebSockets 1.1
- Summary
- Form authentication
- Basic authentication
- Authentication mechanisms
- Security context
- Creating an HTTP authentication mechanism
- Creating a custom identity store class
- Custom identity store
- LDAP identity store
- Database identity store
- Identity stores
- Mapping security configuration to the user database
- Defining users and associated roles in a database
- Mentioning who's allowed to access the web page
- Creating a web page to protect
- Basic login example
- Identity store
- Caller principal
- Caller
- Authentication mechanism
- Terminology
- Securing an Application with Java Security 1.0
- Summary
- Sending an email with attachments
- Setting To CC and BCC fields
- Sending an HTML email message
- Sending an email
- SMTP
- POP3 and IMAP
- Explaining mail protocols
- Sending Mails with JavaMail 1.6
- Summary
- Object messages
- Map messages
- Text messages
- Sending and receiving messages
- Creating a message-driven bean
- Message-Driven Beans
- Putting them all together
- Injecting destinations
- Injecting connection factories
- Creating destinations
- Creating connection factories
- Using JMS resources with annotations
- Creating the consumer
- Creating the producer
- Creating a connection factory
- Creating a destination
- Creating administered objects
- First JMS application
- Publish-subscribe
- Point-to-point style
- Messaging styles
- Administered objects
- Messages
- JMS clients
- JMS provider
- Architecture
- Java Messaging System (JMS)
- Message-Oriented Middleware
- Communicating with Different Systems with JMS 2.0
- Summary
- Using binary
- Formatting dates and numbers
- Handling nulls
- Ignoring properties
- Customizing property ordering
- Customizing naming strategies
- Customizing property names
- Formatting output
- Mapping collections
- Mapping objects
- Why JSON?
- Manipulating JSON with JSON-B 1.0
- Summary
- Server-sent events
- Mapping existing exceptions
- Declaring custom web application exceptions
- Handling exceptions
- Uploading files
- Custom responses
- Consuming JSON
- Returning JSON
- Enabling Moxy
- Handling JSON
- Using context objects
- Bean parameters
- Providing default values
- Header parameters
- Form parameters
- Path parameters
- Matrix parameters
- Query parameters
- Receiving parameters
- Sub-resources
- Handling HTTP methods
- Postman as a test tool
- Testing your web services
- Configuring a project for Jersey
- Writing a resource class
- Writing your first REST service
- HTTP response
- HTTP request
- Basics
- Understanding HTTP
- RESTful services
- SOAP services
- RESTful versus SOAP services
- What are web services?
- Exposing Web Services with JAX-RS 2.1
- Summary
- Adding more constraints
- Associating messages with attributes
- Defining a custom constraint
- Validating parameters and return values
- List of available constraints
- Graph validation
- Injecting the validator object
- Second approach – auto validation
- First approach – programmatic validation
- First validation example
- What's new in Bean Validation 2.0?
- Validating Data with Bean Validation 2.0
- Summary
- Polymorphic queries
- Comparing strategies
- Table per class strategy
- Joined table strategy
- Single table strategy
- Mapping inheritance
- Criteria queries
- Named queries
- Using native SQL queries
- DELETE entities
- Update entities
- Entity navigation
- Eliminating duplicates
- Selecting entities with projection
- Selecting entities with clauses
- Limiting records
- Ordering entities
- Selecting entities
- Query examples
- Positional parameters
- Named parameters
- Query parameters
- Basic syntax
- JPA query language
- Map collections of primitives
- Cascading
- Bidirectional relationships
- Many-to-many relationships
- Many-to-one relationships
- Mapping entity relationships
- Detaching an entity
- Deleting a record
- Updating an existing record
- Retrieving an existing record
- Inserting a new record
- Managed versus detached entities
- Performing CRUD operations
- Embedded objects
- Composite primary keys
- Ignoring properties
- Date and time mapping
- Column mapping
- Table mapping
- Primary keys
- Entity mapping
- Entities
- Step 4: Creating a data access object
- Step 3: Creating an entity class
- Step 2: Creating a persistence unit
- Step 1: Creating a data source
- Writing your first JPA application
- Architecture
- What's new in JPA 2.2?
- Accessing the Database with JPA 2.1
- Summary
- Using events
- Interceptor types
- Using interceptors
- Injection into the producer methods
- Scope of producer methods
- Using producers
- Initializer method parameter injection
- Bean constructor parameter injection
- Direct field injection
- Injecting beans
- Specifying a bean scope
- Using qualifiers
- Providing alternative implementations to your bean
- First CDI bean
- Creating your first CDI bean
- What's new in CDI 2.0?
- Dependency Injection Using CDI 2.0
- Summary
- Goodbye Java EE welcome Jakarta EE!
- Book project
- Relational database system
- Build tool
- Application server
- IDE
- Required software
- Security
- WebSockets
- Mailing
- Messaging
- JSON processing
- RESTful services
- Enterprise JavaBeans
- Data validation
- Data persistence
- Contexts and dependency injection
- Chapter roadmap
- Java EE architecture
- Enterprise applications
- What is Java EE?
- Delving into Java EE 8
- Reviews
- Get in touch
- Conventions used
- Download the color images
- Download the example code files
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewer
- About the author
- Contributors
- PacktPub.com
- Why subscribe?
- Packt Upsell
- Dedication
- Developing Middleware in Java EE 8
- Copyright and Credits
- Title Page
- 封面
- 封面
- Title Page
- Copyright and Credits
- Developing Middleware in Java EE 8
- Dedication
- Packt Upsell
- Why subscribe?
- PacktPub.com
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Delving into Java EE 8
- What is Java EE?
- Enterprise applications
- Java EE architecture
- Chapter roadmap
- Contexts and dependency injection
- Data persistence
- Data validation
- Enterprise JavaBeans
- RESTful services
- JSON processing
- Messaging
- Mailing
- WebSockets
- Security
- Required software
- IDE
- Application server
- Build tool
- Relational database system
- Book project
- Goodbye Java EE welcome Jakarta EE!
- Summary
- Dependency Injection Using CDI 2.0
- What's new in CDI 2.0?
- Creating your first CDI bean
- First CDI bean
- Providing alternative implementations to your bean
- Using qualifiers
- Specifying a bean scope
- Injecting beans
- Direct field injection
- Bean constructor parameter injection
- Initializer method parameter injection
- Using producers
- Scope of producer methods
- Injection into the producer methods
- Using interceptors
- Interceptor types
- Using events
- Summary
- Accessing the Database with JPA 2.1
- What's new in JPA 2.2?
- Architecture
- Writing your first JPA application
- Step 1: Creating a data source
- Step 2: Creating a persistence unit
- Step 3: Creating an entity class
- Step 4: Creating a data access object
- Entities
- Entity mapping
- Primary keys
- Table mapping
- Column mapping
- Date and time mapping
- Ignoring properties
- Composite primary keys
- Embedded objects
- Performing CRUD operations
- Managed versus detached entities
- Inserting a new record
- Retrieving an existing record
- Updating an existing record
- Deleting a record
- Detaching an entity
- Mapping entity relationships
- Many-to-one relationships
- Many-to-many relationships
- Bidirectional relationships
- Cascading
- Map collections of primitives
- JPA query language
- Basic syntax
- Query parameters
- Named parameters
- Positional parameters
- Query examples
- Selecting entities
- Ordering entities
- Limiting records
- Selecting entities with clauses
- Selecting entities with projection
- Eliminating duplicates
- Entity navigation
- Update entities
- DELETE entities
- Using native SQL queries
- Named queries
- Criteria queries
- Mapping inheritance
- Single table strategy
- Joined table strategy
- Table per class strategy
- Comparing strategies
- Polymorphic queries
- Summary
- Validating Data with Bean Validation 2.0
- What's new in Bean Validation 2.0?
- First validation example
- First approach – programmatic validation
- Second approach – auto validation
- Injecting the validator object
- Graph validation
- List of available constraints
- Validating parameters and return values
- Defining a custom constraint
- Associating messages with attributes
- Adding more constraints
- Summary
- Exposing Web Services with JAX-RS 2.1
- What are web services?
- RESTful versus SOAP services
- SOAP services
- RESTful services
- Understanding HTTP
- Basics
- HTTP request
- HTTP response
- Writing your first REST service
- Writing a resource class
- Configuring a project for Jersey
- Testing your web services
- Postman as a test tool
- Handling HTTP methods
- Sub-resources
- Receiving parameters
- Query parameters
- Matrix parameters
- Path parameters
- Form parameters
- Header parameters
- Providing default values
- Bean parameters
- Using context objects
- Handling JSON
- Enabling Moxy
- Returning JSON
- Consuming JSON
- Custom responses
- Uploading files
- Handling exceptions
- Declaring custom web application exceptions
- Mapping existing exceptions
- Server-sent events
- Summary
- Manipulating JSON with JSON-B 1.0
- Why JSON?
- Mapping objects
- Mapping collections
- Formatting output
- Customizing property names
- Customizing naming strategies
- Customizing property ordering
- Ignoring properties
- Handling nulls
- Formatting dates and numbers
- Using binary
- Summary
- Communicating with Different Systems with JMS 2.0
- Message-Oriented Middleware
- Java Messaging System (JMS)
- Architecture
- JMS provider
- JMS clients
- Messages
- Administered objects
- Messaging styles
- Point-to-point style
- Publish-subscribe
- First JMS application
- Creating administered objects
- Creating a destination
- Creating a connection factory
- Creating the producer
- Creating the consumer
- Using JMS resources with annotations
- Creating connection factories
- Creating destinations
- Injecting connection factories
- Injecting destinations
- Putting them all together
- Message-Driven Beans
- Creating a message-driven bean
- Sending and receiving messages
- Text messages
- Map messages
- Object messages
- Summary
- Sending Mails with JavaMail 1.6
- Explaining mail protocols
- POP3 and IMAP
- SMTP
- Sending an email
- Sending an HTML email message
- Setting To CC and BCC fields
- Sending an email with attachments
- Summary
- Securing an Application with Java Security 1.0
- Terminology
- Authentication mechanism
- Caller
- Caller principal
- Identity store
- Basic login example
- Creating a web page to protect
- Mentioning who's allowed to access the web page
- Defining users and associated roles in a database
- Mapping security configuration to the user database
- Identity stores
- Database identity store
- LDAP identity store
- Custom identity store
- Creating a custom identity store class
- Creating an HTTP authentication mechanism
- Security context
- Authentication mechanisms
- Basic authentication
- Form authentication
- Summary
- Making Interactive Applications with WebSockets 1.1
- Understanding WebSockets
- How does WebSockets work?
- Sending and receiving messages
- Creating an endpoint
- Creating a client web page
- Lifecycle events
- Accepting path parameters
- Maintaining user state
- Using encoders
- Seat-booking application
- Designing and implementing the backend
- Designing and implementing the frontend
- Summary
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-07-23 19:25:09