E-books in Russian and English
|
| date: 14 мая 2008 / author: izograv / категория: Java/Javacript / views: 3488 / comments: 0 Java CAPS Basics: Implementing Common EAI Patterns by Michael Czapski, Sebastian Krueger, Brendan Marry, Saurabh Sahai, Peter Vaneris, Andrew Walker Use Java CAPS to Streamline IT Services and Leverage Legacy Applications Design patterns are a useful tool for streamlining enterprise integration and Web development projects: the mission-critical projects that directly impact your competitiveness. Enterprise Integration Patterns by Gregor Hohpe and Bobby Woolf (Addison-Wesley, 2004) described many of the most useful patterns for enterprise developers. Until recently, however, implementing the patterns in that classic reference required the extensive use of raw Java code. Now there’s a better alternative: Using Sun’s Java Composite Application Suite (Java CAPS), architects and developers can implement enterprise integration patterns succinctly, elegantly, and completely. In Java™ CAPS Basics, Sun’s own Java CAPS experts show how to quickly put these new tools and technologies to work in your real-world enterprise application integration projects. After reviewing the challenges of enterprise integration, they introduce Java CAPS and show how it can simplify the development of today’s state-of-the-art “composite” applications. Next, they bridge the gap between abstract pattern languages and practical implementation details. You will learn essential Java CAPS concepts and methods in the context of the patterns you’ll actually use for real-world message and system management. Coverage includes * Comparing approaches to enterprise application integration and finding ways to integrate non-invasively, with fewer changes and lower costs * Mastering the core integration tools provided by Java CAPS: eGate, eInsight, eWays and JMS * Using enterprise integration patterns to improve application reusability, scalability, resilience, security, and manageability * Implementing patterns for message exchange, correlation, infrastructure, routing, construction, transformation, and endpoints * Generating and using cryptographic objects such as X.509 Certificates, PKCS#12, and JKS Keystores * Using advanced techniques such as solution partitioning and subprocess implementation, many of which are covered nowhere else * Constructing two complete example solutions that bring together many of the patterns discussed and illustrated in this book
Comments: 0
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget