Index - Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications [Electronic resources] - نسخه متنی

Gregory Nyberg, Robert Patricket al

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Index

S


scalability, 542

scripting, 8, 9–10

scriptlet, 9, 17–20

search page, displaying with list of model objects, 44

Secure Socket Layer/Transport Layer Security. See SSL/TLS

security

application, 434–443, 443–449

default providers

authentication, 402–404

authorization and adjudication of users, 406

configuration, managing, 407–409

events, logging, 407

identity asserters, 404–405

listed with features, 400–401

older version of WebLogic, running, 410

role mapping and credential mapping, 407

described, 395–397

external stores, 410–416

Java clients, 425–434

LDAP server, embedded, 398–400

production

application data flow, 654–655

connection filter, 656–658

firewall layouts, 655–656

SSL hardware acceleration, 663

Web applications, 658–660

SSL/TLS

client and server verify each other, 416, 421–425, 430, 431

client verifying server, 416, 420–421, 429–430, 431

debugging, 425

described, 416–417

X.509 certificates, obtaining, 418–420

views based on, 44–45

Web applications

access-control checks during server-side forwards, 658

authorization/authentication administration, 126–131

descriptor files, 152, 158

session ID cookies, 659–660

users and groups, 174–176

Web Services, 710–715

Select methods, 196–198

selectors, designing, 367–369

self-health monitoring, 474

sending later, messages, 350–351

server. See also domain

asynchronous JMS messages, consuming, 384–389

and client verify each other, 416, 421–425, 430, 431

client verifying, 416, 420–421, 429–431

connections, verifying (PING command), 520

deployment strategies, 636–638

forwards, access-control checks during, 658

JMS resources, 509–511

LDAP security, 398–400

migrating, WebLogic JMS provider, 346–347

precompiling JSP components, benefits of, 160

traffic, distributing among multiple, 652–653

validating forms, 49

WebLogic JMS provider, 338

server affinity, JMS, 342

servlet

architecture based on, choosing, 56, 58–60, 68

code, viewing generated, 36–37

converting to JSP, 8–9

JMS, 382–384

page display, 75–77

servlet filter, directing to certain, 29

Web application, 152, 154–155

WebLogic server performance, optimizing, 572

servlet filter, 28–32

session

API, JMS 1.02b, 332–333

configuration, 152, 158

data, storing, 569–571

JavaServer Pages, efficient use of, 571

JSP implicit object, 11

multicast JMS, 378–379

replication, 462, 644–645

response data, cached, 125

routing based on, 462–464

tracking, 6–8, 12

Web Services, 696–697

session beans, 111, 207–211, 293–294

session faade, 260–261, 568

session ID, securing, 659–660


SFSB (stateful session beans), 180–181

shared secret credential, 405

shell interface, 608–609

shutdown, forcing WebLogic Server, 471–472

Simple Network Management Protocol. See SNMP

Simple Object Access Protocol. See SOAP

single-site deployment strategies

complex clusters, 641–643

described, 638–639

Simple WebLogic Server cluster, 639–641

single-threaded servlets, 4–5

sites, distributing traffic among multiple. See global traffic management

skeleton application, constructing, 91–92

Skoczylas, Robert (Developing Java Web Services: Architecting and Developing Secure Web Services Using Java), 665


SLSB (stateless session beans), 178–179


SNMP (Simple Network Management Protocol), 529–533


SOAP (Simple Object Access Protocol), 666, 702–708

socket

connections, managing, 453, 458–460, 596

maximum number open, 484

tuning, 545

socket muxer, 453, 458–460, 596

software, required, 598–601

Solaris operating system, 413, 545–547

sorting messages, 349–350, 376

sources, refusing traffic from unknown or untrusted. See connection filter

spreadsheet applications, 33–36

SQL statements

CMP entity beans, 250–252

lazy retrieval, 240–243

n + 1 problem, 232–235

submitting as unit, 582

updates, including in Finder queries, 236–238

SQL*Server identity column, 249

Sriganesh, Rima Patel (Developing Java Web Services: Architecting and Developing Secure Web Services Using Java), 665


SSL/TLS (Secure Socket Layer/Transport Layer Security)

client and server verify each other, 416, 421–425, 430, 431, 711

client verifying server, 416, 420–421, 429–431, 710–711

debugging, 425

described, 416–417

hardware acceleration, 663

Java clients, security-aware

application authentication, 433

hostname verification, 433

programmatic HTTP, 431–433

RMI clients, 429–431

trust managers, 434

Web Services, 433

message-level security, 712–714

X.509 certificates, obtaining, 418–420

stand-alone server, 173–174

standby mode, 473

startup

applications, scanning for new, 167–170

preloading servlets at, 3

WebLogic Server in debug mode, 616–617

state

current with, 591–596

information, preserving from request to request, 6–8

WebLogic server, 472–474

stateful session beans. See SFSB

stateless services, 277–281

stateless session beans. See SLSB

states, drop-down list of, 101

Stevens, David L. (Internetworking with TCP/IP Volume II: Design, Implementation, and Intervals), 545

stores, JMS resources, 509–511

string, 368, 533

style sheets, Web sites, 46

submission/bookmark controls, 54

subscriptions, 330, 387–388

Sun HotSpot, 554–558, 560

Sun Performance and Tuning: Java and the Internet (Cockroft and Pettit), 542

/ 125