Index - Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications [Electronic resources] - نسخه متنی

Gregory Nyberg, Robert Patricket al

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Index

T


Tag Handler Class, 21

tag library, 10, 152

Tag Library Descriptor. See TLD File

tags, JSP, 9–10

targeted offer, reservation application, 121–125

Tate, Bruce A. (Bitter Java), 567

TCP time wait interval, 493

TCP/IP connections, 544–545

templates

building/replay wizards, 609–610

common connection attributes, 331, 347–349, 514–515

JMS, 349

testing

JUnit framework

deploying and executing, 624–627

described, 621–622

with J2EE applications, 623–624

organizing, 628–629

tests, creating, 622–623

servlet code, viewing generated, 36–37

thread dump, 535, 593

threads

blocked, 594–595

execute, 453, 454–458, 516, 563–566

JVM, current state, 591–596

listen, 453, 460

memory, locking, 213–215

safety, importance of, 3–4

threshold, JMS destination, 356–359

timeout, 497, 570

timestamp concurrency strategy, 220–221

time-to-deliver extension, JMS (Java Message Service), 350–351

timing database inserts, 239–240


TLD (Tag Library Descriptor) File, 21

topic, 345–346

traffic management. See load balancing

transaction

affinity, JMS, 342

caching between entity beans, 223–225

collocation requirements, 645

database access performance, 580–581

direct access to entity beans, 82

failures, 217

JDBC connection pooling and, 501

JMS, 376–378

MDBs, 386–387

migration issues, 538

transparency, location, 339

transport-level Web Services security, 710–712

traps, SNMP, 530–533

troubleshooting

applications, 534–535

bottlenecks, identifying and correcting, 584–586

high CPU utilization and poor application server throughput, 588–589

low activity and CPU utilizations, 590

preparing, 584

resolution process, 587–588

trust managers, 434

Turbine framework, 60

two-way security, 416, 421–425, 430, 431

/ 125