Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications [Electronic resources]

Gregory Nyberg, Robert Patricket al

نسخه متنی -صفحه : 125/ 105
نمايش فراداده

Index

E

editing, Java-aware, 612–613

EJB Design Patterns: Advanced Patterns, Processes, and Idioms (Marinescu), 41, 567

EJB (Enterprise JavaBeans)

compiler, 302–306

components

BMP, 185–187

CMP, 187–194, 196–198

constructing, 281–292

described, 181–182, 185

home methods, 198–199

locating in descriptor files, 153, 156–157

MDB, 199–200, 294–295

methods required, 182–185

references, obtaining with Finder methods, 194–196

data access, 267, 269

deploying, 322–327

described, 259

JMS, 382–384

logic, 260–261, 268

objects, mapping to relational database, 261–267, 268

overview, 177–178

packaging

archive files, 298–306, 320–322

described, 297–298, 306–309

descriptor files, 312–316

directory structure, 309–311

exploded, 318–320

utility archives, 316–318

security, 440–442

session beans, 293–294

SFSB, 180–181

stateless service

with entity bean persistence, 272–276

entity beans and direct interaction, 277–280

JDBC, 270–272

SLSB, 178–179

values objects and direct interaction with entity beans, 280–281

EJB (Enterprise JavaBeans) container

caching strategies, 223–230

deployment/redeployment, 203

described, 200–201

dynamic compiling, 203–204

life cycle, 201–203

performance, 572–578

referencing other EJB components, 204–207

EJBGen utility

attributes, configuring (class-level tags), 284–286

descriptor elements and interface classes (method-level tags), 286–287

invoking, 287–288

EJB-QL function, 250–252

email confirmations, 294–295, 516

enterprise applications

packaging

archive file (.ear files), 320–322

described, 306–309

descriptor files, 312–316

directory structure, 309–311

exploded, 318–320

utility archives, 316–318

security, 442–443

Enterprise JavaBeans. See EJB

Enterprise JavaBeans (Monson-Haefel), 177

entity beans

caching strategies

combined support, 230–232

read-mostly pattern, 226–230

read-only multicast invalidation, 225–226

between transactions, 223–225

CMP

cascading deletes, 253–255

dynamic queries, 252–253

existence, checking for, 255–256

mapping attributes and foreign keys to multiple database tables, 249–250

numeric primary key, 247–249

SQL support, 250–252

components

BMP, 185–187

CMP, 187–194, 196–198

described, 181–182, 185

home methods, 198–199

MDB, 199–200

methods required, 182–185

references, obtaining with Finder methods, 194–196

concurrency strategies

changes, handling one per transaction, 219–223

described, 211–213

memory, locking, 213–215

read-only, 218

simultaneous transactions, rejecting, 215–217

constructing, 288–292

direct interaction, 277–280

local references, 86

optimizing, 574–576

persistence with stateless service, 272–276

tuning strategies

CMP, relationship caching with, 244–246

database inserts, timing, 239–240

database operations, batching, 238–239

lazy retrieval, controlling using field groups, 240–243

loading beans during Finder operations, 232–235

updates, 236–238

error

application information, outputting, 14–17

descriptor files, 152

display form update, 49–50

handling with JSP pages, 96–97

error handling. See poison messages

events, logging, 407

exceptions, handling at end of bean life cycle, 222

execute queues

administering and deploying, 453, 454–458

application-specific, optimizing, 566–567

WebLogic server domain, configuring, 516

execute threads

administering and deploying, 453, 454–458

counts, tuning, 563–566

WebLogic server domain, configuring, 516

existence, checking for CMP entity beans, 255–256

expiration, messages, 369–372

exploded application, 164–166, 318–320

expression, 9, 32–33

eXtensible Markup Language. See XML

external objects, mapping to WebLogic JNDI, 391

external providers, JMS (Java Message Service), 389

extracting data from forms, 48–49

eXtreme Programming. See XP

Extreme Programming Explained: Embrace Change (Beck), 598