J2ee 1.4 documentation download
A good way to get to that point is to work through all the basic and some of the specialized trails in The Java Tutorial , Mary Campione et al. In particular, you should be familiar with relational database and security features described in the trails listed in Table 1. However, you don't have to digest everything in it at once. This tutorial opens with three introductory chapters, which you should read before proceeding to any specific technology area.
Chapter 1 covers the J2EE 1. Chapters 2 and 3 cover XML basics and getting started with Web applications.
When you have digested the basics, you can delve into one or more of the four main technology areas listed next. Because there are dependencies between some of the chapters, Figure 1 contains a roadmap for navigating through the tutorial. After you have become familiar with some of the technology areas, you are ready to tackle the case studies, which tie together several of the technologies discussed in the tutorial.
The Duke's Bank Application Chapter 36 describes an application that employs Web application technologies and enterprise beans. Finally, the appendixes contain auxiliary information helpful to the J2EE application developer along with a brief summary of the J2EE Connector architecture:.
This section tells you everything you need to know to install, build, and run the examples. The tutorial example source is contained in the tutorial bundle. If you are viewing this online, you need to download tutorial bundle from:. You can also download the J2EE 1. You need a registry server to run the examples discussed in Chapters 10 and Directions for obtaining and setting up a registry server are provided in those chapters.
Most of the tutorial examples are distributed with a configuration file for asant , a portable build tool contained in the Application Server. The asant utility contains additional tasks that invoke the Application Server administration utility asadmin.
Directions for building the examples are provided in each chapter. Note: On Windows, you must escape any backslashes in the j2ee. To facilitate iterative development and keep application source separate from compiled files, the source code for the tutorial examples is stored in the following structure under each application directory:. The asant build files build. This tutorial includes the basic information that you need to deploy applications on and administer the Application Server.
For information on the book and links to online booksellers, go to. Table 2 lists the typographical conventions used in this tutorial. Menu selections indicated with the right-arrow character , for example, First Second, should be interpreted as: select the First menu, then choose Second from the First submenu.
The security chapter writers are indebted to Raja Perumal, who was a key contributor both to the chapter and to the examples. We are extremely grateful to the many internal and external reviewers who provided feedback on the tutorial. JAF provides standard services to determine the type of an arbitrary piece of data, encapsulate access to it, discover the operations available on it, and create the appropriate JavaBeans component to perform those operations.
JAXP also provides namespace support, which lets you work with schemas that might otherwise have naming conflicts. NET client can be configured to use a Web service implemented in Java technology, or a Web service can be configured to recognize a Visual Basic. NET client. SSL and TLS ensure message integrity by providing data encryption with client and server authentication capabilities.
Authentication is a measured way to verify whether a party is eligible and able to access certain information as a way to protect against the fraudulent use of a system or the fraudulent transmission of information. Information transported across the Internet is especially vulnerable to being intercepted and misused, so it's very important to configure a JAX-RPC Web service to protect data in transit.
Additionally, businesses can submit material to be shared and search for material that others have submitted. Standards groups have developed schemas for particular kinds of XML documents; two businesses might, for example, agree to use the schema for their industry's standard purchase order form. Because the schema is stored in a standard business registry, both parties can use JAXR to access it. The J2EE Connector architecture is used by J2EE tools vendors and system integrators to create resource adapters that support access to enterprise information systems that can be plugged in to any J2EE product.
A resource adapter is a software component that allows J2EE application components to access and interact with the underlying resource manager of the EIS. Because a resource adapter is specific to its resource manager, typically there is a different resource adapter for each type of database or enterprise information system. The J2EE Connector architecture also provides a performance-oriented, secure, scalable, and message-based transactional integration of J2EE-based Web services with existing EISs that can be either synchronous or asynchronous.
You use the JDBC API in an enterprise bean when you override the default container-managed persistence or have a session bean access the database. With container-managed persistence, database access operations are handled by the container, and your enterprise bean implementation contains no JDBC code or SQL commands.
It provides applications with methods for performing standard directory operations, such as associating attributes with objects and searching for objects using their attributes. A naming environment allows a component to be customized without the need to access or change the component's source code.
A container implements the component's environment and provides it to the component as a JNDI naming context. A component creates a javax. A component's naming environment is stored directly in the environment naming context or in any of its direct or indirect subcontexts.
0コメント