Acknowledgments | p. xxi |
Preface | p. xxiii |
Introduction | p. xxvii |
Sun Certification for Enterprise Architect | p. 1 |
Widespread Capabilities for Application Development | p. 3 |
Java Is the Glue That Binds the Application Development Process | p. 4 |
Companies Increasingly Need the Internet to Compete | p. 5 |
Challenges of Application Development for the Enterprise | p. 6 |
Design Goals of J2EE Architecture | p. 9 |
Sun Certified Enterprise Architect Distinguishes the Java Professional | p. 12 |
General SCEA Test Preparation Tips | p. 17 |
Common Architectures and Protocols | p. 21 |
Types of Architecture | p. 23 |
Architectural Design and Principles | p. 27 |
Architectural Terminology | p. 33 |
Principles of Architecture | p. 36 |
Creating an Architecture Using Distributed Services and J2EE | p. 46 |
J2EE APIs and Certification | p. 58 |
XML and J2EE | p. 60 |
Distributed Programming Services | p. 66 |
Given an Architecture Described in Terms of Network Layout, List Benefits and Potential Weaknesses Associated with It | p. 70 |
Q&A | p. 76 |
Object-Oriented Analysis and Design | p. 79 |
Analysis and Design of Object-Oriented Architecture | p. 80 |
Project Lifecycle | p. 82 |
Unified Modeling Language | p. 85 |
Q&A | p. 113 |
Applicability of J2EE Technology | p. 121 |
Explain the J2EE Architecture and System Requirements | p. 122 |
Explain the Use of Patterns in the J2EE Framework | p. 140 |
Describe the Concepts of "Best Practices" and "Guidelines" | p. 145 |
Illustrate the Use of J2EE for Workflow | p. 148 |
Review Best Practices Applicable for All Tiers | p. 158 |
Review Best Practices for the Client Tier | p. 159 |
Enumerate the Components and Categories of the Web Tier | p. 159 |
Explain How to Apply MVC to the Web Tier | p. 160 |
Review the Best Practices for the Presentation Layer | p. 160 |
Review the Internationalization and Localization | p. 162 |
The EJB Tier | p. 163 |
Illustrate When to Use of J2EE Technology Use for Given Situations | p. 172 |
Security | p. 177 |
Q&A | p. 191 |
Design Patterns | p. 201 |
Identify the Benefits of Using Design Patterns | p. 203 |
Identify the Most Appropriate Design Pattern for a Given Scenario | p. 206 |
State the Name of a Gamma et al. Design Pattern Given the UML Diagram and/or a Brief Description of the Pattern's Functionality | p. 281 |
Identify Benefits of a Specified Gamma et al. Design Pattern | p. 284 |
Identify the Gamma et al. Design Pattern Associated with a Specified J2EE Technology Feature | p. 286 |
Q&A | p. 292 |
Legacy Connectivity | p. 301 |
Introduction to Legacy Connectivity | p. 302 |
Java Connector Architecture | p. 314 |
Distinguish Appropriate from Inappropriate Techniques for Providing Access to a Legacy System from Java Technology Code Given an Outline Description of That Legacy System | p. 334 |
Q&A | p. 345 |
Enterprise JavaBeans and the EJB Container Model | p. 349 |
List the Required Classes/Interfaces That Must Be Provided for an Enterprise JavaBeans Component | p. 351 |
Distinguish Between Session and Entity Beans | p. 353 |
Recognize Appropriate Uses for Entity, Stateful Session, and Stateless Session Beans | p. 355 |
Distinguish Between Stateful and Stateless Session Beans | p. 356 |
State the Benefits and Costs of Container-Managed Persistence | p. 407 |
State the Transactional Behavior in a Given Scenario for an Enterprise Bean Method with a Specified Transactional Attributed as Defined in the Deployment Descriptor | p. 417 |
Given a Requirement Specification Detailing Security and Flexibility Needs, Identify Architectures that Would Fulfill Those Requirements | p. 421 |
Identify Costs and Benefits of Using an Intermediate Data Access Object Between an Entity Bean and the Data Resource | p. 429 |
State the Benefits of Bean Pooling in an EJB Container | p. 430 |
Explain How the Enterprise JavaBeans Container Does Lifecycle Management and Has the Capability to Increase Scalability | p. 431 |
Q&A | p. 438 |
Messaging | p. 447 |
Messaging Basics | p. 448 |
Identify Scenarios That Are Appropriate to Implementation Using Messaging | p. 451 |
List Benefits of Synchronous and Asynchronous Messaging | p. 452 |
Identify Scenarios That Are More Appropriate to Implementation Using Asynchronous Messaging, Rather Than Synchronous | p. 452 |
Identify Scenarios That Are More Appropriate to Implementation Using Synchronous Messaging, Rather Than Asynchronous | p. 453 |
Java Message Service | p. 454 |
Identify Scenarios That Are Appropriate to Implementation Using Messaging, Enterprise JavaBeans Technology, or Both | p. 480 |
Q&A | p. 484 |
Internationalization and Localization | p. 491 |
State Three Aspects of Any Application That Might Need to Be Varied or Customized in Different Deployment Locales | p. 492 |
List Three Features of the Java Programming Language That Can Be Used to Create an Internationalizable/Localizable Application | p. 494 |
Q&A | p. 512 |
Security | p. 519 |
Security | p. 520 |
Identify Security Restrictions That Java 2 Technology Environments Normally Impose on Applets Running in a Browser | p. 523 |
Given an Architectural System Specification, Identify Appropriate Locations for Implementation of Specified Security Features and Select Suitable Technologies for Implementation of Those Features | p. 525 |
Q&A | p. 549 |
Case Study: Overview of Securities Trading System | p. 555 |
The Case Study Infrastructure | p. 556 |
Model and Develop the Case Study | p. 560 |
Trade System Design and Implementation | p. 573 |
Glossary | p. 583 |
About the CD | p. 597 |
System Requirements | p. 598 |
Code on the CD | p. 598 |
Installing and Running MasterExam | p. 598 |
MasterExam | p. 599 |
Electronic Book | p. 599 |
Help | p. 599 |
Removing Installation(s) | p. 599 |
Technical Support | p. 599 |
LearnKey Technical Support | p. 600 |
LearnKey Online Training | p. 600 |
Index | p. 601 |
Table of Contents provided by Rittenhouse. All Rights Reserved. |