WebLogic: The Definitive Guide
- Autorzy: :
- Jon Mountjoy, Avinash Chugh
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 850
- Dostępne formaty:
-
ePubMobi
Opis ebooka: WebLogic: The Definitive Guide
BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the WebLogic platform, providing a stable framework for building scalable, highly available, and secure applications. In fact, in the long list of WebLogic's strengths and features, only one shortcoming stands out: the documentation that comes with the WebLogic server often leaves users clamoring for more information.
WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Providing in-depth coverage of the WebLogic server, the book takes the concept of "definitive" to a whole new level. Exhaustive treatment of the WebLogic server and management console answers any question that developers or administrators might think to ask. Developers will find a useful guide through the world of WebLogic to help them apply their J2EE expertise to build and manage applications. Administrators will discover all they need to manage a WebLogic-based setup. And system architects will appreciate the detailed analysis of the different system architectures supported by WebLogic, the overall organization of a WebLogic domain and supporting network infrastructure, and more.
WebLogic: The Definitive Guide is divided into three sections that explore WebLogic and J2EE, Managing the WebLogic Environment, and WebLogic Enterprise APIs. Some of the topics covered in this comprehensive volume include:
- Building web applications on the WebLogic Server
- Building and optimizing RMI applications
- Using EJBs with WebLogic, including CMP entity beans
- Packaging and deploying applications
- Understanding WebLogic's support for clustering
- Performance tuning and related configuration settings
- Configuring WebLogic's SSL support
- Maximizing WebLogic's security features
- Building web services with XML
- Using WebLogic's JMX services and MBeans
Wybrane bestsellery
-
This guide helps you master DynamoDB, the serverless NoSQL database built for high performance at any scale. Authored by AWS experts, it covers core features, data modeling, and advanced topics, enabling you to build state-of-the-art applications.
-
Build advanced concurrent and parallel processing skills for cloud-native Java applications. From essential concepts and practical implementations to emerging trends, this book equips you with skills to build scalable, high-performance solutions in today's dynamic tech landscape.
-
Building modern applications with Java KEY FEATURES ? Recap your understanding of fundamental Java programming, including new features of Java 21. ? Explore how to use Java to interact with relational and NoSQL databases. ? Learn how to build full-stack web applications with Java. DESCRIPTION ...(97.41 zł najniższa cena z 30 dni)
97.21 zł
109.00 zł(-11%) -
Książka Aplikacje Mobilne dla studenta i technika programisty to jest przeznaczona dla każdego kto chce zapoznać się z tematem tworzenia aplikacji mobilnych dla systemu Android. W pierwszej części książki czytelnik zapoznaje się z tajnikami Języka Java. Dogłębnie zapoznaje się z tematyką: pro...(48.10 zł najniższa cena z 30 dni)
48.24 zł
74.00 zł(-35%) -
This course offers an in-depth introduction to Java and algorithmic thinking, ideal for beginners. Starting with fundamental computer concepts, it progresses through Java programming basics, & algorithmic principles, concluding with file management.
-
Książka Java. Teoria w praktyce została pomyślana tak, by krok po kroku przybliżać specyfikę tego języka programowania. Zaczniesz od podstaw - poznasz między innymi główne założenia, zgodnie z którymi działa Java: maszynę wirtualną, zmienne, operatory, instrukcje sterujące i tablice - by następni...(65.40 zł najniższa cena z 30 dni)
76.30 zł
109.00 zł(-30%) -
Architect robust solutions like a pro with real-world insights and cutting-edge design techniques. Delve into advanced analytics, machine learning, generative AI, cloud-native architecture, and the key soft skills to excel as a solutions architect.
Solutions Architect's Handbook. Kick-start your career with architecture design principles, strategies, and generative AI techniques - Third Edition
Saurabh Shrivastava, Neelanjali Srivastav, Rajesh Sheth, Kamal Arora, Rohan Karmarkar
-
To dziewiąte wydanie znakomitego podręcznika programowania dla początkujących, starannie zaktualizowane i uzupełnione o informacje dotyczące Java Platform, Standard Edition 17. Książka rozpoczyna się od solidnej dawki wiedzy o kompilacji i uruchamianiu programu w Javie, słowach kluczowych i istot...(77.40 zł najniższa cena z 30 dni)
90.30 zł
129.00 zł(-30%) -
Dzięki tej książce zrozumiesz bazowe koncepcje programowania funkcyjnego i przekonasz się, że możesz włączać je do kodu bez rezygnacji z paradygmatu obiektowego. Dowiesz się również, kiedy w swojej codziennej pracy używać takich opcji jak niemutowalność i funkcje czyste i dlaczego warto to robić....(52.20 zł najniższa cena z 30 dni)
60.90 zł
87.00 zł(-30%) -
Build Your Own Programming Language provides a hands-on approach to designing and implementing programming language features in a simple compiler and programming environment. This book will help you create new or domain-specific languages.
Ebooka "WebLogic: The Definitive Guide" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "WebLogic: The Definitive Guide" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "WebLogic: The Definitive Guide" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5225-1, 9780596552251
- Data wydania ebooka:
- 2004-02-23 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 1.7MB
- Rozmiar pliku Mobi:
- 5.8MB
Spis treści ebooka
- WebLogic: The Definitive Guide
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Who Should Read This Book?
- Organization
- WebLogic and J2EE
- Managing the WebLogic Environment
- WebLogic Enterprise APIs
- Online Documentation
- Conventions Used in This Book
- Using Code Examples
- Comments and Questions
- Acknowledgments
- 1. Introduction
- 1.1. Overview of WebLogic Server
- 1.1.1. The WebLogic Platform
- 1.1.2. WebLogic as a J2EE Product
- 1.1.2.1. Servlets, JSPs, and the web container
- 1.1.2.2. JDBC and distributed transactions
- 1.1.2.3. JNDI and RMI
- 1.1.2.4. EJBs
- 1.1.2.5. JMS
- 1.1.2.6. JCA
- 1.1.3. Additional Enterprise Features of WebLogic
- 1.1.3.1. WebLogics security framework
- 1.1.3.2. WebLogic in a clustered environment
- 1.1.3.3. XML support
- 1.1.3.4. Web services
- 1.1.3.5. Management features
- 1.1. Overview of WebLogic Server
- 1.1.4. WebLogic Server Tools
- 1.1.4.1. System administration console
- 1.1.4.2. Deployment and development tools
- 1.1.4.3. WebLogic Builder
- 1.1.5. WebLogic Workshop
- 1.2. Software and Versions
- 1.3. Getting Started with WebLogic Server
- 1.3.1. Creating a Domain
- 1.3.2. Using the Administration Console
- 2. Web Applications
- 2.1. Packaging and Deployment
- 2.1.1. Structure of a Web Application
- 2.1.2. Assembling a WAR
- 2.1.3. XML Deployment Descriptors
- 2.1.4. WebLogic's JSP Compiler
- 2.1.5. Deploying a Web Application
- 2.1.6. Class Loaders
- 2.1. Packaging and Deployment
- 2.2. Configuring Web Applications
- 2.2.1. Context Root
- 2.2.2. Directory Listings
- 2.2.3. Serving Static Files
- 2.2.4. Enabling CGI Scripts
- 2.2.5. Reloading Files
- 2.2.6. Resources References
- 2.2.7. Response Caching
- 2.3. Servlets and JSPs
- 2.3.1. Configuring a Custom Execute Queue
- 2.3.2. Threading Issues
- 2.3.2.1. Single-threaded servlets
- 2.3.3. Custom URL Pattern Matching
- 2.3.4. Configuring JSPs
- 2.4. JSP Tag Libraries
- 2.4.1. WebLogic's Tag Library
- 2.4.1.1. The cache tag
- 2.4.1.2. The process tag
- 2.4.1.3. The repeat tag
- 2.4.1. WebLogic's Tag Library
- 2.4.2. Building Tag Libraries for EJBs
- 2.4.2.1. The ejb2jsp tool
- 2.4.2.2. Resolving conflicts
- 2.4.2.3. Custom tags for stateful beans and entity beans
- 2.5. Session Tracking
- 2.5.1. Session Tracking with Cookies
- 2.5.1.1. Using cookies with SSL
- 2.5.1. Session Tracking with Cookies
- 2.5.2. Session Tracking with URL Rewriting
- 2.5.2.1. URL rewriting for WAP
- 2.5.3. Session Security and Single Sign-on
- 2.5.3.1. Avoiding single sign-on
- 2.6. Session Persistence
- 2.6.1. Configuring Session Persistence
- 2.6.2. Memory Persistence
- 2.6.3. File-Based Persistence
- 2.6.4. JDBC Persistence
- 2.6.5. Cookie Persistence
- 2.7. Clusters and Replicated Persistence
- 2.7.1. Disadvantages of Session-State Replication
- 2.7.2. Session Replication
- 2.7.3. Session Failover
- 2.8. Configuring a Simple Web Cluster
- 2.8.1. Configuring HttpClusterServlet
- 2.8.2. Debugging the Configuration
- 2.9. Security Configuration
- 2.9.1. Authentication
- 2.9.2. Declarative Security
- 2.9.3. Programmatic Security
- 2.9.4. Securing Servlet Initialization and Destruction
- 2.9.5. Authenticated Dispatching
- 2.10. Monitoring Web Applications
- 3. Managing the Web Server
- 3.1. Configuring WebLogic's HTTP Server
- 3.1.1. Denial-of-Service Attacks
- 3.1.2. WAP Options
- 3.1.3. Setting the Default Web Application
- 3.1. Configuring WebLogic's HTTP Server
- 3.2. Virtual Hosting
- 3.2.1. Creating Virtual Hosts
- 3.2.2. A Virtual Hosting Scenario
- 3.3. HTTP Access Logs
- 3.3.1. Common Log Format
- 3.3.2. Extended Log Format
- 3.4. Understanding Proxies
- 3.4.1. Proxying to a Secondary Web Server
- 3.5. Web Server Plug-ins
- 3.5.1. Installing a Proxy
- 3.5.2. Types of Proxying
- 3.5.3. Connection Pools and Keep-Alive Connections
- 3.5.4. Proxying to a Cluster
- 3.5.5. Connection Failures
- 3.5.6. Dynamic Server List
- 3.5.7. SSL and Web Server Plug-ins
- 3.5.8. Configuration Parameters
- 3.5.9. Example Configurations
- 4. Using JNDI and RMI
- 4.1. Using WebLogic's JNDI
- 4.1.1. Creating a Context
- 4.1.2. Security in a Context
- 4.1.3. Using a Context
- 4.1. Using WebLogic's JNDI
- 4.2. Using JNDI in a Clustered Environment
- 4.2.1. Creating a Context in a Cluster
- 4.2.2. J2EE Resources and RMI Stubs
- 4.2.3. Binding Custom Objects
- 4.2.4. Pinned Services
- 4.3. Using WebLogic's RMI
- 4.3.1. Programming Issues
- 4.3.2. Using a WebLogic Startup Class to Register an RMI Object
- 4.3.3. WebLogic's RMI Compiler
- 4.3.4. RMI Objects in a Cluster
- 4.3.5. Cluster Example
- 4.3.6. Using a Custom CallRouter Class with an RMI Object
- 4.4. Using WebLogic's RMI over IIOP
- 4.4.1. Standalone RMI Clients
- 4.4.2. WebLogic Fat Clients
- 4.4.3. J2EE Thin Clients
- 4.4.4. CORBA/IDL Clients
- 4.4.5. Configuring RMI-IIOP
- 5. JDBC
- 5.1. Overview of JDBC Resources
- 5.1.1. JDBC Drivers for WebLogic Server
- 5.1.2. Connection Pools
- 5.1.3. Multipools
- 5.1.4. Data Sources
- 5.1. Overview of JDBC Resources
- 5.2. Configuring JDBC Connectivity
- 5.2.1. Using Third-Party JDBC Drivers
- 5.2.2. Configuring a Connection Pool
- 5.2.2.1. Creating a pool
- 5.2.2.2. General pool configuration
- 5.2.2.3. Controlling the pool size
- 5.2.2.4. Connection reservation
- 5.2.2.5. Connection testing
- 5.2.2.6. Advanced distributed transaction control
- 5.2.2.7. Initializing pool connections
- 5.2.2.8. Monitoring JDBC pools
- 5.2.2.9. Managing the connection pool
- 5.2.2.10. Using the physical connection
- 5.2.3. Configuring a Data Source
- 5.2.3.1. Setting up an XA-aware data source
- 5.2.3.2. Using a configured data source
- 5.2.3.3. Targeting the data source
- 5.2.4. Application-Scoped Data Sources and Connection Pools
- 5.2.4.1. Creating a data source factory
- 5.2.4.2. Editing the deployment descriptor
- 5.2.4.3. Using an application-scoped data source
- 5.2.4.4. Encrypting the passwords
- 5.2.5. Managing the Statement Cache
- 5.2.5.1. Enabling statement caching
- 5.2.5.2. Clearing the statement cache
- 5.2.5.3. Limitations of statement caching
- 5.2.6. Validating Database Connections
- 5.3. WebLogic's Wrapper Drivers
- 5.3.1. The RMI Driver
- 5.3.2. The Pool Driver
- 5.3.3. The JTS Driver
- 5.4. Rowsets
- 5.4.1. Creating and Populating Rowsets
- 5.4.2. Manipulating Rowsets
- 5.4.3. Transactions and Rowsets
- 5.4.4. Synchronizing Rowsets
- 5.4.4.1. VERIFY_READ_COLUMNS
- 5.4.4.2. VERIFY_AUTO_VERSION_COLUMNS
- 5.4.4.3. VERIFY_VERSION_COLUMNS
- 5.4.4.4. VERIFY_MODIFIED_COLUMNS
- 5.4.4.5. VERIFY_SELECTED_COLUMNS
- 5.4.4.6. VERIFY_NONE
- 5.4.4.7. Caveats
- 5.4.4.8. Group deletes and JDBC batching
- 5.4.5. Rowsets Spanning Multiple Tables
- 5.4.6. XML and Rowsets
- 5.5. Clustering and JDBC Connections
- 5.5.1. Failover and Load Balancing
- 6. Transactions
- 6.1. Overview
- 6.1.1. JDBC Transactions
- 6.1.2. Distributed Transactions
- 6.1. Overview
- 6.2. EJB Transactions
- 6.2.1. Container-Managed Transactions
- 6.2.2. Bean-Managed Transactions
- 6.3. The Transaction Service
- 6.3.1. Using JTA Transactions
- 6.3.2. Using XA Versus Non-XA Drivers in JTA Transactions
- 6.3.2.1. Data integrity problems with two-phase commit emulation
- 6.3.3. WebLogic Extensions to the JTA
- 6.4. Managing WebLogic JTA
- 6.4.1. Monitoring Transactions
- 6.4.2. Transaction Logs
- 6.4.3. Transaction Recovery
- 6.4.4. Handling Failed Servers
- 6.4.5. Interdomain Transactions
- 7. J2EE Connectors
- 7.1. Assembling and Deploying Resource Adapters
- 7.1.1. Packaging
- 7.1.2. Deployment
- 7.1.3. XML Deployment Descriptors
- 7.1. Assembling and Deploying Resource Adapters
- 7.2. Configuring Resource Adapters
- 7.2.1. Generic Settings for the Resource Adapter
- 7.2.2. Support for Transaction Levels
- 7.3. WebLogic-Specific Configuration Options
- 7.3.1. Managing Connection Pools
- 7.3.1.1. Connection reservation
- 7.3.1.2. Detecting connection leaks
- 7.3.1.3. Connection proxy wrappers
- 7.3.1. Managing Connection Pools
- 7.3.2. Error Logging and Tracing
- 7.3.3. Secure Access
- 7.3.3.1. Sign-on mechanisms
- 7.3.3.2. Mapping WebLogic users to resource principals
- 7.4. Using the Resource Adapter
- 7.5. Monitoring Connections
- 8. JMS
- 8.1. Configuring JMS Resources
- 8.1.1. Server
- 8.1.2. Destinations
- 8.1.3. Connection Factory
- 8.1.4. Templates
- 8.1.5. Destination Keys
- 8.1.6. JMS Stores
- 8.1.7. Distributed Destination
- 8.1.8. JMS Session Pools
- 8.1.9. Foreign JMS Servers
- 8.1.9.1. Configuring a foreign JMS provider
- 8.1. Configuring JMS Resources
- 8.2. Optimizing JMS Performance
- 8.2.1. Message Quotas
- 8.2.2. Message Paging
- 8.2.2.1. How paging works
- 8.2.2.2. Configuring paging for servers and destinations
- 8.2.3. Flow Control
- 8.2.3.1. How flow control works
- 8.2.3.2. Tuning the flow control mechanism
- 8.2.3.3. Blocking message producers
- 8.2.4. JMS Stores
- 8.2.4.1. Tuning file stores
- 8.2.4.2. Managing the JMS tables for a JDBC store
- 8.2.4.3. Configuring the JDBC pool for a JMS store
- 8.2.5. Message Expiration
- 8.2.5.1. Enabling active message expiration
- 8.2.5.2. Expired message handling
- 8.2.6. Concurrent Messaging
- 8.2.6.1. Using JMS session pools
- 8.3. Controlling Message Delivery
- 8.3.1. Delivery Modes
- 8.3.2. Timed Delivery
- 8.3.2.1. Delayed message delivery
- 8.3.2.2. Scheduled delivery
- 8.3.2.3. Evaluating the next scheduled delivery time
- 8.3.2.4. Determining delivery time
- 8.3.3. Time-to-Live
- 8.3.4. Redelivery
- 8.3.4.1. Configuring redelivery
- 8.3.4.2. Error destinations
- 8.3.5. Extended Acknowledge Modes
- 8.3.6. Multicasting
- 8.3.6.1. Enabling multicasting
- 8.3.6.2. Using a multicast session
- 8.3.6.3. Sequence violations
- 8.4. JMS Programming Issues
- 8.4.1. JMS Clients
- 8.4.2. Synchronous Versus Asynchronous Consumption
- 8.4.3. Durable Subscribers
- 8.4.3.1. Unique clients
- 8.4.3.2. Creating and removing durable subscribers
- 8.4.4. Transactions and JMS
- 8.4.4.1. Transacted sessions
- 8.4.4.2. Distributed transactions
- 8.4.4.3. MDBs
- 8.4.5. Integrating JMS with Servlets and EJBs
- 8.4.5.1. Pooled connection objects and testing
- 8.4.5.2. Caching JNDI lookups and JMS objects
- 8.4.5.3. Automatic enlistment in transactions
- 8.4.5.4. J2EE compliance
- 8.4.5.5. Container-managed security
- 8.4.6. Creating Destinations at Runtime
- 8.4.6.1. Temporary destinations
- 8.4.6.2. Permanent destinations
- 8.4.7. JMS Messages and Selectors
- 8.4.7.1. XML messages
- 8.4.7.2. JMS selectors
- 8.4.7.3. XML message selectors
- 8.4.7.4. Impact of messages on performance
- 8.4.7.5. Impact of message selectors on performance
- 8.5. Clustered JMS
- 8.5.1. JMS Connections and Connection Factories
- 8.5.1.1. Load balancing
- 8.5.1.2. Connection routing
- 8.5.1.3. Failover
- 8.5.1.4. Targeting for server-side applications
- 8.5.1.5. Targeting for external applications
- 8.5.1.6. Affinity-based load-balancing algorithms
- 8.5.1. JMS Connections and Connection Factories
- 8.5.2. Distributed Destinations
- 8.5.2.1. Using distributed queues
- 8.5.2.2. Using distributed topics
- 8.5.2.3. Creating a distributed destination
- 8.5.2.4. Accessing a distributed destination
- 8.5.2.5. Producer and consumer load balancing
- 8.5.2.6. Load-balancing schemes
- 8.5.2.7. Load-balancing heuristics
- 8.5.2.8. Targeting connection factories
- 8.5.3. Message-Driven Beans
- 8.5.3.1. Placement of MDBs
- 8.5.3.2. MDBs and distributed topics
- 8.5.3.3. Delivery order
- 8.5.4. JMS Migration
- 8.5.4.1. Migrating a JMS server
- 8.5.4.2. Migrating MDBs
- 8.6. WebLogic's Messaging Bridge
- 8.6.1. Installing a Messaging Bridge
- 8.6.2. Configuring Bridge Destinations
- 8.6.2.1. Example configuration of bridge destinations
- 8.6.3. Configuring the Messaging Bridge
- 8.6.3.1. General settings
- 8.6.3.2. Connection retry settings
- 8.6.3.3. Transaction settings
- 8.6.3.4. Example bridge configuration
- 8.6.3.5. Monitoring a bridge
- 8.6.3.6. Configuring the JMS thread pool
- 8.7. Monitoring JMS
- 9. JavaMail
- 9.1. Configuring a Mail Session
- 9.2. Using JavaMail
- 9.3. Using Other JavaMail Providers
- 10. Using EJBs
- 10.1. Getting Started
- 10.1.1. EJB Types
- 10.1.2. Building EJBs
- 10.1.3. EJBGen
- 10.1.3.1. Using EJBGen
- 10.1.3.2. Tag inheritance
- 10.1.3.3. Templates
- 10.1.3.4. Reverse engineering
- 10.1.4. Packaging EJBs
- 10.1.5. XML Deployment Descriptors
- 10.1.6. Compiling Your EJBs
- 10.1.6.1. The ejbc tool
- 10.1.6.2. The appc tool
- 10.1.6.3. Generating an EJB client JAR
- 10.1. Getting Started
- 10.1.7. Referencing J2EE Resources
- 10.1.7.1. Referencing application-scoped EJBs
- 10.1.8. Deploying EJB Components
- 10.2. Development Guidelines
- 10.2.1. Collocation
- 10.2.2. Network Latency
- 10.2.3. Using EJB Homes
- 10.2.4. Conserving Transactions
- 10.2.5. Message-Driven Beans
- 10.2.5.1. Using foreign JMS providers
- 10.3. Managing WebLogic's EJB Container
- 10.3.1. Pool of Stateless Session EJB Instances
- 10.3.2. Cache of Stateful Session Bean Instances
- 10.4. Configuring Entity Beans
- 10.4.1. Altering the Store Behavior
- 10.4.2. EJB Concurrency
- 10.4.2.1. Read-only multicast invalidation
- 10.4.2.2. Read-mostly pattern
- 10.4.3. Entity Bean Caching
- 10.4.3.1. Caching between transactions
- 10.4.3.2. Application-level cache
- 10.5. EJBs and Transactions
- 10.5.1. Distributed transactions
- 10.5.1.1. Transaction isolation levels
- 10.5.1. Distributed transactions
- 10.6. EJBs and Clustering
- 10.6.1. Failover and Replication
- 10.6.1.1. Stateless session beans
- 10.6.1.2. Stateful session beans
- 10.6.1.3. Entity beans
- 10.6.1. Failover and Replication
- 10.6.2. Load Balancing
- 11. Using CMP and EJB QL
- 11.1. Building CMP Entity Beans
- 11.1.1. A Simple EJB
- 11.1.2. Associated Java Files
- 11.1.3. EJB Deployment Descriptor
- 11.1.4. Creating the EJB JAR
- 11.1. Building CMP Entity Beans
- 11.2. Features of WebLogic's CMP
- 11.2.1. Automatic Primary Key Generation
- 11.2.1.1. DBMS-generated primary keys
- 11.2.1.2. Sequence tables
- 11.2.1. Automatic Primary Key Generation
- 11.2.2. Automatic Table Creation and Validation
- 11.2.3. Mapping CMP Fields Across Multiple DBMS Tables
- 11.2.4. Adjusting the Insert Behavior
- 11.2.5. Batch Operations
- 11.2.6. Delayed Existence Checking
- 11.2.7. Optimistic Concurrency
- 11.2.8. Field Groups and Finder Optimizations
- 11.3. Container-Managed Relationships
- 11.3.1. One-to-One Association
- 11.3.2. One-to-Many Association
- 11.3.3. Many-to-Many Association
- 11.3.4. Cascade Delete
- 11.3.4.1. Avoiding deadlocks
- 11.3.5. Caching EJB Relationships
- 11.4. EJB QL
- 11.4.1. Using WebLogic Extensions to EJB QL
- 11.4.2. Returning a ResultSet
- 11.4.3. Executing Dynamic Queries
- 11.4.4. WebLogic's EJB QL Extensions
- 11.4.5. Reporting EJB-QL Compilation Errors
- 12. Packaging and Deployment
- 12.1. Packaging
- 12.1.1. Deployment Descriptors
- 12.1.1.1. Editing deployment descriptors
- 12.1.1. Deployment Descriptors
- 12.1.2. Web Applications
- 12.1.3. EJB Components
- 12.1.4. Resource Adapters
- 12.1.5. Enterprise Applications
- 12.1.6. Client Applications
- 12.1. Packaging
- 12.2. Deployment Tools
- 12.2.1. Administration Console
- 12.2.2. WebLogic's Deployer Tool
- 12.3. Application Deployment
- 12.3.1. Application Staging
- 12.3.1.1. Staging
- 12.3.1.2. External staging
- 12.3.1.3. No staging
- 12.3.1. Application Staging
- 12.3.2. Configuring the Staging Mode
- 12.3.3. Auto-Deployment
- 12.3.4. Alternative Descriptors
- 12.3.5. Deployment Order
- 12.4. WebLogic's Classloading Framework
- 12.4.1. The Need for Custom Classloaders
- 12.4.2. WebLogic's Classloaders
- 12.4.2.1. Overriding the parent delegation model
- 12.4.2.2. EJB redeployment
- 12.4.2.3. Deploying EJB modules and web applications as separate applications
- 12.4.2.4. Customizing the classloader hierarchy
- 12.5. Deployment Considerations
- 12.5.1. Single-Server Deployment
- 12.5.2. Multiserver Deployment
- 12.5.3. Cluster Deployment
- 12.5.4. Web Applications
- 12.5.4.1. Using auto-deployment
- 12.5.4.2. Using production mode
- 12.5.5. EJB Modules
- 12.5.6. Utility Classes
- 12.5.7. Resource Adapters
- 12.5.8. Startup and Shutdown Classes
- 12.5.9. Application Deployment Life Cycle Listeners
- 12.6. Split Directory Development
- 12.6.1. Directory Layout
- 12.6.2. Building an Application
- 12.6.3. Deploying an Application
- 12.6.4. Packaging an Application
- 12.6.5. Generating the Build File
- 13. Managing Domains
- 13.1. Structure of a Domain
- 13.2. Designing a Domain
- 13.3. Creating Domains
- 13.3.1. Directory Layout
- 13.3.2. The Configuration Wizard
- 13.3.2.1. Starting the Configuration Wizard
- 13.3.2.2. Typical configurations
- 13.3.2.3. Single server
- 13.3.2.4. Domain with Managed Servers
- 13.3.2.5. Domain with clustered Managed Servers
- 13.3.2.6. Using the Configuration Wizard in WebLogic 8.1
- 13.3.2.7. Using the Configuration Wizard in WebLogic 7.0
- 13.3.3. Using weblogic.Server
- 13.3.4. Starting the Servers
- 13.4. Domain Backups
- 13.4.1. Configuration Data
- 13.4.2. Security Data
- 13.4.2.1. The LDAP repository
- 13.4.2.2. The serialized security datafile
- 13.4.2.3. Certificates
- 13.4.2.4. Security configuration data in WebLogic 7.0
- 13.5. Handling System Failure
- 13.5.1. Restarting the Administration Server
- 13.5.2. Restarting Managed Servers
- 13.5.2.1. Managed Server Independence mode
- 13.6. Domain Network Configuration
- 13.6.1. The Default Network Channel
- 13.6.1.1. General settings
- 13.6.1.2. Protocols
- 13.6.1.3. Tuning
- 13.6.1.4. Tunneling
- 13.6.1. The Default Network Channel
- 13.6.2. The Administration Channel
- 13.6.2.1. Consequences on domain configuration
- 13.6.2.2. Configuration changes
- 13.6.3. Custom Network Channels in WebLogic 8.1
- 13.6.3.1. Creating network channels
- 13.6.3.2. Enabling interserver communication
- 13.6.4. Network Channels and Access Points in WebLogic 7.0
- 13.6.4.1. Getting a summary
- 13.6.4.2. Viewing network configurations
- 13.6.4.3. Channel priority for outgoing connections
- 13.6.5. Best Practices for Configuring Networks
- 13.6.5.1. Segmenting network traffic by port number
- 13.6.5.2. Physically segmenting network traffic
- 13.6.5.3. Separating internal and external traffic
- 13.7. Node Manager
- 13.7.1. Configuring the Node Manager for a Physical Machine
- 13.7.1.1. Trusted hosts
- 13.7.1.2. SSL configuration
- 13.7.1.3. SSL for WebLogic 7.0
- 13.7.1.4. Additional configuration properties
- 13.7.1.5. Starting a Node Manager
- 13.7.1. Configuring the Node Manager for a Physical Machine
- 13.7.2. Configuring a Machine to Use a Node Manager
- 13.7.3. Configuring the Node Manager for a Managed Server
- 13.7.4. Configuring Node Manager Behavior
- 13.7.5. Default Operation of the Node Manager
- 13.7.5.1. Starting managed servers
- 13.7.5.2. Suspending and stopping managed servers
- 13.7.5.3. Health monitoring
- 13.7.6. Node Manager Logs
- 13.7.6.1. Node Manager client logs
- 13.7.6.2. Managed Server logs
- 13.8. The Server Life Cycle
- 13.8.1. Graceful Shutdown
- 13.8.2. Starting a Server
- 13.8.3. Standby Mode
- 13.8.4. Shutting Down
- 13.8.5. Node Manager
- 13.9. Monitoring a WebLogic Domain
- 14. Clustering
- 14.1. An Overview of Clustering
- 14.1.1. Domains, Machines, and Clusters
- 14.1.2. Tiers
- 14.1.3. Load Balancing
- 14.1.4. Failover
- 14.1. An Overview of Clustering
- 14.2. A Closer Look at the Frontend Tier
- 14.2.1. Working with Clusters
- 14.2.1.1. Addressing a cluster
- 14.2.1.2. Creating a cluster
- 14.2.1.3. Starting and monitoring the domain
- 14.2.1.4. Deploying to a cluster
- 14.2.1. Working with Clusters
- 14.2.2. Servlets and JSPs in a Cluster
- 14.2.3. Configuring a Load Balancer
- 14.2.4. Using the Front Tier
- 14.2.5. Other Frontend Architectures
- 14.3. Load-Balancing Schemes
- 14.3.1. Server-to-Server Routing
- 14.3.1.1. Round-robin
- 14.3.1.2. Weight-based
- 14.3.1.3. Random
- 14.3.1.4. Parameter-based
- 14.3.1. Server-to-Server Routing
- 14.3.2. Client-Server Routing
- 14.3.2.1. Server affinity for JNDI contexts
- 14.3.3. Scenarios in Which Load Balancing Is Avoided
- 14.4. Using J2EE Services on the Object Tier
- 14.4.1. Interacting with the Object Tier
- 14.4.2. Clustering EJB and RMI
- 14.4.2.1. Load balancing and failover
- 14.4.2.2. EJB load balancing
- 14.4.2.3. Failover for EJB and RMI objects
- 14.4.2.4. Pinned objects and migration
- 14.4.3. Using JDBC Resources in a Cluster
- 14.4.4. Clustering JMS
- 14.4.4.1. JMS servers and destinations
- 14.4.4.2. Connection factories
- 14.4.4.3. Distributed destinations
- 14.4.5. Maintaining State in a Cluster
- 14.5. Combined-Tier Architecture
- 14.6. Securing a Clustered Solution
- 14.6.1. Firewall Placement and Address Translation
- 14.6.2. Firewalls and Load Balancers
- 14.6.3. Databases
- 14.7. Machines, Replication Groups, and Failover
- 14.7.1. Machine Names
- 14.7.2. Replication Groups
- 14.8. Network Configuration
- 14.8.1. Multicast Communication
- 14.8.1.1. Multicast setup
- 14.8.1. Multicast Communication
- 14.8.2. Peer-to-Peer Communication
- 14.8.3. Administration Server Considerations
- 14.9. Monitoring Clusters
- 15. Performance, Monitoring, and Tuning
- 15.1. Tuning WebLogic Applications
- 15.1.1. Managing Sessions
- 15.1.1.1. Monitoring servlets and sessions
- 15.1.1. Managing Sessions
- 15.1.2. Optimizing JDBC Pools
- 15.1.2.1. Monitoring the connection pool and transactions
- 15.1. Tuning WebLogic Applications
- 15.1.3. Tuning the JMS Server
- 15.1.3.1. Optimizing paging and flow control
- 15.1.3.2. Optimizing persistence
- 15.1.3.3. Monitoring the JMS servers
- 15.1.4. EJB Tuning
- 15.1.4.1. Optimizing the EJB pool size
- 15.1.4.2. Optimizing the EJB cache size
- 15.1.4.3. EJB concurrency
- 15.1.4.4. Transaction isolation levels
- 15.1.4.5. Optimizing CMP
- 15.1.4.6. Monitoring EJBs
- 15.1.5. Monitoring with JMX
- 15.2. Tuning the Application Server
- 15.2.1. Execute Queues
- 15.2.1.1. Creating an execute queue
- 15.2.1.2. Assigning execute queues to J2EE applications
- 15.2.1.3. Monitoring active queues
- 15.2.1. Execute Queues
- 15.2.2. Server Threads
- 15.2.2.1. Configuring the thread count
- 15.2.2.2. Threads as socket readers
- 15.2.2.3. Queue overflow conditions
- 15.2.2.4. Detecting stuck threads
- 15.2.2.5. Monitoring active server threads
- 15.2.3. Socket Connections
- 15.2.3.1. Optimizing the pure-Java socket implementation
- 15.2.3.2. Client socket readers
- 15.2.3.3. Managing TCP connections
- 15.2.4. Tuning a Clustered Setup
- 15.2.4.1. Multi-CPU machines
- 15.3. Tuning the JVM
- 15.3.1. Choosing a JVM
- 15.3.2. Heap Size and Garbage Collection
- 15.3.2.1. Configuring the heap size
- 15.3.2.2. Generational garbage collection
- 15.3.2.3. Automatically logging low memory conditions
- 15.3.2.4. Explicit request for garbage collection
- 15.3.3. Green Versus Native Threads
- 15.3.4. Monitoring the JVM's Performance
- 16. SSL
- 16.1. An Overview of SSL
- 16.1.1. Encryption
- 16.1.2. Message Digests
- 16.1.3. Certificates
- 16.1.4. Certificate Authorities
- 16.1.5. Cipher Suites
- 16.1.6. Keystores
- 16.1. An Overview of SSL
- 16.2. Configuring WebLogic's SSL
- 16.2.1. Obtaining Keys and Certificates
- 16.2.1.1. Demonstration keys and certificates
- 16.2.1.2. The CertGen utility
- 16.2.1.3. The Certificate Request Generator tool
- 16.2.1. Obtaining Keys and Certificates
- 16.2.2. Storing Private Keys and Certificates
- 16.2.3. Configuring SSL for WebLogic 8.1
- 16.2.3.1. Configuring the identity and trust keystores
- 16.2.3.2. Setting up the server identity
- 16.2.3.3. Enabling SSL
- 16.2.4. Configuring SSL for WebLogic 7.0
- 16.2.4.1. Configuring a Keystore Provider
- 16.2.4.2. Setting up the server identity
- 16.2.4.3. Using plain files for the private key and trusted CA certificates
- 16.2.4.4. Enabling SSL
- 16.2.5. Other SSL Configuration Issues
- 16.2.5.1. Two-way SSL
- 16.2.5.2. Hostname verification
- 16.2.5.3. Certificate validation options
- 16.2.5.4. SSL debugging
- 16.2.5.5. Export key lifespan and SSL login timeout
- 16.2.5.6. Using SSL in a cluster
- 16.2.6. SSL Configuration Scenarios
- 16.2.6.1. One-way SSL
- 16.2.6.2. Two-way SSL
- 16.3. Programmatic SSL
- 16.3.1. URL Connections
- 16.3.2. SSL Sockets
- 16.3.2.1. Using SSLSocket
- 16.3.2.2. Using a custom hostname verifier
- 16.3.2.3. Using a custom trust manager
- 16.3.2.4. Setting up the client's identity
- 16.3.2.5. Using an SSL handshake listener
- 16.3.3. JNDI Clients
- 16.3.4. JCE
- 16.4. Mapping Certificates to WebLogic Users
- 16.4.1. Two-Way SSL Authentication for Web Applications
- 17. Security
- 17.1. The Java Security Manager
- 17.1.1. Configuring the Security Manager
- 17.1.2. Global Security Policies
- 17.1.3. Application-Specific Security Policies
- 17.1.4. Tracing the Security Manager
- 17.1. The Java Security Manager
- 17.2. Connection Filtering
- 17.2.1. The Default Connection Filter
- 17.3. The Security Provider Architecture
- 17.3.1. Overview
- 17.3.2. Users and Groups
- 17.3.3. Protecting User Accounts
- 17.3.4. Roles
- 17.3.5. Global Roles
- 17.3.6. Scoped Roles
- 17.3.6.1. Connection pools and multipools
- 17.3.6.2. JNDI branches
- 17.3.6.3. Web applications
- 17.3.6.4. Web services
- 17.3.6.5. EJBs
- 17.3.6.6. JMS destinations
- 17.3.6.7. Using the deployment descriptors
- 17.3.7. The externally-defined Element
- 17.3.8. Policies
- 17.3.8.1. Using the Administration Console
- 17.3.8.2. Enabling user-defined policies
- 17.3.8.3. Using the deployment descriptors
- 17.3.8.4. Default policies
- 17.3.9. Ignoring the Deployment Descriptors
- 17.3.10. Summary
- 17.4. The Providers
- 17.4.1. Authentication Providers
- 17.4.1.1. Principal Validation Providers
- 17.4.1.2. Identity Assertion Providers
- 17.4.1. Authentication Providers
- 17.4.2. The Default Authentication Providers
- 17.4.2.1. The Default Authenticator
- 17.4.2.2. Configuring an LDAP authenticator
- 17.4.2.3. The Default Identity Asserter
- 17.4.3. Authorization Providers
- 17.4.3.1. The Default Authorization Provider
- 17.4.4. Role Mapping Providers
- 17.4.4.1. The Default Role Mapper
- 17.4.5. Adjudication Providers
- 17.4.5.1. The Default Adjudicator
- 17.4.6. Credential Mapping Providers
- 17.4.6.1. The Default Credential Mapper
- 17.4.7. Auditing Providers
- 17.4.7.1. The Default Auditor
- 17.4.8. The Embedded LDAP Server
- 17.4.8.1. External access to the LDAP server
- 17.5. Configuring Trust Between Two Domains
- 17.6. JAAS Authentication in a Client
- 17.6.1. Anatomy of a JAAS Client
- 17.6.2. A Sample JAAS Client
- 17.7. Creating a Custom Authentication Provider
- 17.7.1. MBeans
- 17.7.2. Authentication Provider
- 17.7.3. Login Module
- 17.7.4. Deploying the Provider
- 17.8. Creating an Identity Assertion Provider
- 18. XML
- 18.1. JAXP
- 18.1.1. SAX
- 18.1.2. DOM
- 18.1.3. XSL Transformers
- 18.1.4. External Entity Resolution
- 18.1. JAXP
- 18.2. Built-in Processors
- 18.2.1. WebLogic's FastParser
- 18.2.2. Using JAXP-Compliant Parsers
- 18.3. The XML Registry
- 18.3.1. Creating an XML Registry
- 18.3.2. Configuring Document-Specific Parsers
- 18.3.3. Configuring External Entity Resolution
- 18.3.4. Caching Entities
- 18.4. XML Application Scoping
- 18.4.1. Configuring Factories
- 18.4.2. Configuring Entity Resolution
- 18.5. WebLogic's Streaming API
- 18.5.1. Creating a Stream
- 18.5.2. Events
- 18.5.3. Filtering a Stream
- 18.5.4. Custom Filters
- 18.5.5. Positioning the Stream
- 18.5.6. Substreams
- 18.5.7. Buffered Streams
- 18.5.8. Creating Output Streams
- 18.5.9. Writing to the Stream
- 18.6. WebLogic's XPath API
- 18.6.1. Using the API with a DOM
- 18.6.2. Using the API with a Stream
- 18.7. Miscellaneous Extensions
- 18.7.1. Parsing XML in a Servlet
- 18.7.2. Using the JSP Tag Library for XSL Transformations
- 18.7.2.1. Using an interceptor
- 18.7.2.2. Using the XSLT tag
- 19. Web Services
- 19.1. Using the Web Services Framework
- 19.1.1. Web Services Architecture
- 19.1.1.1. Typical behavior of a web service
- 19.1.1.2. Web service operations without a backend
- 19.1.1. Web Services Architecture
- 19.1.2. Building Your First Web Service
- 19.1.2.1. Using the Administration Console
- 19.1.2.2. Mapping your web service to an alternative URL
- 19.1. Using the Web Services Framework
- 19.1.3. Using the WSDL to Create a Web Service
- 19.1.3.1. Publishing a static WSDL file
- 19.1.4. Using Ant Tasks to Build Web Services
- 19.2. Web Service Design Considerations
- 19.2.1. RPC-Oriented Versus Document-Oriented Web Services
- 19.2.2. Synchronous Versus Asynchronous Operations
- 19.2.3. Datatypes
- 19.2.4. Stateful Web Services
- 19.2.4.1. Creating an HttpSession for a web service
- 19.2.5. JMS Transport
- 19.3. Implementing the Backend Components
- 19.3.1. Java Class Backends
- 19.3.2. Stateless Session EJB Backends
- 19.3.3. JMS Backends
- 19.3.3.1. Designing a JMS backend
- 19.3.3.2. Building a web service over a JMS backend
- 19.3.3.3. Configuring the web-services.xml descriptor
- 19.3.4. Raising a SOAPFaultException
- 19.4. Datatypes
- 19.4.1. Built-in Types
- 19.4.2. Custom Types
- 19.4.3. Generating Support Files for a Custom Java Class
- 19.4.3.1. Using the servicegen Ant task
- 19.4.4. Autotyping
- 19.4.4.1. Using an XML Schema
- 19.4.4.2. Round-tripping
- 19.4.5. Manually Creating the Support Classes for a Custom Type
- 19.4.5.1. Creating the XML Schema and Java class for a datatype
- 19.4.5.2. Creating the serialization class
- 19.4.5.3. Including type information in the web-services.xml descriptor
- 19.4.5.4. Using the servicegen task
- 19.4.6. Implementing Multiple Return Values
- 19.4.6.1. Creating holder classes
- 19.4.7. SOAP Attachments
- 19.5. Implementing Clients
- 19.5.1. Client-Side Libraries
- 19.5.2. Building a Client JAR for Static Clients
- 19.5.3. Static Clients
- 19.5.4. Asynchronous Clients
- 19.5.5. Dynamic Clients
- 19.5.5.1. Introspecting the WSDL
- 19.5.5.2. Registering datatype mapping information
- 19.5.6. SOAP 1.2
- 19.5.7. J2ME Clients
- 19.5.8. Client Portability
- 19.5.9. Client System Properties
- 19.6. Reliable SOAP Messaging
- 19.6.1. Architecture
- 19.6.2. Implementing Reliable Web Service Backends
- 19.6.2.1. Building the sender and receiver
- 19.6.2.2. Configuring the servers
- 19.6.2.3. Writing the receiver
- 19.7. SOAP Message Handlers
- 19.7.1. Life Cycle of a SOAP Handler
- 19.7.2. Configuring a Handler Chain
- 19.7.3. Creating and Registering SOAP Handlers
- 19.7.3.1. Using only SOAP handlers to implement an operation
- 19.8. Security
- 19.8.1. Access Control
- 19.8.1.1. Assigning a security policy to the web service
- 19.8.1.2. Securing the web service URL
- 19.8.1.3. Securing a stateless session EJB and its methods
- 19.8.1.4. Removing access to the home page and WSDL
- 19.8.1.5. Authenticating client access to a protected web service
- 19.8.1. Access Control
- 19.8.2. Using SSL
- 19.8.2.1. Client access using WebLogic's SSL
- 19.8.2.2. Using a proxy server
- 19.8.2.3. Configuring SSL programmatically
- 19.8.2.4. Using two-way SSL
- 19.8.2.5. Rolling your own SSL implementation
- 19.8.3. SOAP Message Security
- 19.8.3.1. Architecture
- 19.8.3.2. Configuring SOAP message security
- 19.8.3.3. Creating the certificates
- 19.8.3.4. Setting up the Identity Assertion Provider
- 19.8.3.5. Writing the client
- 19.8.3.6. Running the client
- 19.8.3.7. Encrypting passwords
- 19.9. UDDI
- 19.9.1. The UDDI Registry
- 19.9.2. The UDDI Directory Explorer
- 19.9.2.1. Public registries
- 19.9.2.2. Private registries
- 19.9.3. The Client API
- 19.10. Internationalization and Character Sets
- 19.10.1. Configuring Web Services
- 19.10.2. Configuring Client Applications
- 20. JMX
- 20.1. The MBean Architecture
- 20.1.1. Configuration MBeans
- 20.1.2. Runtime MBeans
- 20.1.3. Security MBeans
- 20.1. The MBean Architecture
- 20.2. Accessing MBean Servers
- 20.2.1. Local and Administration Home Interfaces
- 20.2.2. Retrieving the Home Interface
- 20.3. Accessing MBeans
- 20.3.1. Naming of MBeans
- 20.3.1.1. Determining MBean type
- 20.3.1.2. Determining parent-child relationships
- 20.3.1. Naming of MBeans
- 20.3.2. Using the Administration Tool
- 20.3.3. Using WLShell
- 20.3.4. Standard MBean Access
- 20.3.5. WebLogic MBean Access
- 20.4. Examples
- 20.4.1. Runtime MBeans
- 20.4.2. Administration MBeans
- 20.4.3. Security MBeans
- 20.5. MBean Notifications
- 20.5.1. Creating a Notification Listener
- 20.5.2. Registering a Listener
- 20.6. Monitor MBeans
- 20.6.1. Types of Monitors
- 20.6.2. An Example Monitor
- 20.7. Timer MBeans
- 21. Logging and Internationalization
- 21.1. The Logging Architecture
- 21.1.1. Under the Hood
- 21.1.2. Viewing Log Files
- 21.1.3. Anatomy of a Log Message
- 21.1.4. Managing the Domain Log
- 21.1.5. Managing the Local Log
- 21.1.6. Creating a Domain Log Filter
- 21.1.7. WebLogic Message Catalogs
- 21.1. The Logging Architecture
- 21.2. Listening for Log Messages
- 21.2.1. JMX Listeners
- 21.2.2. JDK Logging
- 21.3. Generating Log Messages
- 21.3.1. Log Message Catalogs
- 21.3.1.1. Creating log message catalogs
- 21.3.1.2. Generating log messages
- 21.3.1. Log Message Catalogs
- 21.3.2. Noncatalog Logging
- 21.3.3. Servlet Logging
- 21.3.4. Client Application Logging
- 22. SNMP
- 22.1. WebLogic's SNMP Infrastructure
- 22.2. Using the SNMP Agent
- 22.2.1. The Management Information Base
- 22.2.2. Community Names
- 22.3. Traps
- 22.3.1. Trap Destinations
- 22.3.2. Attribute Change Traps
- 22.3.3. Log Message Traps
- 22.3.4. Monitor Traps
- 22.4. SNMP Proxies
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Large language models (LLMs) and generative AI are rapidly changing the healthcare industry. These technologies have the potential to revolutionize healthcare by improving the efficiency, accuracy, and personalization of care. This practical book shows healthcare leaders, researchers, data scient...(149.89 zł najniższa cena z 30 dni)
149.84 zł
199.00 zł(-25%) -
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the ...(162.21 zł najniższa cena z 30 dni)
162.16 zł
209.00 zł(-22%) -
Learn how to implement and manage a modern customer data platform (CDP) through the Salesforce Data Cloud platform. This practical book provides a comprehensive overview that shows architects, administrators, developers, data engineers, and marketers how to ingest, store, and manage real-time cus...(185.84 zł najniższa cena z 30 dni)
185.73 zł
249.00 zł(-25%) -
Real-time applications are becoming the norm today. But building a model that works properly requires real-time data from the source, in-flight stream processing, and low latency serving of its analytics. With this practical book, data engineers, data architects, and data analysts will learn how ...(210.20 zł najniższa cena z 30 dni)
210.15 zł
279.00 zł(-25%) -
Methods of delivering software are constantly evolving in order to increase speed to market without sacrificing reliability and stability. Mastering development end to end, from version control to production, and building production-ready code is now more important than ever. Continuous deploymen...(171.72 zł najniższa cena z 30 dni)
171.52 zł
229.00 zł(-25%) -
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural pr...(153.48 zł najniższa cena z 30 dni)
153.28 zł
209.00 zł(-27%) -
This concise yet comprehensive guide explains how to adopt a data lakehouse architecture to implement modern data platforms. It reviews the design considerations, challenges, and best practices for implementing a lakehouse and provides key insights into the ways that using a lakehouse can impact ...(181.63 zł najniższa cena z 30 dni)
181.58 zł
249.00 zł(-27%) -
In today's fast-paced world, more and more organizations require rapid application development with reduced development costs and increased productivity. This practical guide shows application developers how to use PowerApps, Microsoft's no-code/low-code application framework that helps developer...(150.77 zł najniższa cena z 30 dni)
150.57 zł
209.00 zł(-28%) -
Welcome to the systems age, where software professionals are no longer building software&emdash;we're building systems of software. Change is continuously deployed across software ecosystems coordinated by responsive infrastructure. In this world of increasing relational complexity, we need t...(141.04 zł najniższa cena z 30 dni)
140.94 zł
209.00 zł(-33%) -
This book provides an ideal guide for Python developers who want to learn how to build applications with large language models. Authors Olivier Caelen and Marie-Alice Blete cover the main features and benefits of GPT-4 and GPT-3.5 models and explain how they work. You'll also get a step-by-step g...(143.33 zł najniższa cena z 30 dni)
142.83 zł
209.00 zł(-32%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: WebLogic: The Definitive Guide Jon Mountjoy, Avinash Chugh (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.