BEA Weblogic Server Bible, 2nd Edition
* Extensive coverage of building enterprise applications with this popular J2EE application server
* Updated edition includes new coverage of BEA's WebLogic Workshop tool with WebLogic Server, expanded coverage of security and clustering, WebLogic Integration, and WebLogic Portal
* BEA leads the J2EE application server market, and its market share continues to grow
* Companion Web site features additional code, examples, and updates
Joe Zuffoletto is a system architect specializing in application servers and their integration with other host systems. After receiving a computer science degree from Princeton in 1987, he began working with application servers in 1990, when he wrote a number of them for clients in the financial services and technology industries. These servers were based on a C++ framework he developed and enhanced over a five-year span, and they provided serverside execution of business logic, as well as access to embedded and separate relational database systems.
Joe has since left the hard work of writing application servers to others, such as BEA and Sun. He is currently president and co-owner of ZeeWare, Inc. (www.zeeware.com), a systems integration firm focused on building J2EE solutions with WebLogic Server. He lives with his wife in Sausalito, California.
Table of Contents
Part I: Preparing Your Enterprise for WebLogic.
Chapter 1: A Quick Tour of WebLogic Server.
Chapter 2: Assembling and Managing a WebLogic Development Team.
Chapter 3: Designing WebLogic Applications.
Chapter 4: Setting Up a WebLogic Environment.
Part II: WebLogic and the J2EE APIs.
Chapter 5: Working with WebLogic JDBC.
Chapter 6: Understanding Transactions and Working with WebLogic JTA.
Chapter 7: Working with WebLogic JNDI.
Chapter 8: Working with WebLogic RMI.
Chapter 9: Working with WebLogic JMS.
Chapter 10: Working with WebLogic JavaMail.
Part III: Developing Web Components.
Chapter 11: Developing Servlets.
Chapter 12: Developing JavaServer Pages.
Chapter 13: Developing Tag Libraries.
Part IV: Developing EJB Components.
Chapter 14: Understanding Enterprise JavaBeans.
Chapter 15: Developing Session Beans.
Chapter 16: Developing Entity Beans.
Chapter 17: Developing Message-Driven Beans.
Part V: Deploying and Testing Enterprise Applications.
Chapter 18: Assembling and Deploying WebLogic Applications.
Chapter 19: Testing and Tuning WebLogic Applications.
Part VI: Implementing Security.
Chapter 20: Understanding Security Fundamentals.
Chapter 21: Understanding WebLogic’s Security Architecture.
Chapter 22: Securing WebLogic Resources and Programming JAAS.
Part VII: WebLogic Server Administration.
Chapter 23: Working with WebLogic’s Administration Tools.
Chapter 24: Working with WebLogic Clusters.
Chapter 25: Security Administration in WebLogic.
Part VIII: Enterprise Application Integration.
Chapter 26: Web Services with WebLogic Server.
Chapter 27: Web Services with WebLogic Workshop.
Chapter 28: Working with WebLogic and the J2EE Connector Architecture.
Appendix A: Upgrading to WebLogic Server 7.0 from Earlier Versions.
Appendix B: WebLogic Server Tools and Utilities.
Sign up now »
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- Researchers find more versions of digitally signed Mac OS X spyware
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes