Sun Certified Enterprise Architect for Java EE Study Guide / Edition 2

Paperback (Print)
Buy New
Buy New from BN.com
$31.52
Used and New from Other Sellers
Used and New from Other Sellers
from $25.64
Usually ships in 1-2 business days
(Save 43%)
Other sellers (Paperback)
  • All (10) from $25.64   
  • New (8) from $25.64   
  • Used (2) from $31.51   

Overview

Definitive, Comprehensive SCEA Exam Prep–Straight from Sun’s Exam Developers!

This book delivers complete, focused review for Sun’s new Sun Certified Enterprise Architect (SCEA) for Java EE certification exam–straight from two of the exam’s creators! SCEA lead developer/assessor Mark Cade and SCEA lead developer/assessor Humphrey Sheil offer powerful insights, real-world architectural case studies, and challenging sample questions that systematically prepare you for the actual exam. For every question, the authors show why the right answers are right–and why the other answers are wrong. Cade and Sheil cover every SCEA exam topic, skill, and technique, including:

  • Understanding system architecture and its goals
  • Decomposing larger systems into components organized by tiers or layers
  • Addressing requirements for scalability, maintainability, reliability, availability, extensibility, performance, and security
  • Building effective web (presentation) tiers, and analyzing tradeoffs associated with using web frameworks
  • Leveraging EJB 3’s enhancements for business tier development
  • Covering new enhancements in the JEE 5 platform
  • Choosing and architecting the best integration and messaging components for your system
  • Using the Java security model to enforce confidentiality, integrity, authorization, authentication, and non-repudiation
  • Using the most powerful and useful Java EE architecture patterns
  • Documenting Java EE architectures through visual models and narratives

The authors also present detailed guidance for handling every element of the SCEA exam–including your development and defense of a complete real-world architectural solution.

Read More Show Less

Product Details

  • ISBN-13: 9780131482036
  • Publisher: Prentice Hall
  • Publication date: 2/12/2010
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 191
  • Sales rank: 892,102
  • Product dimensions: 6.90 (w) x 9.00 (h) x 0.60 (d)

Meet the Author

Mark Cade is a lead developer and assessor of the SCEA exam covered in this book. He worked at the Sun Microsystems Java Center as a Senior Java Architect, where he has extensive experience creating architectures for Java EE solutions for Fortune 500 companies. He has more than 20 years of experience as a software engineer.

Humphrey Sheil is a lead developer and assessor for the SCEA exam covered in this book. With a background specializing in enterprise architecture and integration in the United States and Europe, he holds a M.Sc. and B.Sc. in Computer Science from University College Dublin. He is currently the CTO at Comtec Group.

Read More Show Less

Table of Contents

Acknowledgments . . . xv

About the Authors . . . xvii

Chapter 1 What Is Architecture? . . . 1

Introduction . . . 1

Prerequisite Review . . . 1

Discussion . . . 2

Understanding Architecture . . . 2

Role of the Architect . . . 5

More Detail on the Exam Itself . . . 6

Part I: Multiple Choice . . . 7

Part II: Solving the Business Problem . . . 8

Part III: Defending Your Solution . . . 9

Preparing for the Exam . . . 10

Preparing for Part I . . . 10

Preparing for Part II . . . 11

Preparing for Part III . . . 11

Essential Points . . . 11

Review Your Progress . . . 11

Chapter 2 Architecture Decomposition . . . 13

Introduction . . . 13

Prerequisite Review . . . 14

Discussion . . . 14

Decomposition Strategies . . . 14

Layering . . . 15

Distribution . . . 15

Exposure . . . 16

Functionality . . . 16

Generality . . . 16

Coupling and Cohesion . . . 16

Volatility . . . 16

Configuration . . . 16

Planning and Tracking . . . 17

Work Assignment . . . 17

Tiers . . . 17

Client . . . 17

Web . . . 18

Business . . . 18

Integration . . . 18

Resource . . . 18

Layers . . .18

Application . . . 19

Virtual Platform (Component APIs) . . . 19

Application Infrastructure (Containers) . . . 19

Enterprise Services (OS and Virtualization) . . . 19

Compute and Storage . . . 19

Networking Infrastructure . . . 20

Service-Level Requirements . . . 20

Performance . . . 20

Scalability . . . 20

Reliability . . . 21

Availability . . . 21

Extensibility . . . 22

Maintainability . . . 22

Manageability . . . 22

Security . . . 22

Impact of Dimensions on Service-Level Requirements . . . 23

Capacity . . . 23

Redundancy . . . 23

Modularity . . . 23

Tolerance . . . 24

Workload . . . 24

Heterogeneity . . . 24

Common Practices for Improving Service-Level Requirements . . . 24

Introducing Redundancy to the System Architecture . . . 24

Improving Performance . . . 27

Improving Availability . . . 28

Improving Extensibility . . . 29

Improving Scalability . . . 30

Tiers in Architecture . . . 30

Two-Tier Systems . . . 31

Advantages . . . 31

Disadvantages . . . 31

Three- and Multi-Tier Systems . . . 31

Advantages . . . 32

Disadvantages . . . 32

Essential Points . . . 32

Review Your Progress . . . 33

Chapter 3 Web Tier Technologies . . . 35

Introduction . . . 35

Prerequisite Review . . . 36

Model View Controller (MVC) . . . 36

Web Container . . . 36

Servlets . . . 37

Filters . . . 38

Listeners . . . 39

JavaServer Pages (JSP) . . . 39

Java Standard Tag Library (JSTL) . . . 40

Unified Expression Language (EL) . . . 40

Managing Sessions . . . 40

JavaServer Faces (JSF) . . . 41

Templating Frameworks . . . 41

Web Frameworks . . . 42

Discussion . . . 42

JSPs and Servlets–Standard Uses . . . 42

JSF–Standard Uses . . . 43

Web-Centric Implementations . . . 43

EJB-Centric Implementations . . . 44

Rationale for Choosing Between EJB-Centric and Web-Centric Implementations . . . 45

The Future of Client-Server Communication . . . 46

Essential Points . . . 46

Review Your Progress . . . 47

Chapter 4 Business Tier Technologies . . . 51

Introduction . . . 51

Prerequisite Review . . . 52

Enterprise Java Bean . . . 53

Session Bean . . . 54

Stateless Session Bean . . . 54

Stateful Session Bean . . . 55

Entity Beans . . . 56

CMP Entity Bean . . . 56

BMP Entity Bean . . . 57

Entity Class . . . 57

Persistence Strategies . . . 58

Message-Driven Bean . . . 58

Discussion . . . 59

EJB Advantages and Disadvantages . . . 59

Scalability . . . 59

Security . . . 60

Contrasting Persistence Strategies . . . 60

Ease of Development . . . 60

Performance . . . 60

Extensibility . . . 61

EJB and Web Services . . . 61

EJBs as Web Service End Points . . . 61

EJBs Consuming Web Services . . . 61

Advantages and Disadvantages . . . 62

EJB 3 . . . 62

Ease of Development . . . 63

Container in EJB 3 . . . 63

JPA in EJB 3 . . . 63

Essential Points . . . 64

Review Your Progress . . . 65

Chapter 5 Integration and Messaging . . . 69

Introduction . . . 69

Prerequisite Review . . . 70

Web Services . . . 71

SOAP . . . 71

WSDL . . . 72

JAX-RPC . . . 72

JAX-WS . . . 72

JAXB . . . 72

JAXR . . . 73

JMS . . . 73

JCA . . . 74

Discussion . . . 75

Java to Java Integration . . . 75

Java Messaging Service (JMS) . . . 76

Java to Non-Java Integration . . . 76

Web Services . . . 76

Java Connector Architecture (JCA) . . . 77

Essential Points . . . 78

Review Your Progress . . . 78

Chapter 6 Security . . . 83

Introduction . . . 83

Prerequisite Review . . . 84

JRE . . . 85

JAAS . . . 85

Credential . . . 85

Principal . . . 86

Authentication . . . 86

Authorization . . . 86

Discussion . . . 86

Client-Side Security . . . 87

Server-Side Security . . . 88

EJB Container . . . 88

Web Container . . . 88

Putting the EJB Container and Web Container Together . . . 89

Web Service Security . . . 90

How Security Behavior Is Defined . . . 91

Declarative Security . . . 91

Programmatic Security . . . 92

Commonly Encountered Security Threats . . . 93

Defining a Security Model . . . 94

Essential Points . . . 95

Review Your Progress . . . 95

Chapter 7 Applying Patterns . . . 99

Introduction . . . 99

Prerequisite Review . . . 100

Discussion . . . 101

Creational Patterns . . . 101

Abstract Factory Pattern . . . 101

Builder Pattern . . . 103

Factory Method Pattern . . . 104

Prototype Pattern . . . 105

Singleton Pattern . . . 106

Structural Patterns . . . 107

Adapter Pattern . . . 107

Bridge Pattern . . . 108

Composite Pattern . . . 109

Decorator Pattern . . . 111

Façade Pattern . . . 112

Flyweight Pattern . . . 113

Proxy Pattern . . . 114

Behavioral Patterns . . . 115

Chain of Responsibility Pattern . . . 115

Command Pattern . . . 116

Interpreter Pattern . . . 117

Iterator Pattern . . . 118

Mediator Pattern . . . 119

Memento Pattern . . . 120

Observer Pattern . . . 121

State Pattern . . . 122

Strategy Pattern . . . 123

Template Method Pattern . . . 124

Visitor Pattern . . . 125

Core Java EE Patterns . . . 126

Presentation Tier . . . 126

Intercepting Filter . . . 126

Context Object . . . 127

Front Controller . . . 128

Application Controller . . . 129

View Helper . . . 129

Composite View . . . 130

Dispatcher View . . . 131

Service to Worker . . . 132

Business Tier . . . 132

Business Delegate . . . 133

Service Locator . . . 133

Session Façade . . . 134

Application Service . . . 135

Business Object . . . 136

Composite Entity . . . 136

Transfer Object . . . 137

Transfer Object Assembler . . . 138

Value List Handler . . . 139

Integration Tier . . . 139

Data Access Object . . . 140

Service Activator . . . 140

Domain Store . . . 141

Web Service Broker . . . 142

Essential Points . . . 143

Review Your Progress . . . 146

Chapter 8 Documenting an Architecture . . . 149

Introduction . . . 149

Prerequisite Review . . . 149

Discussion . . . 150

Building Blocks of UML . . . 150

Elements . . . 151

Structural Elements . . . 151

Behavioral Elements . . . 152

Grouping Element . . . 153

Annotational Elements . . . 153

Relationships . . . 154

Common Mechanisms . . . 155

Specifications . . . 155

Adornments . . . 155

Common Divisions . . . 156

Extensibility Mechanisms . . . 156

UML Diagrams . . . 157

Structure Diagrams . . . 157

Class Diagram . . . 157

Component Diagram . . . 157

Deployment Diagram . . . 159

Package Diagram . . . 159

Behavior Diagrams . . . 160

Activity Diagram . . . 160

Statechart Diagram . . . 161

Use-Case Diagram . . . 162

Interaction Diagrams . . . 163

Essential Points . . . 164

Review Your Progress . . . 164

Chapter 9 Tackling Parts II and III . . . 167

Introduction . . . 167

Prerequisite Review . . . 167

Discussion . . . 168

Scenario . . . 168

Worked Solution . . . 170

Class Diagram . . . 170

Component Diagram . . . 173

Deployment Diagram . . . 174

Sequence Diagrams . . . 176

Comments on Diagrams . . . 178

Identified Risks and Mitigations . . . 178

Part III–Defending Your Architecture . . . 179

Essential Points . . . 180

Index . . . 181

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)