Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Building Web Applications in WebLogic
Table 1.1: Information Available in the HttpServletRequest
Table 1.2: JSP Syntax Elements
Table 1.3: JSP Implicit Objects
Table 1.4: Custom Tag Sources
Chapter 4: Building an Example Web Application
Table 4.1: Core Reservation Process Primary Components
Table 4.2: Property Maintenance Primary Components
Chapter 5: Packaging and Deploying WebLogic Web Applications
Table 5.1: Sections of the web.xml Descriptor File
Table 5.2: Sections of the weblogic.xml Descriptor File
Table 5.3: Redeployment Behavior Depends on Production Mode and Application Location
Chapter 6: Building Enterprise JavaBeans in WebLogic Server
Table 6.2: A Comparison of Select Methods and Finder Methods
Table 6.3: Exclusive Concurrency Example
Table 6.4: Database Concurrency Example
Table 6.5: Optimistic Concurrency Example
Table 6.6: Caching-between-Transactions
Table 6.7: Finder Behavior for Cached Read-Only Beans
Table 6.8: Finder Behavior for Cached Beans Using Cache between Transactions
Chapter 7: Building an Example EJB Application
Table 7.1: Summary of Business-Tier Requirements
Table 7.2: Stateless Service JDBC Architecture Requirements Analysis
Table 7.3: Stateless Service Entity Bean Architecture Requirements Analysis
Table 7.4: Combined Architecture Requirements Analysis
Table 7.5: Required Files for Simple EJB Application
Chapter 8: Packaging and Deploying WebLogic EJB Applications
Table 8.1: Sections of the application.xml Descriptor File
Table 8.2: Sections of the weblogic-application.xml Descriptor File
Chapter 10: Using WebLogic Security
Table 10.1: Embedded LDAP Server Directory Structure and Usage
Table 10.2: Security Provider Types and Features
Table 10.3: Required SSL Configuration Data
Table 10.4: Default Roles and Groups
Table 10.5: Default Policy
Chapter 11: Administering and Deploying Applications in WebLogic Server
Table 11.1: Example Admin Server Configuration Wizard Values
Table 11.2: Managed Servers External Listen Address Attribute Values
Table 11.3: CSA Network Channel Configuration Parameter Values
Table 11.4: BigRezPool Connection Pool Configuration Parameters
Table 11.5: JMS JDBC-Based Store Connection Pool Configuration Parameters
Table 11.6: Server1s JDBC-Based JMS Store Configuration Parameters
Table 11.7: Distributed Destination Threshold and Quotas Configuration Parameters
Table 11.8: JMS Connection Factory Configuration Parameters
Table 11.9: BigRezPool Targets Attribute Change Trap Configuration Parameters
Table 11.10: BigRezDataSource Deployment Log Filter Trap Configuration Parameters
Chapter 12: Optimizing WebLogic Server Performance
Table 12.1: Guidelines for Adjusting Execute Queue Thread Count
Previous page
Table of content
Next page
Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
ISBN: 047128128X
EAN: 2147483647
Year: 2003
Pages: 125
Authors:
Gregory Nyberg
,
Robert Patrick
,
Paul Bauerschmidt
,
Jeff McDaniel
,
Raja Mukherjee
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Creating Indexes for Fast Data Retrieval
Performing Multiple-table Queries and Creating SQL Data Views
Understanding SQL Subqueries
Writing External Applications to Query and Manipulate Database Data
Monitoring and Enhancing MS-SQL Server Performance
Network Security Architectures
The Attack Process
Ten Steps to Designing Your Security System
Expected Threats
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Using the IOS Filesystem for Images
Reverse Telnet
RIP
An Advanced BGP Configuration
Troubleshooting and Logging
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Interacting with the Operating System
Working with the .NET Framework
COM Interop/PInvoke
Coding Conventions
.NET System Management Services
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
Python Programming for the Absolute Beginner, 3rd Edition
Forking Processes
Deleting Directory Trees
DBM Files
Embedding Python
Something s Wrong with the Way We Program Computers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies