Professional Documents
Culture Documents
CONTENTS
ABOUT THE AUTHORS ...............................................................................................2
ACKNOWLEDGMENTS .................................................................................................2
TELL US W HAT YOU THINK! ......................................................................................3
INTRODUCTION ...........................................................................................................4
This Is Your Enterprise on Caffeine! ................................................................4
This Is the Book to Address Your Needs! .......................................................5
This Is Your Brain After Reading This Book! ..................................................8
PART I: ENTERPRISE FOUNDATIONS .......................................................................10
IN THIS PART..................................................................................................10
CHAPTER 1. ENTERPRISE ARCHITECTURAL OVERVIEW .........................................10
The Enterprise ...................................................................................................11
Enterprise Components ...................................................................................13
Information Technology in the Enterprise .....................................................14
Conclusions........................................................................................................16
CHAPTER 2. OBJECT-ORIENTED SOFTWARE DEVELOPMENT FOR THE ENTERPRISE
..................................................................................................................................16
Enterprise Objects.............................................................................................17
The Object-Oriented Development Process .................................................20
Unified Modeling Language.............................................................................25
Conclusions........................................................................................................32
CHAPTER 3. COMPONENT-BASED SOFTWARE DEVELOPMENT FOR THE
ENTERPRISE .............................................................................................................32
Enterprise Components ...................................................................................32
Component Models...........................................................................................34
Component-Based Development ...................................................................38
Standards ...........................................................................................................40
Conclusions........................................................................................................43
CHAPTER 4. JAVA FOUNDATIONS FOR ENTERPRISE DEVELOPMENT .....................44
Java Features and Versions............................................................................44
Java Platform Architecture...............................................................................47
Java Files and Tools.........................................................................................49
Java Language ..................................................................................................52
Core Java Language APIs...............................................................................57
Collection APIs ..................................................................................................64
Input/Output and State Persistence APIs......................................................68
Threading APIs ..................................................................................................73
Date and Time APIs..........................................................................................77
Java Applets.......................................................................................................78
Conclusions........................................................................................................82
CHAPTER 5. JAVA ENTERPRISE SYSTEM ARCHITECTURE WITH THE J2EE ...........82
The J2EE Model................................................................................................83
J2SE V1.2 VERSUS J2SE V1.3..........................................................................85
Enterprise Java and J2EE Architecture.........................................................87
Data Connectivity ..............................................................................................90
Communication Mechanisms ..........................................................................91
Assurance Mechanisms ...................................................................................93
Client Connectivity ............................................................................................94
Web Connectivity ..............................................................................................95
Cryptography ................................................................................................668
Authentication and Nonrepudiation......................................................673
Secure Socket Layer (SSL)......................................................................678
Access Control ..............................................................................................679
Domains ..........................................................................................................681
Auditing ...........................................................................................................682
Policies and Administration .....................................................................682
Conclusions....................................................................................................683
CHAPTER 26. BASIC JAVA SECURITY .................................................................684
The History of Security in Java ..............................................................685
Java Security Architecture.......................................................................687
Byte Code Verifier .......................................................................................691
Class Loader ..................................................................................................692
Security Manager ........................................................................................698
Java Cryptography Architecture ............................................................703
Conclusions....................................................................................................708
CHAPTER 27. ADVANCED JAVA SECURITY .........................................................708
Permissions....................................................................................................709
Security Policies ...........................................................................................717
Java Access Control....................................................................................723
Principal Identification...............................................................................734
Protecting Objects.......................................................................................744
Signing Code .................................................................................................753
Java Security Extensions..........................................................................758
Conclusions....................................................................................................765
CHAPTER 28. CORBA SECURITY .......................................................................766
CORBA Security Overview .......................................................................768
DIGESTING THE CORBA SECURITY SERVICE SPECIFICATION .........................768
Authentication ..............................................................................................775
Delegation ......................................................................................................780
Authorization.................................................................................................781
Auditing ...........................................................................................................783
Nonrepudiation.............................................................................................785
Encryption ......................................................................................................789
Security Policies ...........................................................................................791
Security Administration ............................................................................792
Conclusions....................................................................................................793
PART VI: ENTERPRISE WEB ENABLING ..............................................................794
IN THIS PART................................................................................................794
CHAPTER 29. WEB BROWSERS AND SERVERS IN THE ENTERPRISE ................795
Web Browsers...............................................................................................795
Web Browser Security ...............................................................................798
Java Plug-in ...................................................................................................801
Web Servers..................................................................................................804
Web Server Security ..................................................................................807
Web Server Availability.............................................................................811
Conclusions....................................................................................................812
CORBAcomponents...................................................................................1050
Microsoft's Generic Application Framework ....................................1051
Application-Specific Platforms..............................................................1053
Enterprise Application Management ..................................................1054
Conclusions..................................................................................................1055
CHAPTER 35. APPLICATION SERVERS AND ENTERPRISE JAVABEANS............1056
Standalone Enterprise Applications....................................................1057
Application ServerBased Enterprise Applications.......................1059
Application Server Architecture Provider Roles.............................1062
Application Server Components ..........................................................1064
Application Server Client Interfaces ..................................................1068
Application Server Client Implementations ....................................1070
Enterprise Application Configuration and Deployment...............1075
Application Service Management ........................................................1079
Conclusions..................................................................................................1081
CHAPTER 36. MODELING COMPONENTS WITH ENTERPRISE JAVABEANS ......1082
EJB Overview ..............................................................................................1083
EJB Configuration and Deployment Basics......................................1095
Session Bean Server Components .....................................................1102
Session Bean Client Interfaces ............................................................1117
Session Bean Configuration and Deployment................................1129
EJB and JDBC..............................................................................................1133
Entity Bean Server Components .........................................................1135
Entity Bean Client Interfaces................................................................1157
Entity Bean Configuration and Deployment ...................................1166
Conclusions..................................................................................................1173
CHAPTER 37. ADVANCED ENTERPRISE JAVABEANS SERVING .......................1174
EJB Transactions........................................................................................1175
EJB Security.................................................................................................1185
EJB SECURITY AUTHENTICATION MODEL LIMITATIONS .............................1191
EJB/Web Connectivity..............................................................................1194
EJB/CORBA Connectivity ........................................................................1203
EJB and XML................................................................................................1206
EJB and JMS ................................................................................................1209
EJB and JavaMail .......................................................................................1215
Conclusions..................................................................................................1218
CHAPTER 38. ENTERPRISE APPLICATION INTEGRATION .................................1218
Enterprise Application Integration Overview..................................1219
EAI with JNI.................................................................................................1221
EAI with Distributed Enterprise Communication Paradigms ....1225
EAI with Messaging Services and JMS ..............................................1230
EAI with XML ...............................................................................................1231
EAI with J2EE Connectors......................................................................1233
Embedded Applications Integration ...................................................1235
Conclusions..................................................................................................1237
PART VIII: APPENDIXES....................................................................................1238
IN THIS PART..............................................................................................1238