Tuesday, January 13, 2009

Cryptography for Dummies or Core J2EE Patterns

Cryptography for Dummies

Author: Chey Cobb



• Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking

• This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations

• Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards

• Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately

• Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies




Book review: Westward Dharma or Economic Principles Applied to Space Industry Decisions

Core J2EE Patterns (Core Design Series): Best Practices and Design Strategies

Author: Deepak Alur

Over the last few years, Java 2 Platform, Enterprise Edition (J2EE) technology has emerged and matured as a standard platform for building enterprise applications. While the platform has matured into a solid offering for developing and deploying enterprise applications, it does offer its challenges. As developers, often we confuse learning the technology with learning to design with the technology. In this book, senior architects from the Sun Java Center, Sun's Java consulting organization share with the reader their cumulative design experience with and expertise on J2EE technology.

The primary focus of the book is on patterns, best practices, design strategies, and proven solutions using the key J2EE technologies including JavaServer Pages (JSP), Servlets, Enterprise Java Beans (EJB), and Java Message Service (J.M.S) API. Other ancillary technologies like JDBC and JNDI are also discussed as relevant to their usage in these patterns. The J2EE Patterns catalog with 16 patterns and numerous strategies is presented to document and promote best practices for these technologies.

In addition to the patterns and strategies, the book offers the following:

  • Presents various design strategies for the presentation tier and business tier design.
  • Identifies bad practices in presentation, business, and integration tiers, and offers directions to remedy them by using certain patterns, strategies, and refactorings.
  • Refactorings for various tiers and mechanics to move away from a bad implementation to a better solution.
  • Sample code and examples for patterns, strategies, and refactorings.

Core J2EE Patterns delivers:

  • Proven solutions for enterprise applications
  • J2EE Patterns Catalog with patterns for JSP technology, EJB technology, and J.M.S.
  • Identifies bad practices and recommends solutions
  • Refactorings to improve existing designs using patterns, strategies, and best practices
  • UML Diagrams illustrate structure and behavior of each pattern

Booknews

Presents 15 patterns for the Java 2 platform enterprise edition (J2EE) that solve problems typically encountered by application developers. Patterns include a data access object, a front controller for handling requests, and a business delegate to reduce coupling between presentation-tier clients and business services. The authors, who are architects with the Sun Java Center, also discuss some design considerations for Java server pages, servlets, and enterprise Javabeans. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Foreword
Foreword
Preface
Acknowledgments
Acknowledgments - First Edition
Pt. IPatterns and J2EE2
Ch. 1Introduction6
Ch. 2Presentation Tier Design Considerations and Bad Practices18
Ch. 3Business Tier Design Considerations and Bad Practices44
Ch. 4J2EE Refactorings62
Pt. IIJ2EE Pattern Catalog112
Ch. 5J2EE Patterns Overview116
Ch. 6Presentation Tier Patterns142
Ch. 7Business Tier Patterns300
Ch. 8Integration Tier Patterns460
Epilogue580
Bibliography621
The Apache Software License, Version 1.1625
Index627

No comments:

Post a Comment