You may already be aware that modern web applications are now more commonly modeled around desktop-like implementations. By following the development of a real-world application, you will see how best to use ICEfaces components to customize the interface layout, navigation, data presentation and data creation to achieve the efficient, modern, web application that you've always dreamed of!
ICEfaces is an innovative enterprise AJAX framework which allows you to build modern web 2.0 applications. By breaking away from the traditional request-response model and using AJAX push with ICEfaces, you can have bidirectional communication between browser and server, improving performance.
This new paradigm requires the mixing of client-side and server-side programming concepts which can raise maintenance efforts so that the integration of corresponding frameworks is still a challenge. This book will show you how to use the programming model to full effect in order to dramatically ease development.
You can enhance your application with ICEfaces components which are implemented in Facelets applications. This book shows you how to use and design new components and to implement components without extending existing JSF component classes. You will learn how to combine ICEfaces tags and write a simple backing bean for components and learn how to modify this technology for reuse in the frontend.
What you will learn from this book?
- Implement the principles of modern Web application design using the ICEfaces enterprise AJAX framework.
- Design enterprise-ready components with Facelets
- Integrate modern frontend development into your JEE stack using JSF, Facelets, Spring, JPA
- Customize your application using ICEfaces' skinning and multi-lingual presentation features
- Develop server side rendering and create your own monitoring tool with AJAX Push
- Improve the user's experience with popup dialogs, a progress bar, auto-complete and drag and drop.
Using this book, you will develop a full-blown Web application in a step-by-step tutorial. The application is a component showcase that you can use as a reference implementation for your own projects. The application also includes advanced enterprise components implemented in Facelets technology.
Who this book is written for?
If you are an enterprise developer who wants to add the latest Web 2.0 features to a JSF project this book is for you. You need a basic knowledge of the Spring Framework configuration through annotations and the usage of JPA annotations.
Rabies offers a complete account of one of the oldest known diseases threatening public health today. Unlike most research-oriented descriptions of rabies, this book provides a narrative about the disease and its etiologic agent, encompassing the historical background to recent developments. The emphasis on the basic biology and...
SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture
Service-Oriented Architecture is becoming the leading architecture for IT, and it is changing the way organisations work. IT is slowly but steadily gaining maturity, and becoming the flexible yet stable and reliable support for business it should be. At the same time, IT is regaining its potential to create real business innovation. SOA will...
Python Standard Library (Nutshell Handbooks) Python Standard Library, an essential guide for serious Python programmers, delivers accurate, author-tested documentation of all the modules in the Python Standard Library, along with over 300 annotated example scripts using the modules. This version of the book covers all the new modules and related information...
Advanced Building Simulation
This book introduces recent advances in building simulation and outlines its historic development. Two important topics are described: uncertainty in simulation and coupled simulations, which are both closely linked to attempts to improve control and accuracy. This is followed by coverage of wind simulations and predictions, and then by an...
Network Security Assessment: Know Your Network How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...