Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus

Buy
Escape from common coding pitfalls with this detailed book of proven Jakarta missteps and solutions

The dangers of Jakarta pitfalls are everywhere and countless developers have already been trapped. These mistakes have delayed schedules, allowed major bugs to get into the users’ hands, or led to numerous rewrites in maintenance. Luckily, you don’t have to be the next victim. This comprehensive book captures some of the most common pitfalls that occur with Jakarta and provides you with the solutions to escape them. Focusing on Struts, Ant, Cactus, and JUnit, the authors describe each pitfall in detail, explain how developers have walked into the trap, and discuss the common symptoms and consequences.

They then arm you with a proven solution for each pitfall and take you step-by-step through the process of converting from error-ridden to pitfall-free code. In the end, the pitfalls and solutions presented inside will help you build superior applications that are easier to maintain.

This book will save you from the frustration of having to spend hours working your way out of pitfalls such as:

  • Failing to isolate tests or subjects in Cactus and JUnit
  • Overloading Struts ActionMappings
  • Calculating derived values in JSPs
  • Duplicating formatting and type conversion code in Struts Action Forms
  • Building subprojects
  • Performing business logic in Struts ActionForms

The companion Web site contains all the code examples and solutions in the book.

About the Author
BILL DUDNEY is a Java architect with Object Systems Group. He has been building J2EE™ applications and software for five years and has been doing distributed computing for almost fourteen years. He is the coauthor of J2EE AntiPatterns (from Wiley).

JONATHAN LEHR is an independent consultant with more than twenty years of experience in software development and training. He has designed e-commerce applications for Fortune 100 companies.

(HTML tags aren't allowed.)

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Conversational Capital: How to Create Stuff People Love to Talk About
Conversational Capital: How to Create Stuff People Love to Talk About

“In The Tipping Point, Malcolm Gladwell presents an important idea without any ‘how to.’ Now Bertrand Cesvet provides the ‘how to’ you need to create ‘Tipping Points’ for your business and success. This book is a compelling presentation of a powerful idea. This is how the...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...

The Unofficial Guide to Managing Rental Property
The Unofficial Guide to Managing Rental Property
Whether you own a single-family home, a duplex,
a triplex, or multiple units, if you rent it out, you’re a
landlord. And as a landlord, you need good information.
This book begins with the basics and takes you
through many different steps along the way. Aimed
primarily at landlords just getting into the business,...
Connected Marketing
Connected Marketing

Connected Marketing is a business book about the state of the art in viral, buzz and word-of-mouth marketing. Written by 17 experts working at the cutting edge of viral, buzz and word-of-mouth marketing, Connected Marketing introduces the range of scalable, predictable and measurable solutions for driving business growth by...

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy