Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns

Buy

Get the deep insights you need to master efficient architectural design considerations and solve common design problems in your enterprise applications.

Key Features

  • The benefits and applicability of using different design patterns in JAVA EE
  • Learn best practices to solve common design and architectural challenges
  • Choose the right patterns to improve the efficiency of your programs

Book Description

Patterns are essential design tools for Java developers. Java EE Design Patterns and Best Practices helps developers attain better code quality and progress to higher levels of architectural creativity by examining the purpose of each available pattern and demonstrating its implementation with various code examples. This book will take you through a number of patterns and their Java EE-specific implementations.

In the beginning, you will learn the foundation for, and importance of, design patterns in Java EE, and then will move on to implement various patterns on the presentation tier, business tier, and integration tier. Further, you will explore the patterns involved in Aspect-Oriented Programming (AOP) and take a closer look at reactive patterns. Moving on, you will be introduced to modern architectural patterns involved in composing microservices and cloud-native applications. You will get acquainted with security patterns and operational patterns involved in scaling and monitoring, along with some patterns involved in deployment.

By the end of the book, you will be able to efficiently address common problems faced when developing applications and will be comfortable working on scalable and maintainable projects of any size.

What you will learn

  • Implement presentation layers, such as the front controller pattern
  • Understand the business tier and implement the business delegate pattern
  • Master the implementation of AOP
  • Get involved with asynchronous EJB methods and REST services
  • Involve key patterns in the adoption of microservices architecture
  • Manage performance and scalability for enterprise-level applications

Who this book is for

Java developers who are comfortable with programming in Java and now want to learn how to implement design patterns to create robust, reusable and easily maintainable apps.

Table of Contents

  1. Introduction to Design Patterns
  2. Presentation Patterns
  3. Business Patterns
  4. Integration Patterns
  5. Aspect Oriented Programming for implementing design patterns
  6. Reactive Patterns
  7. Microservice Patterns
  8. Cloud Native Application Patterns
  9. Security Patterns
  10. Deployment Patterns
  11. Operational Patterns
  12. Microprofile
(HTML tags aren't allowed.)

Joomla! Web Security
Joomla! Web Security
In Detail

Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...

The Art of Application Performance Testing: From Strategy to Tools
The Art of Application Performance Testing: From Strategy to Tools

Because performance is paramount today, this thoroughly updated guide shows you how to test mission-critical applications for scalability and performance before you deploy them—whether it’s to the cloud or a mobile device. You’ll learn the complete testing process lifecycle step-by-step, along with best practices to...

Sonic Interaction Design
Sonic Interaction Design

Sound is an integral part of every user experience but a neglected medium in design disciplines. Design of an artifact's sonic qualities is often limited to the shaping of functional, representational, and signaling roles of sound. The interdisciplinary field of sonic interaction design (SID) challenges these prevalent approaches by...


Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Sass Essentials
Sass Essentials

Develop efficient and streamlined CSS styles using Sass for any website or online application with minimal effort and maximum scope for reusability in future projects

About This Book

  • Streamline CSS development using the power of SASS
  • Discover how to transition existing projects to...
Financial Statement Fraud: Strategies for Detection and Investigation (Wiley Corporate F&A)
Financial Statement Fraud: Strategies for Detection and Investigation (Wiley Corporate F&A)

Valuable guidance for staying one step ahead of financial statement fraud

Financial statement fraud is one of the most costly types of fraud and can have a direct financial impact on businesses and individuals, as well as harm investor confidence in the markets. While publications exist on financial statement fraud and roles...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy