Title: J2EE Design Patterns
1J2EE Design Patterns
Course Content JAVA EE AND DESIGN
PATTERNS Overview of Java EE technologies
Identifying key roles of Java EE components in
a tiered architecture Analyzing application
flow Design patterns Comparing OO and Java EE
patterns The benefits of design patterns in
Java EE STRUCTURING THE PRESENTATION TIER
Separating control and presentation logic The
role of JSPs and servlets Constructing Model 2
architectures Front Controller Application
Controller Dispatcher View Service to
Worker Localizing disparate logic Avoiding
brittle architectures Improving
maintainability of algorithms Intercepting
Filter View Helper Composite View Mining
for presentation patterns Architectural
overview of Struts Investigating design
patterns in Struts Improving the user experience
by incoporating AJAX in Web applications Explori
ng the benefits and limitations of AJAX
Addressing the added complexity of AJAX
applications BUSINESS TIER PATTERNS Eliminating
inter-tier dependencies Illuminating problems
associated with poorly designed tiered
architectures Realizing an application's
domain model Context Object Business Object
Application Service Overview of the Spring
Framework Inversion of Control/Dependency
Injection
SIMPLIFYING CLIENT INTERACTIONS Selecting
scalable middle-tier technologies Preventing
performance bottlenecks Business Delegate
Service Locator Session Facade Transfer
Object DESIGNING THE INTEGRATION TIER
Abstracting the data layer Highlighting
difficulties with object relational mapping
Improving the scalability and performance of
Entity Beans Assessing DAO implementation
options JDBC, JDO, Hibernate, EJB 3 Optimizing
large paged queries Managing complex queries
Fast Track Access Value List Handler
Managing transactions effectively Choosing a
transaction policy Comparing optimistic and
pessimistic strategies Handling complex
concurrency issues with a Transaction Context
Object BUILDING UPON THE JAVA EE SECURITY
MODEL Standard Java EE security Contrasting
the declarative and programmatic security models
Shortcomings of the Java EE security model
Addressing security challenges Providing
single sign-on capabilities Eliminating
duplicate form submission problems with
Synchronizing Token PERFORMANCE AND SCALABILITY
Designing for performance Distributed
components and performance Optimizing Java EE
applications Caching Connection Pooling
Planning for scalability Clustering
applications across servers Managing session
state effectively
Code C192 Duration 24 Hrs. (4 Days)(
09.00-16.30 ) Level Advance Skills Gained
Architect Java EE applications using
industry-recognized best practices Centralize
control logic in the Presentation Tier using Java
EE patterns Create flexible and powerful
designs for core business logic Design a data
layer that manages transactions and optimizes
queries Integrate your Java EE applications
with external systems Identify and resolve
Java EE security issues Plan for high
performance and scalability Who should attend
This course is valuable for
programmers, system architects, and anyone
currently designing or developing Java EE
applications. As emphasis is on software design,
ability to comprehend Java code at the level of
Course, "Java Programming," is required.
???????????????????????????????????????????????
??????????????????????????????????????????????
??? http//www.ccp.or.th