Book description
A Complete Study System for OCM Exams 1Z0-807, 1Z0-865, and 1Z0-866
Prepare for the Oracle Certified Master Java EE 6 Enterprise Architect exams with this exclusive Oracle Press guide. The multiple-choice exam, the assignment, and the essay exam are covered. Chapters feature challenging exercises, a certification summary, a two-minute drill, and a self-test to reinforce the topics presented. This authoritative resource helps you pass these exams and also serves as an essential, on-the-job reference. Get complete coverage of all exam objectives, including:
- Application design concepts and principles
- Common architectures
- Integration and messaging
- Business-tier technologies
- Web-tier technologies
- Design patterns
- Security
Electronic content includes:
- 120 multiple-choice practice exam questions
- Test engine that provides practice exams and customized quizzes by chapter
Table of contents
- Cover
- Title Page
- Copyright Page
- About the Authors
- Contents
- Acknowledgments
- Preface
- Introduction
-
1. The Oracle Certified Master, Java EE 6 Enterprise Architect Exam and Certification
- Widespread Capabilities for Application Development
- Java Is the Glue That Binds the Application Development Process
- Companies Increasingly Need the Internet to Compete
- Challenges of Application Development for the Enterprise
- Design Goals of JEE Architecture
- The New Architect Role: Comprehensive Skill Set Required
- Large-scale, Distributed Enterprise Systems and Integration Risk
- Architectural Principles
- Registering for Oracle Certified Master, Java EE 6 Enterprise Architect Distinguishes the Java Professional
- General OCMJEA Test Preparation Tips
-
2. Application Design Concepts and Principles
- Identify Nonfunctional and Quality of Service Requirements That Influence Application Design
- Identify How the Separation of Concerns Principle Applies to the Component Model of a Java EE Application
- Identify the Correct Interpretation of Separation of Concerns as It Applies to the Java EE Service Layers
-
Identify the Effects of an Object-Oriented Approach to System Design
- Fundamental Object-Oriented Concepts
- Analysis and Design of Object-Oriented Architecture
- Modeling and the Software Development Process
- Exercise 2-1: Design Activities
- Unified Modeling Language
- UML Diagrams
- UML Tools
- Elements Used in UML
- Relationships Used in UML
- Diagrams Used in UML
- Stereotypes
- Practical Use of UML Diagrams
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
-
3. Common Architectures
- Identify the Appropriate Strategy for Deploying Client Applications to Desktop and Mobile Platforms, the Principles for Designing a User Interface, and the Benefits of Applying Client Tier Patterns
- Identify Best Practices for Exception Handling, Logging, and Business Tier Patterns
- Identify Design Patterns That Address Specific Challenges in the Web Tier, Including Authentication, Authorization, and Scaling and Clustering to Meet Demand
- Identify Java EE Technologies, Including JMS, JCA, and Web Services, and Design Patterns That Address Specific Challenges in Enterprise Integration
- Identify the Challenges in Integrating Enterprise Resources, the Java EE Technologies That Address Them (Including JPA and JDBC), and the Communication Protocols That Support Tier-to-Tier Communication (Including RMI, IIOP, and CORBA)
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
-
4. Integration and Messaging
- Identify the APIs Available for a Java EE Technology-Based System to Communicate with External Resources. Outline the Benefits and Drawbacks of Each Approach
- Identify and Detail the Technologies Used to Integrate Business Components with External Resources, Including JMS and JCA
- Describe the Technologies Used to Integrate Business Components with Web Services, Including XML over HTTP, JSON, SOAP, and REST.
- Identify How a Service-Oriented Architecture (SOA) Facilitates System Integration and Best Practices
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
-
5. Business Tier Technologies
- Background on New Features in Java EE 6
- Identify the Correct EJB Technology to Apply for a Given Scenario, Including Entity Classes, Session Beans, Message-Driven Beans, Timers, Interceptors, and POJOs
- Identify Benefits and Drawbacks of Different Persistence Technologies such as BMP, CMP, and JPA, Including Ease of Development, Performance, Scalability, Extensibility, and Security
- Identify the Benefits and Drawbacks of Implementing Web Services in the EJB Component Container
- Select the Appropriate Use of JPA and JPQL in a Given Scenario
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
-
6. Web Tier Technologies
- Web Tier Development Roles
- Identify the Benefits and Drawbacks of Using URL Rewriting and Cookies to Manage HTTP Session State
- Identify Appropriate Uses for JSP and Servlet Technology, and JavaServer Faces in a Given Java EE Application
- Identify the Benefits of Using an EJB Container with a Web Container Instead of a Web Container Alone
- Identify the Differences between Client Pull and Server Push Architectures
- Identify the Benefits and Drawbacks of Using a Browser to Access Asynchronous, Lightweight Processes on the Server
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
-
7. Design Patterns
- Benefits of Using Design Patterns
- Design Patterns by Gamma et al., AKA the “Gang of Four” (GoF)
- Benefits of a Specified GoF Design Pattern
- Select an Appropriate Gang of Four (GoF) Pattern for a Given Application Challenge
- Identify a Gang of Four (GoF) Design Pattern, Using a Description of Its Features
- Demonstrate Knowledge of Java EE Design Patterns
- Identify the Use of the Law of Leaky Abstractions or a Specific Anti-Pattern in a Given Scenario
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
-
8. Security
- Identify Elements of the Security Model in the Java SE Environments for Remote Clients, Including Web Start, Applets, and the Role of the SecurityManager Class
- Select Appropriate Locations to Implement Java EE Security Technologies or Features in a UML Component and Deployment Diagram
- Classify Security Threats to an Enterprise Application and Select the Measures an Architect Can Propose to Mitigation Them
- Identify Techniques Associated with Declarative and Programmatic Security, Including the Use of Annotations, Deployment Descriptors, and JAAS Technology
- Identify the Security Technologies That Apply to an Application’s Code, Messaging, and Transport Layers
- Two-Minute Drill
- Q&A Self Test
- Self Test Answers
- A. Java (EE) Enterprise Architect Certified Master Assignment
-
B. Java (EE) Enterprise Architect Certified Master Essay Exam
- The Case Study Infrastructure
-
Essay Questions and Sample Answers
- How Does Your Design Handle Availability?
- How Does Your Design Handle Reliability?
- How Does Your Design Handle Scalability?
- How Does Your Design Handle Performance?
- How Does Your Design Handle Security?
- How Does Your Design Handle Extensibility?
- How Does Your Design Handle Maintainability?
- How Does Your Design Handle Manageability?
- How Does Your Design Handle Persistence?
- How Does Your Design Handle the Presentation Tier?
- Before the Exam: Prepare and Practice
- C. About the Download
- Glossary
- Index
Product information
- Title: OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866), 3rd Edition
- Author(s):
- Release date: August 2014
- Publisher(s): McGraw Hill Computing
- ISBN: 9780071826747
You might also like
book
Sun Certified Enterprise Architect for Java EE Study Guide (Exam 310-051), 2nd Edition
The Best Fully Integrated Study System Available With hundreds of practice questions and hands-on exercises, Sun …
book
Sun Certified Enterprise Architect for Java™ EE Study Guide, Second Edition
Definitive, Comprehensive SCEA Exam Prep–Straight from Sun’s Exam Developers! This book delivers complete, focused review for …
book
Java EE 7: The Big Picture
The Definitive Guide to Java Platform, Enterprise Edition 7 Java EE 7: The Big Picture uniquely …
book
Human Activity Recognition
Learn How to Design and Implement HAR Systems The pervasiveness and range of capabilities of today’s …