Index
A
- attachments
- email, sending with / Sending an email with attachments
- attributes
- messages, associating with / Associating messages with attributes
- authentication mechanisms
- about / Authentication mechanism, Authentication mechanisms
- HTTP Basic Authentication / Authentication mechanism
- form authentication / Authentication mechanism, Form authentication
- basic authentication / Basic authentication
- auto validation / Second approach – auto validation
B
- basic authentication / Basic authentication
- basic login example
- about / Basic login example
- web page, creating / Creating a web page to protect
- roles, defining for access / Mentioning who's allowed to access the web page
- users, defining in database / Defining users and associated roles in a database
- associated roles, defining in database / Defining users and associated roles in a database
- security configuration, mapping to user database / Mapping security configuration to the user database
- bean constructor parameter injection / Bean constructor parameter injection
- bean parameters / Bean parameters
- beans
- alternative implementations, providing / Providing alternative implementations to your bean
- injecting / Injecting beans
- bean scope
- specifying / Specifying a bean scope
- request scope / Specifying a bean scope
- session scope / Specifying a bean scope
- application scope / Specifying a bean scope
- dependent scope / Specifying a bean scope
- conversation scope / Specifying a bean scope
- Bean Validation 2.0 / What's new in Bean Validation 2.0?
- bidirectional relationships / Bidirectional relationships
- binary
- using / Using binary
- brokerdestination queue / Point-to-point style
C
- caller / Caller
- caller principal / Caller principal
- CDI 2.0
- new features / What's new in CDI 2.0?
- CDI bean
- creating / Creating your first CDI bean, First CDI bean
- collections
- mapping / Mapping collections
- collections of primitives
- mapping / Map collections of primitives
- column mapping / Column mapping
- composite primary keys / Composite primary keys
- constraints
- @AssertFalse/AssertTrue / List of available constraints
- @DecimalMax/DecimalMin / List of available constraints
- @Digits / List of available constraints
- @Future/@Past / List of available constraints
- @Max/@Min / List of available constraints
- @NotNull / List of available constraints
- @Pattern / List of available constraints
- @Size / List of available constraints
- @FutureOrPresent / List of available constraints
- @NotEmpty / List of available constraints
- @Positive/@Negative / List of available constraints
- adding / Adding more constraints
- contexts and dependency API (CDI) / Contexts and dependency injection
- criteria queries / Criteria queries
- CRUD operations
- performing / Performing CRUD operations
- managed, versus detached entities / Managed versus detached entities
- managed entity / Managed versus detached entities
- detached entity / Managed versus detached entities
- record, inserting / Inserting a new record
- existing record, retrieving / Retrieving an existing record
- existing record, updating / Updating an existing record
- record, deleting / Deleting a record
- entity, detaching / Detaching an entity
- custom constraint
- defining / Defining a custom constraint
- custom identity store / Custom identity store
- custom identity store class
- creating / Creating a custom identity store class
- custom responses
- creating / Custom responses
- custom web application exceptions
- declaring / Declaring custom web application exceptions
D
- database identity store / Database identity store
- data persistence / Data persistence
- data validation / Data validation
- Date and Time mapping / Date and time mapping
- dates
- formatting / Formatting dates and numbers
- direct field injection / Direct field injection
E
- email
- sending / Sending an email
- BCC field, setting / Setting To, CC, and BCC fields
- To field, setting / Setting To, CC, and BCC fields
- CC field, setting / Setting To, CC, and BCC fields
- sending, with attachments / Sending an email with attachments
- embedded objects / Embedded objects
- encoders
- using / Using encoders
- enterprise applications / Enterprise applications
- enterprise information system (EIS) / Java EE architecture
- Enterprise JavaBeans / Enterprise JavaBeans
- entity
- about / Entities
- requirements / Entities
- mapping / Entity mapping
- table mapping / Table mapping
- column mapping / Column mapping
- entity mapping
- about / Entity mapping, Composite primary keys
- primary key field, mapping /
- Date and Time mapping / Date and time mapping
- properties, ignoring / Ignoring properties
- embedded objects / Embedded objects
- entity relationships
- mapping / Mapping entity relationships
- Many-to-One relationships / Many-to-one relationships
- Many-to-Many relationships / Many-to-many relationships
- bidirectional relationships / Bidirectional relationships
- cascading / Cascading
- events
- using / Using events
- exceptions handling
- about / Handling exceptions
- custom web application exceptions, declaring / Declaring custom web application exceptions
- exceptions, mapping / Mapping existing exceptions
F
- files
- uploading / Uploading files
- Form-Based Authentication / Authentication mechanism
- form authentication / Form authentication
- form parameters / Form parameters
G
- graph validation / Graph validation
H
- header parameters / Header parameters
- HTML email message
- sending / Sending an HTML email message
- HTTP
- about / Understanding HTTP, Basics
- request / HTTP request
- response / HTTP response
- HTTP authentication mechanism
- creating / Creating an HTTP authentication mechanism
- HTTP Basic Authentication / Authentication mechanism
- HTTP communication
- polling / Server-sent events
- long-polling / Server-sent events
- web sockets / Server-sent events
- server-sent events / Server-sent events
- HTTP methods
- handling / Handling HTTP methods
I
- id class / Composite primary keys
- identity store
- about / Identity store, Identity stores
- database identity store / Database identity store
- LDAP identity store / LDAP identity store
- custom identity store / Custom identity store
- IMAP / POP3 and IMAP
- inheritance
- mapping / Mapping inheritance
- strategies / Mapping inheritance
- single table strategy / Single table strategy
- joined table strategy / Joined table strategy
- table per class strategy / Table per class strategy
- strategies, comparing / Comparing strategies
- polymorphic queries / Polymorphic queries
- initializer method parameter injection / Initializer method parameter injection
- interceptors
- using / Using interceptors
- use cases / Using interceptors
- applying / Using interceptors
- types / Interceptor types
J
- Jakarta EE / Goodbye Java EE, welcome Jakarta EE!
- Java EE
- about / What is Java EE?
- application developers / What is Java EE?
- Java EE architecture
- EIS architecture / Java EE architecture
- business tier / Java EE architecture
- web tier / Java EE architecture
- client tier / Java EE architecture
- Java Messaging System (JMS)
- about / Java Messaging System (JMS)
- architecture / Architecture
- JMS provider / JMS provider
- clients / JMS clients
- messages / Messages
- administered objects / Administered objects
- messaging styles / Messaging styles
- point-to-point style / Point-to-point style
- publish-subscribe / Publish-subscribe
- Java Persistence API (JPA)
- about / Data persistence
- persistence provider / Architecture
- entities / Architecture
- entity managers / Architecture
- entity transaction / Architecture
- query / Architecture
- persistence unit / Architecture
- JMS application
- about / First JMS application
- administered objects, creating / Creating administered objects
- destination, creating / Creating a destination
- connection factory, creating / Creating a connection factory
- producer, creating / Creating the producer
- consumer, creating / Creating the consumer
- JMS resources
- using, with annotations / Using JMS resources with annotations
- connection factories, creating / Creating connection factories
- destinations, creating / Creating destinations
- connection factories, injecting / Injecting connection factories
- destinations, injecting / Injecting destinations
- implementing / Putting them all together
- JPA 2.2
- features / What's new in JPA 2.2?
- architecture / Architecture
- JPA application
- writing / Writing your first JPA application
- data source, creating / Step 1: Creating a data source
- persistence unit, creating / Step 2: Creating a persistence unit
- entity class, creating / Step 3: Creating an entity class
- data access object, creating / Step 4: Creating a data access object
- JPA query language
- about / JPA query language
- syntax / Basic syntax
- query parameters / Query parameters
- examples / Query examples
- entities, selecting / Selecting entities
- entities, ordering / Ordering entities
- records, limiting / Limiting records
- entities, selecting with Clauses / Selecting entities with clauses
- entities, selecting with projection / Selecting entities with projection
- duplicates, eliminating / Eliminating duplicates
- entity navigation / Entity navigation
- entities, updating / Update entities
- DELETE entities / DELETE entities
- JSON
- handling / Handling JSON
- Moxy, enabling / Enabling Moxy
- returning / Returning JSON
- consuming / Consuming JSON
- need for / Why JSON?
- objects, mapping / Mapping objects
- collections, mapping / Mapping collections
- output, formatting / Formatting output
- property names, customizing / Customizing property names
- naming strategies, customizing / Customizing naming strategies
- property ordering, customizing / Customizing property ordering
- nulls, handling / Handling nulls
- JSON processing / JSON processing
L
- LDAP identity store / LDAP identity store
M
- mailing / Mailing
- mail protocols
- about / Explaining mail protocols
- POP3 / POP3 and IMAP
- IMAP / POP3 and IMAP
- Many-to-Many relationships / Many-to-many relationships
- Many-to-One relationships / Many-to-one relationships
- matrix parameters / Matrix parameters
- mechanisms, for injecting CDI beans
- about / Injecting beans
- direct field injection / Direct field injection
- bean constructor parameter injection / Bean constructor parameter injection
- initializer method parameter injection / Initializer method parameter injection
- message
- associating, with attributes / Associating messages with attributes
- message-driven bean (MDB)
- about / Message-Driven Beans
- creating / Creating a message-driven bean
- messages, sending / Sending and receiving messages
- messages, receiving / Sending and receiving messages
- text messages / Text messages
- map messages / Map messages
- object messages / Object messages
- Message-Oriented Middleware (MOM)
- about / Message-Oriented Middleware
- selecting, over RPC / Message-Oriented Middleware
- messaging / Messaging
N
- named queries / Named queries
- native SQL queries
- using / Using native SQL queries
- numbers
- formatting / Formatting dates and numbers
O
- objects
- mapping / Mapping objects
- output
- formatting / Formatting output
P
- parameters
- validating / Validating parameters and return values
- receiving / Receiving parameters
- query parameters / Query parameters
- matrix parameters / Matrix parameters
- path parameters / Path parameters
- form parameters / Form parameters
- header parameters / Header parameters
- values, providing / Providing default values
- bean parameters / Bean parameters
- context objects, using / Using context objects
- path parameters / Path parameters
- Point-to-Point (P2P) / Messaging
- polymorphic queries / Polymorphic queries
- POP3 / POP3 and IMAP
- producer methods
- scope / Scope of producer methods
- injecting into / Injection into the producer methods
- producers
- using / Using producers
- programmatic validation / First approach – programmatic validation
- properties
- ignoring / Ignoring properties
Q
- qualifiers
- using / Using qualifiers
- query parameters
- about / Query parameters, Query parameters
- named parameters / Named parameters
- positional parameters / Positional parameters
R
- remote procedure call (RPC) / Message-Oriented Middleware
- RESTful services
- about / RESTful services, RESTful services
- versus SOAP services / RESTful versus SOAP services
- REST service
- writing / Writing your first REST service
- resource class, writing / Writing a resource class
- project, configuring for Jersey / Configuring a project for Jersey
- web services, testing / Testing your web services
- postman, as test tool / Postman as a test tool
- return values
- validating / Validating parameters and return values
S
- seat-booking application
- about / Seat-booking application
- backend, designing / Designing and implementing the backend
- backend, implementing / Designing and implementing the backend
- frontend, designing / Designing and implementing the frontend
- frontend, implementing / Designing and implementing the frontend
- Secure Socket Layer (SSL) / SMTP
- security / Security
- security context / Security context
- server-sent event / Server-sent events
- single table strategy / Single table strategy
- SMTP / SMTP
- SOAP services / SOAP services
- sub-resource functions / Sub-resources
T
- table mapping / Table mapping
- table per class strategy / Table per class strategy
- Transport Layer Security (TLS) / SMTP
V
- validation
- example / First validation example
- programmatic validation / First approach – programmatic validation
- auto validation / Second approach – auto validation
- graph validation / Graph validation
- Validator object
- injecting / Injecting the validator object
W
- web services / What are web services?
- WebSockets
- about / WebSockets, Understanding WebSockets
- working / How does WebSockets work?
- messages, sending / Sending and receiving messages
- messages, receiving / Sending and receiving messages
- endpoint, creating / Creating an endpoint
- client web page, creating / Creating a client web page
- lifecycle events / Lifecycle events
- path parameters, accepting / Accepting path parameters
- user state, maintaining / Maintaining user state
- WSDL (Web Services Description Language) / SOAP services
X
- XML / Why JSON?