Book Image

Java EE 7 First Look

By : Armel Fabrice NDJOBO
Book Image

Java EE 7 First Look

By: Armel Fabrice NDJOBO

Overview of this book

For several years, the development of robust, scalable, and secured applications was a headache for software companies. They had to use proprietary solutions with non-standard methods. With Java EE, many of these solutions have been standardized, simplified, adapted to the needs of the developer, and made freely available to the community. Thus, it is now possible to develop truly robust, secure, and scalable applications at a lower cost using tools such as: Eclipse, NetBeans, and GlassFish.Java EE 7 First Look is a practical guide which, through the creation of an online pre-registration website, will introduce you to the novelties of Java EE 7 and give you ideas for utilizing them.Giving you an insight on new features introduced in Java EE 7, this book begins with the objectives of Java EE 7 and then covers the new specifications added in Java EE 7. Next, you will move on to the improvements made in APIs and EJBs and how to work with them. You will also learn how to ensure that the quality of data is maintained that has been manipulated by your application and gives you the opportunity to put a small part of AOP (Aspect Oriented Programming) in action.Finally, the book will give you some ideas to realize n-tier applications using the Java EE platform and will also provide some guidance for the integration of your Java EE application to heterogeneous systems with which your application will interact.After reading Java EE 7 First Look, you'll have a good idea about the changes brought in by Java EE 7, as well as how to make the best use of these to build a large-scale application.
Table of Contents (16 chapters)

Summary


Having reached the end of this chapter, which is the last chapter of the book, we are now able to deploy a Java EE public solution with at least some level of security. Indeed, through this chapter, readers become aware of a specification allowing them to restrict access to the forms. However, it is important to note that we have just dealt with one small aspect of security, given the objectives of this book. We ask you to complete your knowledge about security with additional reading. This is because the domain is made up of several aspects such as the transmission of data across the network, method execution, construction, and execution of SQL queries.