Автор: Rhuan Rocha
Издательство: BPB Publications
Год: 2022
Формат: ePUB, PDF
Страниц: 573
Размер: 10 Mb
Язык: English
Develop Enterprise Systems on Cloud Infrastructure Using a Rich Java Ecosystem.
Key Features
- Every chapter and concept is illustrated through the use of the Jakarta Project.
- Extensive hands-on demonstration of Jakarta EE specifications and capabilities.
- Practical examples of securing Java applications with Jakarta Security are provided.
Description
This book provides a practical introduction to Enterprise Java Edition, Jakarta EE, including detailed features and capabilities. Equipped with numerous projects, each chapter demonstrates Jakarta EE capabilities with clean coding.
The book starts with an introduction to Jakarta EE and its architecture. This will help to create a project using the Jakarta Servlet and exposure of an HTTP endpoint. The CDI is then used to inject dependencies, work with events asynchronously, and interact with CDI interceptors. Then, in the RESTful style, it can help to create a Jakarta RESTful resource to expose HTTP endpoints. We then investigate the Jakarta Enterprise Bean, which teaches us how to manage transactions and schedule tasks. The Jakarta Persistence is then used to integrate an application into a relational database, and the Jakarta Message is used to create an application using the Message Oriented Middleware (MOM). In terms of security, we use Jakarta Security to secure the endpoint of a Jakarta application.
By the end of this book, the reader will be able to set up a Jakarta project and write applications that expose HTTP endpoints, integrate with a database, and deal with authentication and authorization.
What you will learn
● Create and use Servlets to build applications.
● Get to know CDI and practice how to create the CDI Interceptor and Decorator.
● Learn to build RESTful services and make use of Jakarta Enterprise Bean in your application.
● Use Jakarta Servlet and Jakarta RESTful to expose HTTP endpoints.
● Create a relational database-integrated application.
● Use authentication and authorization to build a secure application.