skip to main content
Skip header Section
Java CAPS Basics: Implementing Common EAI PatternsMay 2008
Publisher:
  • Prentice Hall PTR
  • Upper Saddle River, NJ
  • United States
ISBN:978-0-13-713071-9
Published:03 May 2008
Pages:
496
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Use Java CAPS to Streamline IT Services and Leverage Legacy Applications Design patterns are a useful tool for streamlining enterprise integration and Web development projects: the mission-critical projects that directly impact your competitiveness. Enterprise Integration Patterns by Gregor Hohpe and Bobby Woolf (Addison-Wesley, 2004) described many of the most useful patterns for enterprise developers. Until recently, however, implementing the patterns in that classic reference required the extensive use of raw Java code. Now theres a better alternative: Using Suns Java Composite Application Suite (Java CAPS), architects and developers can implement enterprise integration patterns succinctly, elegantly, and completely. In Java CAPS Basics, Suns own Java CAPS experts show how to quickly put these new tools and technologies to work in your real-world enterprise application integration projects. After reviewing the challenges of enterprise integration, they introduce Java CAPS and show how it can simplify the development of todays state-of-the-art composite applications. Next, they bridge the gap between abstract pattern languages and practical implementation details. You will learn essential Java CAPS concepts and methods in the context of the patterns youll actually use for real-world message and system management. Coverage includes Comparing approaches to enterprise application integration and finding ways to integrate non-invasively, with fewer changes and lower costsMastering the core integration tools provided by Java CAPS: eGate, eInsight, eWays and JMSUsing enterprise integration patterns to improve application reusability, scalability, resilience, security, and manageabilityImplementing patterns for message exchange, correlation, infrastructure, routing, construction, transformation, and endpointsGenerating and using cryptographic objects such as X.509 Certificates, PKCS#12, and JKS KeystoresUsing advanced techniques such as solution partitioning and subprocess implementation, many of which are covere d nowhere elseConstructing two complete example solutions that bring together many of the patterns discussed and illustrated in this bookThe companion CD contains detailed illustrations for most of the relevant patterns and two complete Java CAPS-based case studies (with solutions) that implement a number of the patterns discussed in the book. In addition, Part II contains a chapter on cryptographic objects used to configure security-related aspects of the suite. It also provides more than sixty detailed examples designed to illustrate the concepts and patterns presented in this book. Built with JCAPS eDesigner, these graphical, component-based examples can easily be used by business analysts and others with or without strong coding skills.

Contributors

Recommendations