Win a copy of Cross-Platform Desktop Applications: Using Node, Electron, and NW.js this week in the JavaScript forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic

J2EE Patterns Applied  RSS feed

Greg Ostravich
Ranch Hand
Posts: 112
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
You said that your book isn't a 'catalog' of patterns but examples.
Can you post a list of the examples you cover?
Maybe what you're trying to accomplish for each example and the patterns applied in your examples to help accomplish that goal.
I went to Amazon and didn't see a chapter list so something like the list of examples would be useful.
Do you talk about differences between EJB (1.1 vs. 2.0 containers) because it seems like some patterns would be useful with EJB 1.1 where with fixes in the 2.0 container you wouldn't need to use those patterns.
Thanks -
John Carnell
Ranch Hand
Posts: 93
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi Greg,
Below is a brief table of contents. I will contact my editor and ask him to put a more comprehensive
table of contents. Here it is:
Chapter 1: Design Patterns Applied to J2EE
This chapter is just a brief introduction to design patterns and how they can be used to solve problems.
Chapter 2: Patterns Applied to the Web Tier
The patterns covered in this chapter include:
Front Controller Pattern
Intercepting Filter Pattern
Composite View Pattern
View Helper Pattern
Service-to-Worker Pattern
Dispatcher View Pattern
Chapter 3: Patterns Applied to a Persistence
The patterns covered in this chapter include:
Data Access Object Pattern
Value Object Pattern
Service Locator Pattern
In addition, the following data access strategies are discussed:
Primary Key Generation
Concurrent Management
Transaction Management
Performance Strategies
Migration Strategies
Chapter 4: Patterns Applied to Improve
Performance and Scalability
The patterns covered include:
ServiceLocator Pattern
Value Object Pattern
Session Facade Pattern
Message Facade Pattern
Business Delegate Pattern
Chapter 5: Patterns Applied to Manage Security
The patterns covered include:
Single-Access Point Pattern
CheckPoint Pattern
Role Pattern

Chapter 6: Patterns Applied to Enable Enterprise
The patterns covered include:
Integration Broker Pattern
Integration Wrapper Pattern
Component Pattern
Integration Mediator Pattern
Virtual Component Pattern
Data Mapping Pattern
Process Automator Pattern
Chapter 7: Patterns Applied to Enable
Reusability, Maintainability and
The patterns covered include:

Facade Pattern
Abstract Factory Pattern
Builder Pattern
Template Method Pattern
As for the second part of your question, the book does go into some of the differences between the EJB 1.1 and EJB 2.0 specification. Particularly in Chapter 3. In that Chapter we go through a short history of why the Data Access Object Patterns and Value Object patterns came into play. We also discuss why that even with the introduction of the Local interface in the EJB 2.0 spec, these data access patterns are relevant. I hope that answers your question.
John Carnell
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
Boost this thread!