• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Tim Cooke
  • paul wheaton
  • Jeanne Boyarsky
  • Ron McLeod
Sheriffs:
  • Paul Clapham
  • Liutauras Vilda
  • Devaka Cooray
Saloon Keepers:
  • Tim Holloway
  • Roland Mueller
Bartenders:

to start work on SCEA should i wait for new edition of mark cade ?

 
Ranch Hand
Posts: 75
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
what book are you refering to ?
 
Ranch Hand
Posts: 256
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
No man...just check with Old one. Then you can get some confidence to move the complete syllabus.

Architect exam is not like academic but the Order of Syllabus is used for some extent.

I received the following sheet from one Rancher. I am pasting that sheet.
Try to Observe that sheet which is below. The Books have various flavours, need to grab the way to explore the concept thats all. Diffrent people refers different authors.



Assignment Objectives

Section 1: Application Design Concepts and Principles
Explain the main advantages of an object-oriented approach to system design including the effect of encapsulation, inheritance, and use of interfaces on architectural characteristics.
Describe how the principle of "separation of concerns" has been applied to the main system tiers of a Java Platform, Enterprise Edition application. Tiers include client (both GUI and web), web (web container), business (EJB container), integration, and resource tiers.
Describe how the principle of "separation of concerns" has been applied to the layers of a Java EE application. Layers include application, virtual platform (component APIs), application infrastructure (containers), enterprise services (operating system and virtualization), compute and storage, and the networking
infrastructure layers.

Books:
1 Sun Certified Enterprise Architect for J2EE Technology Study Guide,
Mark Cade.
2 "SCEA study guide" - Allen and Bambara


Section 2: Common Architectures
Explain the advantages and disadvantages of two-tier architectures when examined under the following topics: scalability, maintainability, reliability, availability, extensibility, performance, manageability, and security.
Explain the advantages and disadvantages of three-tier architectures when examined under the following topics: scalability, maintainability, reliability, availability, extensibility, performance, manageability, and security
Explain the advantages and disadvantages of multi-tier architectures when examined under the following topics: scalability, maintainability, reliability, availability, extensibility, performance, manageability, and security.
Explain the benefits and drawbacks of rich clients and browser-based clients as deployed in a typical Java EE application.
Explain appropriate and inappropriate uses for web services in the Java EE platform

Books:
1 Designing Enterprise Applications with the J2EE Platform
2 J2EE Architect's Handbook





Section 3: Integration and Messaging
Explain possible approaches for communicating with an external system from a Java EE technology-based system given an outline description of those systems and outline the benefits and drawbacks of each approach.
Explain typical uses of web services and XML over HTTP as mechanisms to integrate distinct software components.
Explain how JCA and JMS are used to integrate distinct software components as part of an overall Java EE application.

Books:
1 Java EE 5 Tutorial. Part VI Services.
2 Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
3 J2EE Connector Architecture and Enterprise Application Integration
4 Java Message Service, Monson-Haefel & Chappell

Section 4: Business Tier Technologies
Explain and contrast uses for entity beans, entity classes, stateful and stateless session beans, and message-driven beans, and understand the advantages and disadvantages of each type.
Explain and contrast the following persistence strategies: container-managed persistence (CMP) BMP, JDO, JPA, ORM and using DAOs (Data Access Objects) and direct JDBC technology-based persistence under the following headings: ease of development, performance, scalability, extensibility, and security.
Explain how Java EE supports the deployment of server-side components implemented as web services and the advantages and disadvantages of adopting such an approach.
Explain the benefits of the EJB 3 development model over previous EJB generations for ease of development including how the EJB container simplifies EJB development.

Books:
1 EJB 3 in Action
2 Pro EJB 3 Java Persistence API
3 Mastering EJB 3.0
4 Java EE 5 Tutorial. Part IV Enterprise Beans.
5 Java EE 5 Tutorial. Part V Persistence.
6 Nice to have SCBCD 5







Section 5: Web Tier Technologies
State the benefits and drawbacks of adopting a web framework in designing a Java EE application
Explain standard uses for JSP pages and servlets in a typical Java EE application.
Explain standard uses for JavaServer Faces components in a typical Java EE application.
Given a system requirements definition, explain and justify your rationale for choosing a web-centric or EJB-centric implementation to solve the requirements. Web-centric means that you are providing a solution that does not use EJB components. EJB-centric solution will require an application server that supports EJB components.

Books:

1 Core JavaServer? Faces, Second Edition
2 Java EE 5 Tutorial. Part II The Web Tier.
3 Nice to have SCWCD

Section 6: Applicability of Java EE Technology
Given a specified business problem, design a modular solution that solves the problem using Java EE.
Explain how the Java EE platform enables service oriented architecture (SOA) -based applications.
Explain how you would design a Java EE application to repeatedly measure critical non-functional requirements and outline a standard process with specific strategies to refactor that application to improve on the results of the measurements.

Books:

1 Java EE 5 Tutorial. Part VII Case Studies.
2 Practical J2EE Application Architecture
3 J2EE AntiPatterns?
4 Java EE 5 Tutorial. Part III Web Services.
5 SOA using Java Web services








Section 7: Patterns
From a list, select the most appropriate pattern for a given scenario. Patterns are limited to those documented in the book - Alur, Crupi and Malks (2003). Core J2EE Patterns: Best Practices and Design Strategies 2nd Edition and named using the names given in that book.
From a list, select the most appropriate pattern for a given scenario. Patterns are limited to those documented in the book - Gamma, Erich; Richard Helm, Ralph Johnson, and John Vlissides (1995). Design Patterns: Elements of Reusable Object-Oriented Software and are named using the names given in that book.
From a list, select the benefits and drawbacks of a pattern drawn from the book - Gamma, Erich; Richard Helm, Ralph Johnson, and John Vlissides (1995). Design Patterns: Elements of Reusable Object-Oriented Software.
From a list, select the benefits and drawbacks of a specified Core J2EE pattern drawn from the book – Alur, Crupi and Malks (2003). Core J2EE Patterns: Best Practices and Design Strategies 2nd Edition.

Books:
1 "Design Patterns", GoF
2 Core J2EE Patterns, 2nd ed.
3 Head First Design Patterns

Section 8: Security
Explain the client-side security model for the Java SE environment, including the Web Start and applet deployment modes.
Given an architectural system specification, select appropriate locations for implementation of specified security features, and select suitable technologies for implementation of those features
Identify and classify potential threats to a system and describe how a given architecture will address the threats.
Describe the commonly used declarative and programmatic methods used to secure applications built on the Java EE platform, for example use of deployment descriptors and JAAS.

Books:

1 Java EE 5 Tutorial. Part VI Services.
2 Java Security
3 Core Security Patterns
4 Sun JEE tutorial


Cheers!
Prathap.
 
Ranch Hand
Posts: 143
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

to start work on SCEA should i wait for new edition of mark cade ?



Have you taken a look at the rough cuts of his latest edition? If not, please search this forum for its link.

The point is, in my opinion you can safely refer to the chapters from the earlier edition which are common for both versions of the exam, as they don't seem to have changed in the new edition (this is based on my review of the rough cuts).
 
Greenhorn
Posts: 9
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Check this Forum Thread.

Kees
 
Just let me do the talking. Ahem ... so ... you see ... we have this tiny ad...
Smokeless wood heat with a rocket mass heater
https://woodheat.net
reply
    Bookmark Topic Watch Topic
  • New Topic