Tuesday, September 11, 2007

SCEA 5 - Study objectives/resource

SCEA 5 Part 1 objectives

Section 1: Application Design Concepts and Principles

* 1.1 Explain the main advantages of an object oriented approach to system design including the effect of encapsulation, inheritance, delegation, and the use of interfaces, on architectural characteristics.
* 1.2 Describe how the principle of "separation of concerns" has been applied to the main system tiers of a Java EE application. Tiers include client (both GUI and web), web (web container), business (EJB container), integration, and resource tiers.
* 1.3 Describe how the principle of "separation of concerns" has been applied to the layers of a Java EE application. Layers include application, virtual platform (component APIs), application infrastructure (containers), enterprise services (operating system and virtualization), compute and storage, and the networking infrastructure layers.


Section 2:Common Architectures

* 2.1 Explain the advantages and disadvantages of two tier architectures when examined under the following topics: scalability, maintainability, reliability, availability, extensibility, performance, manageability, and security.
* 2.2 Explain the advantages and disadvantages of three tier architectures when examined under the following topics: scalability, maintainability, reliability, availability, extensibility, performance, manageability, and security.
* 2.3 Explain the advantages and disadvantages of multi-tier architectures when examined under the following topics: scalability, maintainability, reliability, availability, extensibility, performance, manageability, and security.
* 2.4 Explain the benefits and drawbacks of rich clients and browser-based clients as deployed in a typical Java EE application.
* 2.5 Explain appropriate and inappropriate uses for Web Services in the Java EE Platform.


Section 3:Integration and Messaging

* 3.1 Explain possible approaches for communicating with an external system from a Java EE-based system given an outline description of those systems and outline the benefits and drawbacks of each approach.
* 3.2 Explain typical uses of Web Services and XML over HTTP as mechanisms to integrate distinct software components.
* 3.3 Explain how Java Connector Architecture and JMS are used to integrate distinct software components as part of an overall Java EE application.


Section 4: Business Tier Technologies

* 4.1 Explain and contrast uses for Entity Beans, Entity Classes, Stateful and Stateless Session Beans, and Message Driven Beans and understand the advantages and disadvantages of each type.
* 4.2 Explain and contrast the following persistence strategies: Container Managed Persistence (CMP) BMP, JDO, JPA, ORM and using DAOs (Data Access Objects) and direct JDBC-based persistence under the following headings: ease of development, performance, scalability, extensibility and security.
* 4.3 Explain how Java EE supports the deployment of server-side components implemented as Web Services and the advantages and disadvantages of adopting such an approach.
* 4.4 Explain the benefits of the EJB3 development model over previous EJB generations for ease of development including how the EJB container simplifies EJB development.


Section 5: Web Tier Technologies

* 5.1 State the benefits and drawbacks of adopting a web framework in designing a Java EE application.
* 5.2 Explain standard uses for JSP and Servlet technologies in a typical Java EE application.
* 5.3 Explain standard uses for JSF technology in a typical Java EE application.
* 5.4 Given a system requirements definition, explain and justify your rationale for choosing a web-centric or EJB-centric implementation to solve the requirements. Web-centric means that you are providing a solution that does not use EJBs. EJB-centric solution will require an application server that supports EJBs.


Section 6: Applicability of Java EE Technology

* 6.1 Given a specified business problem, design a modular solution implemented using Java EE which solves that business problem.
* 6.2 Explain how the Java EE platform enables service oriented architecture (SOA) -based applications.
* 6.3 Explain how you would design a Java EE application to repeatedly measure critical non-functional requirements and outline a standard process with specific strategies to refactor that application to improve on the results of the measurements.


Section 7: Patterns

* 7.1 From a list, select the most appropriate pattern for a given scenario. Patterns are limited to those documented in the book - Alur, Crupi and Malks (2003). Core J2EE Patterns: Best Practices and Design Strategies 2nd Edition and named using the names given in that book.
* 7.2 From a list, select the most appropriate pattern for a given scenario. Patterns are limited to those documented in the book - Gamma, Erich; Richard Helm, Ralph Johnson, and John Vlissides (1995). Design Patterns: Elements of Reusable Object-Oriented Software and are named using the names given in that book.
* 7.3 Select from a list the benefits and drawbacks of a pattern drawn from the book - Gamma, Erich; Richard Helm, Ralph Johnson, and John Vlissides (1995). Design Patterns: Elements of Reusable Object-Oriented Software.
* 7.4 Select from a list the benefits and drawbacks of a specified Core J2EE pattern drawn from the book - Alur, Crupi and Malks (2003). Core J2EE Patterns: Best Practices and Design Strategies 2nd Edition.


Section 8: Security

* 8.1 Explain the client-side security model for the Java SE environment, including the Web Start and applet deployment modes.
* 8.2 Given an architectural system specification, select appropriate locations for implementation of specified security features, and select suitable technologies for implementation of those features.
* 8.3 Identify and classify potential threats to a system and describe how a given architecture will address the threats.
* 8.4 Describe the commonly used declarative and programmatic methods used to secure applications built on the Java EE platform, for example use of deployment descriptors and JAAS.





Sun recommended study resources.


» UML Distilled - by Martin Fowler

» Java Design (Objects, UML, and Process) - by Kirk Knoernschild

* Addison-Wesley (2002)
* ISBN 0-201-75044-9

» http://java.sun.com/developer/technicalArticles/WebServices/soa3/

» SOA Using Java Web Services (Paperback) - by Mark D. Hansen

» Developing Java Web Services: Architecting and Developing Secure Web Services Using Java - by Ramesh Nagappan, Robert Skoczylas, Rima Patel Sriganesh

» http://www.EnterpriseIntegrationPatterns.com/

» Enterprise Java Beans - by Richard Monson-Haefel

» Java Enterprise in a Nutshell - by David Flanagan, Jim Farley, William Crawford, Kris Magnusson

» EJB v3.0 spec

» EJB v2.1 spec

» Core Servlets and JavaServer Pages, Vol. 1 (2nd Edition) - by Marty Hall, Larry Brown

* Prentice Hall PTR; 2 edition (August 29, 2003)
* ISBN-13: 978-0130092298

» Core Servlets and JavaServer Pages, Vol. 2 (2nd Edition) - by Marty Hall, Larry Brown, and Yaakov Chaikin

* Prentice Hall PTR; 2 edition (December 1, 2007)
* ISBN-13: 978-0131482609

» Core JavaServer Faces (2nd Edition) - by David Geary, Cay S. Horstmann

* Prentice Hall PTR; 2 edition (May 9, 2007)
* SBN-13: 978-0131738867

» Servlet v2.5 spec

» JSP v1.2 spec

» JSF v1.1 spec

» Designing Enterprise Applications with the Java 2 Platform, Enterprise Edition - by Nicholas Kassem, Enterprise Team

* List Price: $37.95, Paperback - 368 pages 1 edition (June 2, 2000)
* Addison-Wesley Pub Co
* ISBN: 0201702770

» Java 2 Platform, Enterprise Edition: Platform and Component Specifications - by Bill Shannon, Mark Hapner, Vlada Matena, Eduardo Pelegri-Llopart, Larry Cable, James Davidson

* List Price: $44.95, Paperback - 800 pages 1 edition (May 26, 2000)
* Addison-Wesley Pub Co
* ISBN: 0201704560

» Enterprise Blueprints: http://java.sun.com/blueprints/enterprise/

» Java EE 5 Performance Management and Optimization (Pro) - by Steven Haines

» Design Patterns and Contracts - by Jean-Marc Jezequel, by Michel Train and Christine mingins

» Design Patterns - by Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Grady Booch

» Core J2EE Patterns: http://java.sun.com/blueprints/corej2eepatterns/, http://www.corej2eepatterns.com/

» Core J2EE Patterns: Best Practices and Design Strategies (2nd Edition) - Deepak Alur, John Crupi and Dan Malks

* Publisher: Prentice Hall / Sun Microsystems Press
* ISBN:0131422464; 2nd Edition (June, 2003)

» J2EE Blueprints

» Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani

» Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

No comments:

Post a Comment