user MsKnapp has added MySQL Developer Exam at skill-guru.
The quiz comprises of 100 questions. He has offered 10 free questions to readers to try out before they make commitment to buy it.
The questions will challenges your conceptual knowledge as well as practical skills.
Please give your feedback about the quiz to MsKanpp
user MsKnapp has added MySQL Developer Exam at skill-guru.
One of the regular contributors to this blog, Amit has started the Online Oracle training for beginners . Given has extensive experience and hands on approach, this should be very good starting point for users who are new to Oracle.
You can see Amit’s contribution to this blog http://www.skill-guru.com/blog/author/amit/
Below is the slides which outline the course details. The price of course is $500 . You can get a discount by mentioning you found the training course at Skill-Guru.
Contact details are at end of slide.
- Container (13)
- Test (5)
- AOP (10)
- Data Access (5)
- Transactions (5)
- Spring MVC (3)
- Spring Security (3)
- Remoting (2)
- JMS (2)
- JMX (2)
Please take the test and give your feedback to Elric. Thanks to Elric for taking out time to create the test and share with the community
In this post we will share some notes about Security. Cryptography in J2ee architect Certification .
Select from a list security restrictions that Java 2 environments normally impose on applets running in a browser. The Java 2 security model is policy-based and has superseded the sandbox/trusted approach of Java 1.1. In Java 1.1 remote code (applets, for example) that was not trusted was constrained to the sandbox. If the remote code was signed and trusted then it could access local resources.
Cryptography, Digital signatures and Certificates can be used to increase the security of a system. Java offers a number of interfaces for related services. Firewalls are also important for protecting the gateway between trusted and untrusted networks.
Code Source:A combination of a set of signers (certificates) and a code base URL.By default, Java 2 uses a policy file to associate permissions with code sources
Security Policy File: permission is the right to access a protected resource or guarded object. For Java 2 permissions are specified in the security policy file. Only one policy is in effect at a time. A policy file consists of a number of grant entries. Each grant entry describes the permissions (one or multiple) granted to a code source.
Policy class: You can use java.security.Policy to create your own security policy.
java.security package : The following are some of the classes in the java.security package:
CodeSource – This class extends the concept of a codebase to encapsulate not only the location (URL) but also the certificate(s) that were used to verify signed code originating from that location.
KeyStore – This class represents an in-memory collection of keys and certificates. It manages keys and trusted certificates.
MessageDigest – The MessageDigest class provides applications the functionality of a message digest algorithm, such as MD5 or SHA.
Permission – Abstract class for representing access to a system resource.
Policy – This is an abstract class for representing the system security policy for a Java application environment (specifying which permissions are available for code from various sources).
ProtectionDomain – The ProtectionDomain class encapulates the characteristics of a domain, which encloses a set of classes whose instances are granted the same set of permissions.
Security – Centralizes all security properties and common security methods.
Given an architectural system specification, identify appropriate locations for implementation of specified security features, and select suitable technologies for implementation of those features.
Exposure to threats can be mitigated by using:
Authentication, Authorization (ACLs), Protecting Messages, Auditing
Web tier authentication (This is the usual location for this)
- Basic HTTP – the web server authenticates a principal with user name & password from Web client
- Form-based – lets developers customize the authentication user
- HTTPS mutual authentication – the client and server use X.509 certificates to establish identity over a SSL channel. Read more…
If you are planning to take any of the Sun or mysql certification exams after June 1, it is important for you to understand that Prometric will no longer be conducting the tests. Oracle has switched to Pearson VUE
From Oracle’s website
Effective June 1, 2011, Java, Oracle Solaris, MySQL, and NetBeans certification exams will be offered through a new test delivery partner – Pearson VUE – and will no longer be available through Prometric.
This will consolidate all Oracle Certification exams within the operations of a single testing vendor so we can provide better service and global testing coverage for these Oracle certification exams. Pearson VUE currently has over 5,000 test centers worldwide in 165 countries.
To help prepare you for this transition, here are some important dates for you to be aware of:
- If you are planning to take an exam on/after June 1: Registration will begin at Pearson VUE on May 16, 2011 for all scheduled exams on or after June 1. Visit pearsonvue.com/oracle on or after this date to create a new web account and get started.
- If you are currently registered to take an exam with Prometric or planning to take an exam on or before May 31: You can continue to register at Prometric through May 23, 2011 (walk-in registrations will be permitted through May 31, 2011), but you must complete your exam by June 1, 2011.
If you currently have a Sun or Oracle exam voucher or exam retake voucher:All vouchers will still be valid through their original expiration date and will be redeemable with Pearson VUE starting on May 16, 2011.
Full announcement can be viewed here
We have contacted the creator of these tests Ikoko , and he has clarified thatthe Spring documentation for the exam syllabus has changed (improved) since he had created the exam so the tests now appear to be different to the syllabus
The historical documentation and support for the certification has been poor from Spring and might even be incorrect.
he also pointed out that Skill-guru test-takers basing their opinions on the Spring documentation and not actually doing the Spring exam are therefore possibly misled by the official documentation
From Ikoko’s email
I sat both the 2.5 exam and 3.0 exam so have experienced both exams first-hand and have been keen to keep my exams accurate based on real exam-experience and not any vague syllabus published by Spring
Having said all, this at a higher topic level I only noticed the category of SpEL (Spring expression language) being a category in my tests that was not in the offical syllabus. I had 1 SpEL question in test 1, and 2 questions in test 2. I have now removed all three questions.
Hope this clarifies the doubt of our readers and thanks to MaggieL and Shane Mannion for pointing this out
Symmetric and asymmetric clustering is one of the very important topics in SCEA. In this post , we will talk about asymmetric clustering.
Traditional J2EE application servers work well for a large class of applications. This class can broadly be categorized as applications that run in a stateless cluster in front of a database. I call this a symmetric cluster:
– All the cluster members can perform any task at any time.
– The application is stateless.
– The application is modal which means it only performs work synchronously in response to a client request which can be received using HTTP/IIOP or JMS.
There are other applications that do not work well in such an environment, for example, an electronic trading system in a bank. Such applications typically use tricks that can greatly improve performance such as partitioning, multi-threading and write through caching. These are applications that can exploit asymmetric clustering. An asymmetric cluster is practically the opposite of a symmetric cluster:
– applications can declare named partitions at any point while it’s running
– partitions are highly available uniquely named singletons and run on a single cluster member at a time
– incoming work for a partition is routed to the cluster member hosting the partition
– The application is amodal. Partitions have a lifecycle of their own and can start background threads/alarms as well as respond to incoming events whether they are IIOP/HTTP or JMS/foreign messages.
WebSphere XD offers a new set of programming API’s called the “Partitioning Facility”. These APIs allow applications that require an asymmetric cluster to be deployed on a J2EE server for the first time to my knowledge.
How can partitioning improve application performance? Read more…
In the last post I had written about SCEA – Sun certified J2EE Architect certification topics and J2EE architect sample questions.
Based on my experience studying for and taking the part 1 of the certification, here is what I would suggest that you read before taking the exam. You could skip a couple of the following references and still pass (don’t skip the EJBs though).
|Enterprise JavaBeans, 2nd Ed., by Richard Monson-Haefel, O’Reilly, ISBN: 1-56592-869-5||Read chapters 1 – 9 and discuss in a study group. Cover around 50 – 60 pages per week. While this book is pretty good, it goes into more detail than I think you need in order to pass part 1. If you can find a more concise introduction to EJBs, you may be able to spend less time studying EJBs. Some chapters are interesting in this book while others seem very dry to me (however, still useful). Forming a study group will really help you get through this book and help you retain what you learn.|
|EJB 1.1 Specification||Reference from time to time while reading the EJB book by Haefel for clarification.|
|Java Messaging Service Tutorial, Chapters 1 & 2 (15 pages total) http://java.sun.com/products/jms/tutorial/doc/jms_tutorialTOC.html’||Good intro to JMS and just about right for what you need on the exam.|
|Fault Tolerance for CORBA-based Distributed Computing.||Nice short article that gives you the concepts.|
|Jguru article on Internationalization||Just about right for the exam. However, someone said that there was a pretty good tutorial on Sun’s website. You might try Suns tutorial first. While pretty good, I thought this article wasn’t as clear as it could have been. However, it is about the right amount for the test.|
|Network Security: A Simple Guide to Firewalls
|Easy to read and short article that introduces the concepts and terms of firewalls. Another article on firewalls in addition or instead of this one would be useful. However, I don’t know of any others.|
|JavaWorld article on RMI over IIOP||Pretty good, but you might check for a related tutorial on Suns website instead.|
|Java Security Evolution and Concepts, Part 1 and Part 2||From my experience on the exam, you just need to know very basic concepts and terminology about encryption and security in general as well as something about JDK 1.2 security model and possibly the difference between JDK 1.1 and JDK 1.2 security models. You might want to read another article about JDK security. However, I don’t have any other references.|
|Introduction to SSL||I’m not sure this one is necessary. Consider skipping this one. I don’t recall any questions specifically about SSL on the exam, but other people’s exam notes often include SSL suggesting that you might get a question on it.|
|The book Design Patterns by Gamma, Helm, Johnson and Vlissides (often referred to as the Gang of Four (GoF)), Adddison-Wesley||Do not try to read this book front to back. I recommend reading roughly the first four pages of each pattern and that may be more than you need for the test. The questions were very basic, straight forward questions about the easier to remember patterns such as singleton, proxy and iterator. We covered 5 patterns per week discussing all five patterns in one hour. We used the rest of the meeting time to do practice exam questions on other topics. In order to touch on 5 patterns in an hour, someone needs to come prepared with discussion questions and lead the discussion with quite a bit of authority without being overbearing. The goal during the meeting is not to discuss each pattern in detail, but to at least touch on each one briefly. The primary benefit of the study group is that it encourages you to read about the 5 patterns on your own time because you know that you are going to come and discuss it. You get the most benefit from the reading. The meeting just encourages you to read and also helps you retain what you learned.|
|The Design Patterns Java Companion
|This book illustrates the GoF patterns with implementations in Java. Skim through the sections in this book on any patterns that aren’t real clear to you after reading about them in the GoF. However, don’t spend too much time on this book. Use it as a reference only.|
|UML Distilled||Read the front and back covers and skim through as much of the book as necessary to understand how the notation on the front and back covers of the book is used.|