Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
A
- access logging, 2-31
- Active Server Pages, 5-3
- AllowOverride, 2-32
- applications
- and connection caches, 3-5
- and multiple JVMs, 3-13
- BEA WebLogic 6.0 Java, 5-5
- bugs, 1-5
- cryptographic, 4-14
- database-centric, 2-12
- duplicate requests, 1-23
- IBM WebSphere 3.5.2 Java, 5-10
- memory leaks, 2-12
- Microsoft IIS 5.0 ASP, 5-14
- performance optimization, 1-20
- performance testing, 4-15
- resource drains, 1-18
- stateless, 2-5, 2-6
- statesafe, 1-17
- users' view of availability, 1-6
- using certificates, 4-18
- Array, 2-25
- ArrayList, 2-25
- availability
- data, 1-6
- defined, 1-1
- example, 1-4
- hardware, 1-4
- key practices, 1-2
- measuring, 1-3
- software, 1-5, 1-17
- users' view, 1-6
B
- backups
- Oracle Internet File System, 1-25
- schedule, 1-24
- standby database, 1-25
- bastion hosts
- defined, 4-4
- browser upgrade, 4-13
- browsers
- and Oracle9iAS Web Cache, 5-2
- cookies, 1-17
- cross-site scripting, 4-9
- DOMESTIC vs. EXPORT, 4-11
- redirect, 2-17
- reload function, 1-7
- SSL support, 4-12
- user identification, 4-16
- buffer overflow, 4-8
C
- cache
- expiration, 5-5
- mid-tier, 2-11
- miss, 5-2
- rules, 5-5
- case study
- description, 2-3
- endRequest, 2-5
- memory leaks, 2-12
- memory overhead, 2-8
- results, 2-7
- session scope bean, 2-7
- sessions, 2-7
- use of Hashtables, 2-5
- user information, 2-4
- catch-all exceptions, 1-21
- certificates
- 128-bit, 4-13
- 40-bit, 4-11
- and Oracle HTTP Server, 4-17
- audit revocations, 4-19
- authority, 4-16
- client, 4-16
- expiring, 4-18
- multiple, 4-16
- organization identity, 4-18
- reissuing, 4-19
- revocation, 4-16
- user identity, 4-18
- validation, 4-16
- X.509, 4-17
- classes
- final, 2-2
- Hashtable, 2-25
- String, 2-24
- StringBuffer, 2-24
- Vector, 2-25
- clear(), 2-27
- commands
- "r", 4-10
- commercial drivers, 2-34
- configuration
- JServ, 2-19
- Web site, 5-3
- connections
- pooling, 2-9
- Cookie_JScript.asp, 5-15
- cookies, 5-7
- cross-site scripting, 4-9
D
- data availability, 1-6
- database
- connections, 2-11
- tuning, 2-12
- Database Cache, 2-11
- definitions
- availability, 1-1
- load balancers, 1-8
- pooling, 2-9
- statesafe, 1-17
- detecting
- failures, 1-1
- directives
- AllowOverride, 2-32
- FollowSymLinks, 2-32
- SSLSessionCacheTimeout, 2-31
- DMZ
- defined, 4-3
- services, 4-5
- DNS lookup, 2-31
- documenting
- procedures, 1-28
- drivers
- commercial, 2-34
- dynamic content, 5-14
- dynamic include
- description, 2-16
- Dynamic Monitoring Service, 2-9
- and Java heap, 2-20
- description, 2-34
- sample metrics, 2-34
E
- Edge Side Includes, 5-2
- encryption
- weak, 4-11
- endRequest, 2-5
- EnTrust, 4-16
- equals(), 2-26
- error page, 4-13
- escape characters, 4-9
- evaluating
- performance, 2-33
- event logging, 5-7
- exceptions
- catch-all, 1-21
- expiring
- certificates, 4-18
- export
- cryptographic software, 4-9
- law changes, 4-20
- laws, 4-11
- reviews, 4-21
F
- failures
- detecting, 1-1
- recording, 1-6
- fault containment, 4-8
- final class, 2-2
- finally clause, 1-22
- firewalls
- and stateful inspection, 4-5
- architecture illustrated, 4-3, 4-7
- implementation, 1-9
- switched connection, 4-4
- tradeoffs, 4-2
- FollowSymLinks, 2-32
- forward, 2-17
- FTP, 4-5
G
- Global Server ID Certificate, 4-12
- goals
- performance, 2-33
- GTE Cypertrust, 4-16
- guidelines
- sessions, 2-8
- SSL, 4-14
H
- hardware availability, 1-4
- hashCode(), 2-26
- HashMap, 2-25
- Hashtables, 2-25
- case study, 2-5
- HTTP, 4-5
- HTTPS, 4-7
I
- identities
- organization, 4-18
- user, 4-18
- IMAP4, 4-5
- immutable object, 2-24
- implementation
- SingleThreadModel, 2-13
- information of record, 4-6
- initialization
- lazy, 2-27
J
- Java
- bugs, 1-5
- code separation, 2-15
- performance, 2-21
- synchronization, 1-17, 2-21
- Java heap
- and Dynamic Monitoring Service, 2-20
- default, 2-20
- setting size, 2-19
- JavaServer Pages
- debug, 2-21
- deployment, 2-18
- developer_mode, 2-21
- pre-translate, 2-20
- JDBC
- connections pooling, 2-9
- statement caching, 2-10
- JServ
- autoreload.classes, 2-20
- configuration, 2-19
- default process, 2-19
- multiple, 2-19
- performance, 2-19
K
- KeepAlive
- tuning, 2-30
- key practices
- availability, 1-2
L
- lazy initialization, 2-27
- load balancers
- commercial, 1-13
- definition, 1-8
M
- MaxClients
- tuning, 2-30
- measuring
- availability, 1-3
- memory leaks, 2-12
- and Java, 2-12
- case study, 2-12
- memory overhead
- case study, 2-8
- methodology
- performance, 2-33
- methods
- clear(), 2-27
- equals(), 2-26
- hashCode(), 2-26
- reset(), 2-27
- Microsoft Internet Information Server, 5-3
- mod_jserv, 1-15
- monitoring
- resource use, 1-18
- mutex, 2-22
N
- Noah's Ark, 1-4
O
- objects
- examples, 2-26
- factory, 2-2
- immutable, 2-24
- recycling, 2-27
- reuse, 2-26
- unused, 2-28
- optimization
- application performance, 1-20
- Oracle HTTP Server
- and certificates, 4-17
- tuning, 2-29
- Oracle JavaServer Pages, 2-6
- Oracle9iAS Database Cache, 2-11
- Oracle9iAS Web Cache, 2-11
- and Oracle HTTP Server, 2-11
- and third-party servers, 5-2
- overflow
- buffer, 4-8
P
- page buffer, 2-18
- passwords, 4-10
- performance
- effect of HTTPS with SSL, 4-14
- evaluating, 2-33
- goals, 2-33
- JServ, 2-19
- methodology, 2-33
- testing, 2-32, 2-33, 4-15
- tradeoffs, 2-2
- personnel
- testing, 2-34
- pooling
- connections, 2-9
- definition, 2-9
- JDBC connections, 2-9
- POP3, 4-5
- preload
- servlets, 2-20
- pre-translate
- JSP, 2-20
- privileges
- and modules, 4-8
- root, 4-10
- procedures
- documenting, 1-28
- proxies
- on DMZ, 4-6
- reverse, 4-14
R
- recording
- failures, 1-6
- redirect, 2-17
- redundant components
- and availability, 1-3
- and load balancers, 1-7
- reissuing
- certificates, 4-19
- requests
- duplicate, 1-23
- reset(), 2-27
- resource use
- and Dynamic Monitoring Service, 1-18
- application bugs, 1-18
- monitoring, 1-18
- restart
- server, 1-25
- retry
- transaction, 1-22
- reverse proxies, 4-14
- root privileges, 4-10
- router, 4-3
- rules
- caching, 5-5
- expiration, 5-5
S
- security patches, 4-10
- server
- restart, 1-25
- servers
- legacy, 5-2
- placement, 4-5
- virtual, 4-15
- ServerVariables_JScript.asp, 5-14
- services
- unused, 4-10
- servlets
- deployment, 2-18
- preload, 2-20
- sample code example, 2-37
- startup, 2-15
- session scope beans
- case study, 2-7
- session state, 1-19
- sessions
- case study, 2-7
- drawbacks, 2-7
- guidelines, 2-8
- tracking, 2-6
- SessionSample, 5-11
- SessionServlet, 5-7
- SingleThreadModel
- description, 2-13
- examples, 2-14
- implementation, 2-13
- SMTP, 4-5
- SnoopServlet, 5-5
- software
- availability, 1-17
- cryptographic, 4-9
- spawning
- threads, 2-13
- SQL statement
- tuning, 2-12
- SSL
- guidelines, 4-14
- SSLSessionCacheTimeout
- tuning, 2-31
- Stack, 2-25
- startup
- servlets, 2-15
- stateful inspection, 4-3
- stateless
- applications, 2-5
- defined, 2-6
- statement caching
- JDBC, 2-10
- statesafe
- definition, 1-17
- static include
- description, 2-15
- step-up digital right, 4-12
- String, 2-24, 2-28
- and Java2 compiler, 2-29
- StringBuffer, 2-24, 2-28
- and Java2 compiler, 2-29
- character buffer, 2-29
- switched connection firewalls, 4-4
- synchronization
- Java, 1-17
T
- TCP/IP parameters
- setting, 2-30
- testing
- performance, 2-32, 2-33, 4-15
- personnel, 2-34
- Thawte, 4-16
- threads
- spawning, 2-13
- thread-safe
- wrapper, 2-24
- thread-safe JSPs
- declare variables, 2-17
- performance, 2-16
- tradeoffs
- firewall architecture, 4-2
- performance, 2-2
- transaction
- retry, 1-22
- transfers
- HTTPS, 4-15
- TreeMap, 2-25
- tuning
- database, 2-12
- KeepAlive, 2-30
- MaxClients, 2-30
- Oracle HTTP Server, 2-29
- SQL statement, 2-12
- SSLSessionCacheTimeout, 2-31
U
- unused
- objects, 2-28
- services, 4-10
- upgrades
- botched, 1-25
- browser, 4-13
- URL Wildcard, 4-17
V
- Vectors, 2-25
- verbose mode, 5-6
- Verisign, 4-11, 4-12, 4-13
W
- weak encryption, 4-11
- Web Cache, 2-11
- and third-party servers, 5-2
- Web site
- configuration, 5-3
- wrapper
- thread-safe, 2-24