HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Creating Enterprise-Quality Web 2.0 Mashups: The Complete How-To Guide
Mashups give businesses powerful new ways to leverage today’s massive public and private data resources for competitive advantage. In Mashups: Strategies for the Modern Enterprise, J. Jeffrey Hanson brings together all the knowledge enterprise developers need to create mashups that are reliable, secure, flexible, and effective.
Using detailed sample code and third-party tools, Hanson walks readers through every step of creating a working enterprise mashup, as well as every component: presentation, process, data, and infrastructure. He surveys the styles, technologies, and standards used in mashup development, identifying key trade-offs and helping you choose the best options for your environment. You’ll learn how to overcome technical and business concerns associated with mashups, apply proven mashup patterns, and much more.
Coverage includes
Also of interest: The companion book, Mashup Patterns: Designs and Examples for the Modern Enterprise by Mike Ogrinz (Addison-Wesley), is an indispensable guide to patterns, with insights for making mashups work in production environments.
Mashing Up Wisdom: Jeff Hanson Speaks Up About Enterprise 2.0 Techniques
Opera Unite: A Personal Webserver Built In to Your Browser, Part 1
Opera Unite: A Personal Webserver Built In to Your Browser, Part 2
Please visit the author's website at mashupimplementations.ning.com
Mashup Styles, Techniques, and Technologies
Download the sample pages (includes Chapter 1 and Index)
Preface xv
Acknowledgments xix
About the Author xxi
Introduction 1
Web 1.0 to Web 2.0 to Web 3.0 1
Overview of Mashup Technologies 2
Enterprise Mashup Technological Domains 5
Considerations Unique to the Enterprise Mashup Domain 6
Solving Technological Problems 8
Structuring Semantic Data 10
Effective Design Patterns 11
Unique Security Constraints 12
Conceptual Layers of an Enterprise Mashup 14
Using REST Principles for Enterprise Mashups 17
Emerging Mashup Standards 18
Solving Business Problems 21
Summary 22
Chapter 1: Mashup Styles, Techniques, and Technologies 25
Determining the Technological Domain for a Mashup 25
Choosing a Mashup Style 28
Presentation-Oriented Mashup Techniques 33
Data-Oriented Mashup Techniques 40
Process-Oriented Mashup Techniques 45
Hybrid Mashups 46
Implementing a Simple Mashup 47
Summary 52
Chapter 2: Preparing for a Mashup Implementation 53
Unique Considerations for Mashups 53
Determining Requirements and Constraints 55
Preparing Your Security Infrastructure 64
Preparing Your Governance Infrastructure 70
Preparing for Stability and Reliability 73
Preparing for Performance 75
Preparing Your Data Infrastructure 77
Preparing Your Implementation Strategy 86
Preparing a Testing and Debugging Strategy 90
Building a Simple Mashup 93
Summary 96
Chapter 3: Creating an Enterprise Mashup 97
Solving Enterprise Problems with a Mashup Infrastructure 97
Potential Uses of Mashups for Your Enterprise 99
Uses of Mashups for Specific Enterprises 100
Determining Relevant Application Patterns for Your Mashups 101
Identifying Sources of Information for Your Enterprise Mashups 102
Identifying Services for Your Enterprise Mashups 102
Enterprise Mashup Design Tips 103
Building the Foundation for an Enterprise Mashup Infrastructure 104
Summary 123
Chapter 4: Fundamental Concerns for Enterprise Mashups 125
Structuring and Managing Information 125
Data Mediation 128
Management and Monitoring 130
Mashup Application and Infrastructure Administration 132
Governance in a Mashup Infrastructure 134
Interfaces and APIs for Services, Resources, and UI Components 137
Building Mediation and Monitoring Frameworks for Mashups 139
Summary 162
Chapter 5: Enterprise Mashup Patterns 165
An Introduction to Patterns 165
The Importance of Patterns within a Mashup Infrastructure 166
Core Activities of a Mashup 167
Types of Mashup Patterns 172
Applying Patterns to an Enterprise Mashup Infrastructure 183
Summary 202
Chapter 6: Applying Proper Techniques to Secure a Mashup 203
An Overview of Web Application Security 203
The Need for Security in a Mashup 204
Enterprise Mashup Security Guidelines 205
Securing Input Data with Validation Techniques 208
Escaping Special Characters to Avoid Dynamic Exploits 208
Defending against Session Fixation 210
Preventing Cross-Site Request Forgery Attacks 211
Securing On-Demand JavaScript 213
Securing JSON 214
Sanitizing HTML 217
Securing iframes 218
Authentication and Authorization 220
Applying Security to a Mashup Infrastructure 221
Summary 239
Chapter 7: Step-by-Step: A Tour through a Sample Mashup 241
Building the Mashup Presentation Layer 241
Building the Mashup Infrastructure Foundation 251
Building the Mashup Process Layer 256
Building the Mashup Data Layer 278
Summary 291
Chapter 8: Commercial Mashups and Tools for Building Mashups 293
Tools for Building Mashups 293
Commercial Mashups 317
Summary 320
Chapter 9: Mashup Forecasts and Trends 321
Solving Problems with Enterprise Mashups 321
Building an Open, Agile Mashup Environment 324
Mobile and SDK-Related Mashups 331
Business Process Management for Mashups 340
Desktop/Web Hybrid Mashups 341
Summary 343
Appendix: Mashup Servers, Technologies, APIs, and Tools 345
Mashup Servers 345
Mashup Technologies and Techniques 351
Mashup APIs 359
Mashup Editors 363
Summary 367
Index 369