Flylib.com
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
The Software Fortress Model
Who Cares about Software Fortresses?
The Goals of This Book
Who Should Read This Book
The History of the Software Fortress Model
The Organization of This Book
Acknowledgments
About the Author
About the Art Coordinator
About the ObjectWatch Newsletter
Chapter 1. Introduction
1.1 Definitions
1.2 Software Fortress Organization
1.3 Typical Technologies
1.4 The Fortress as a Trust Boundary
1.5 The Main Fortress Types
1.6 Treaty Relationships
1.7 The Fortress as a Unit of Interoperability
1.8 Objects, Components, and Fortresses
Summary
Chapter 2. Diagramming Software Fortresses
2.1 Basic Software Fortress Diagram
2.2 FortressAlly Diagram
2.3 TreatyAlly Diagram
2.4 SequenceAlly Diagram
2.5 FortressAllyResponsibility Cards
2.6 TreatyAllyResponsibility Cards
2.7 Fortress Overview Document
2.8 Treaty Overview Document
Summary
Chapter 3. Transactions
3.1 Transactionally Aware Resources
3.2 Tightly Coupled Single-Resource Transactions
3.3 Multiple-Resource Transactions
3.4 The Distributed Transaction Coordinator
Summary
Chapter 4. Drawbridges
4.1 Drawbridge Overview
Summary
Chapter 5. Synchronous Drawbridges
5.1 Components
5.2 Homogeneous Synchronous Drawbridges
5.3 Heterogeneous Synchronous Drawbridges
Summary
Chapter 6. Asynchronous Drawbridges
6.1 Message Queues
6.2 Implementation of Asynchronous Drawbridges
6.3 Persistence and Transactions in Queues
6.4 Heterogeneous Asynchronous Drawbridges
6.5 Homogeneous Asynchronous Drawbridges
6.6 Advantages of Asynchronous Drawbridges
6.7 Performance Problems of Asynchronous Drawbridges
Summary
Chapter 7. Guards and Walls
7.1 Fortification
7.2 Validation
7.3 Auditing
7.4 Authentication
7.5 Privacy
7.6 Integrity
7.7 Nonrepudiation
7.8 Authorization
Summary
Chapter 8. Treaties
8.1 A Treaty between Two Fortresses
8.2 Treaty Considerations
Summary
Chapter 9. General Fortress Issues
9.1 Scalability
9.2 Reliability
9.3 Integrity
Summary
Chapter 10. Internet Fortresses
10.1 Presentation Fortresses
10.2 Web Service Fortresses
Summary
Chapter 11. Business Application Fortresses
11.1 Foundation: Components and COMWare
11.2 Leveraging Clusters
11.3 .NET versus the J2EE Approach
Summary
Chapter 12. Legacy, Service, and Treaty Management Fortresses
12.1 Legacy Fortresses
12.2 Service Fortresses
12.3 Treaty Management Fortresses
Summary
Chapter 13. Software Fortress Design Review
13.1 Group One: Enterprise Overview Questions
13.2 Group Two: Enterprise Architecture Questions
13.3 Group Three: Fortress Architecture Questions
Summary
Chapter 14. Case Study
14.1 The Problem
14.2 First-Pass Design
14.3 Second-Pass Design
14.4 The ProcessOrder Drawbridges
14.5 The CheckInventory Drawbridges
14.6 Guards
Summary
Chapter 15. Postlude
15.1 Ten Important Points about Software Fortresses
15.2 Ten Reasons to Adopt the Software Fortress Model
15.3 Ten Rules for Software Fortress Design
15.4 Ten Controversial Ideas within the Software Fortress Model
15.5 Ten Considerations for Evaluating J2EE versus .NET
15.6 Ten Observations on the State of the Software Industry
15.7 Where to Go Next
15.8 Final Words
Glossary
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Mapping ORM Models to Logical Database Models
Reverse Engineering and Importing to ORM
Generating a Physical Database Schema
Logical Database Model Reports
Java How to Program (6th Edition) (How to Program (Deitel))
Terminology
Self-Review Exercises
Case Study: DeitelMessenger Server and Client
Introduction
Class String
Mastering Delphi 7
The Run-Time Library
Writing Delphi Components
Internet Programming: Sockets and Indy
Web Programming with WebBroker and WebSnap
Delphi for .NET Preview: The Language and the RTL
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Customizing the Visio Environment
Getting Visio and Diagram Help
Formatting Individual Shapes
Key Points
Exporting Timelines to Create Gantt Charts
Cultural Imperative: Global Trends in the 21st Century
Culture and Climate
Culture and Religion
Cross-Century Worldviews
The Pacific Rim: The Fourth Cultural Ecology
Appendix B Leadership Test
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Defeating Virtual Private Databases
Running Operating System Commands
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies