Flylib.com
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
The Software Fortress Model
Who Cares about Software Fortresses?
The Goals of This Book
Who Should Read This Book
The History of the Software Fortress Model
The Organization of This Book
Acknowledgments
About the Author
About the Art Coordinator
About the ObjectWatch Newsletter
Chapter 1. Introduction
1.1 Definitions
1.2 Software Fortress Organization
1.3 Typical Technologies
1.4 The Fortress as a Trust Boundary
1.5 The Main Fortress Types
1.6 Treaty Relationships
1.7 The Fortress as a Unit of Interoperability
1.8 Objects, Components, and Fortresses
Summary
Chapter 2. Diagramming Software Fortresses
2.1 Basic Software Fortress Diagram
2.2 FortressAlly Diagram
2.3 TreatyAlly Diagram
2.4 SequenceAlly Diagram
2.5 FortressAllyResponsibility Cards
2.6 TreatyAllyResponsibility Cards
2.7 Fortress Overview Document
2.8 Treaty Overview Document
Summary
Chapter 3. Transactions
3.1 Transactionally Aware Resources
3.2 Tightly Coupled Single-Resource Transactions
3.3 Multiple-Resource Transactions
3.4 The Distributed Transaction Coordinator
Summary
Chapter 4. Drawbridges
4.1 Drawbridge Overview
Summary
Chapter 5. Synchronous Drawbridges
5.1 Components
5.2 Homogeneous Synchronous Drawbridges
5.3 Heterogeneous Synchronous Drawbridges
Summary
Chapter 6. Asynchronous Drawbridges
6.1 Message Queues
6.2 Implementation of Asynchronous Drawbridges
6.3 Persistence and Transactions in Queues
6.4 Heterogeneous Asynchronous Drawbridges
6.5 Homogeneous Asynchronous Drawbridges
6.6 Advantages of Asynchronous Drawbridges
6.7 Performance Problems of Asynchronous Drawbridges
Summary
Chapter 7. Guards and Walls
7.1 Fortification
7.2 Validation
7.3 Auditing
7.4 Authentication
7.5 Privacy
7.6 Integrity
7.7 Nonrepudiation
7.8 Authorization
Summary
Chapter 8. Treaties
8.1 A Treaty between Two Fortresses
8.2 Treaty Considerations
Summary
Chapter 9. General Fortress Issues
9.1 Scalability
9.2 Reliability
9.3 Integrity
Summary
Chapter 10. Internet Fortresses
10.1 Presentation Fortresses
10.2 Web Service Fortresses
Summary
Chapter 11. Business Application Fortresses
11.1 Foundation: Components and COMWare
11.2 Leveraging Clusters
11.3 .NET versus the J2EE Approach
Summary
Chapter 12. Legacy, Service, and Treaty Management Fortresses
12.1 Legacy Fortresses
12.2 Service Fortresses
12.3 Treaty Management Fortresses
Summary
Chapter 13. Software Fortress Design Review
13.1 Group One: Enterprise Overview Questions
13.2 Group Two: Enterprise Architecture Questions
13.3 Group Three: Fortress Architecture Questions
Summary
Chapter 14. Case Study
14.1 The Problem
14.2 First-Pass Design
14.3 Second-Pass Design
14.4 The ProcessOrder Drawbridges
14.5 The CheckInventory Drawbridges
14.6 Guards
Summary
Chapter 15. Postlude
15.1 Ten Important Points about Software Fortresses
15.2 Ten Reasons to Adopt the Software Fortress Model
15.3 Ten Rules for Software Fortress Design
15.4 Ten Controversial Ideas within the Software Fortress Model
15.5 Ten Considerations for Evaluating J2EE versus .NET
15.6 Ten Observations on the State of the Software Industry
15.7 Where to Go Next
15.8 Final Words
Glossary
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle SQL
PL/SQL
Optimizing: Reducing Parses
Appendix B Functions
Agile Project Management: Creating Innovative Products (2nd Edition)
Champion Technical Excellence
Phase: Envision
Practice: Performance Requirements Cards
Speculate Summary
Phase: Adapt
Beginning Cryptography with Java
Asymmetric Key Cryptography
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
FileMaker Pro 8: The Missing Manual
What Makes a Layout
Creating Layouts for Reports
Relational Databases
Table Occurrences
Building a Data Tunneling Interface
Competency-Based Human Resource Management
Competency-Based Employee Recruitment and Selection
Competency-Based Employee Training
Competency-Based Performance Management
Appendix C Examples of Life-Career Assessment Exercises
Appendix D Employee Development and Succession Management
Mastering Delphi 7
Working with Forms
Reporting with Rave
Internet Programming: Sockets and Indy
Web Programming with IntraWeb
Appendix C Free Companion Books on Delphi
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies