Flylib.com
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
The Software Fortress Model
Who Cares about Software Fortresses?
The Goals of This Book
Who Should Read This Book
The History of the Software Fortress Model
The Organization of This Book
Acknowledgments
About the Author
About the Art Coordinator
About the ObjectWatch Newsletter
Chapter 1. Introduction
1.1 Definitions
1.2 Software Fortress Organization
1.3 Typical Technologies
1.4 The Fortress as a Trust Boundary
1.5 The Main Fortress Types
1.6 Treaty Relationships
1.7 The Fortress as a Unit of Interoperability
1.8 Objects, Components, and Fortresses
Summary
Chapter 2. Diagramming Software Fortresses
2.1 Basic Software Fortress Diagram
2.2 FortressAlly Diagram
2.3 TreatyAlly Diagram
2.4 SequenceAlly Diagram
2.5 FortressAllyResponsibility Cards
2.6 TreatyAllyResponsibility Cards
2.7 Fortress Overview Document
2.8 Treaty Overview Document
Summary
Chapter 3. Transactions
3.1 Transactionally Aware Resources
3.2 Tightly Coupled Single-Resource Transactions
3.3 Multiple-Resource Transactions
3.4 The Distributed Transaction Coordinator
Summary
Chapter 4. Drawbridges
4.1 Drawbridge Overview
Summary
Chapter 5. Synchronous Drawbridges
5.1 Components
5.2 Homogeneous Synchronous Drawbridges
5.3 Heterogeneous Synchronous Drawbridges
Summary
Chapter 6. Asynchronous Drawbridges
6.1 Message Queues
6.2 Implementation of Asynchronous Drawbridges
6.3 Persistence and Transactions in Queues
6.4 Heterogeneous Asynchronous Drawbridges
6.5 Homogeneous Asynchronous Drawbridges
6.6 Advantages of Asynchronous Drawbridges
6.7 Performance Problems of Asynchronous Drawbridges
Summary
Chapter 7. Guards and Walls
7.1 Fortification
7.2 Validation
7.3 Auditing
7.4 Authentication
7.5 Privacy
7.6 Integrity
7.7 Nonrepudiation
7.8 Authorization
Summary
Chapter 8. Treaties
8.1 A Treaty between Two Fortresses
8.2 Treaty Considerations
Summary
Chapter 9. General Fortress Issues
9.1 Scalability
9.2 Reliability
9.3 Integrity
Summary
Chapter 10. Internet Fortresses
10.1 Presentation Fortresses
10.2 Web Service Fortresses
Summary
Chapter 11. Business Application Fortresses
11.1 Foundation: Components and COMWare
11.2 Leveraging Clusters
11.3 .NET versus the J2EE Approach
Summary
Chapter 12. Legacy, Service, and Treaty Management Fortresses
12.1 Legacy Fortresses
12.2 Service Fortresses
12.3 Treaty Management Fortresses
Summary
Chapter 13. Software Fortress Design Review
13.1 Group One: Enterprise Overview Questions
13.2 Group Two: Enterprise Architecture Questions
13.3 Group Three: Fortress Architecture Questions
Summary
Chapter 14. Case Study
14.1 The Problem
14.2 First-Pass Design
14.3 Second-Pass Design
14.4 The ProcessOrder Drawbridges
14.5 The CheckInventory Drawbridges
14.6 Guards
Summary
Chapter 15. Postlude
15.1 Ten Important Points about Software Fortresses
15.2 Ten Reasons to Adopt the Software Fortress Model
15.3 Ten Rules for Software Fortress Design
15.4 Ten Controversial Ideas within the Software Fortress Model
15.5 Ten Considerations for Evaluating J2EE versus .NET
15.6 Ten Observations on the State of the Software Industry
15.7 Where to Go Next
15.8 Final Words
Glossary
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Answers to Assessment Test
IT Project Management Overview
Cost Planning
Project Control
Appendix A Systems Development Life Cycle
Interprocess Communications in Linux: The Nooks and Crannies
Lock Files
Message Queue Class
Creating and Accessing Semaphore Sets
Using RPCGEN to Generate Templates and a MAKEFILE
Summary
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Laying Out Forms
Adding Basic Controls and Lists
Formatting Forms
Validating Form Data
Connecting Forms to Databases
C++ How to Program (5th Edition)
History of C and C++
Self-Review Exercises
Another C++ Program: Adding Integers
G.10. Class BalanceInquiry
Self-Review Exercises
Cisco IOS Cookbook (Cookbooks (OReilly))
Locking Configuration Access
Disabling EIGRP on an Interface
Setting the OSPF RID
OSPF Virtual Links
Debugging Dial Backup
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Classic Controls
Forms
Modern Controls
Custom Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies