Cargando…

Software fortresses : modeling enterpise architectures /

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other thro...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sessions, Roger, 1896-1985
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Addison-Wesley, ©2003.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocm54115729
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 040130s2003 maua o 001 0 eng d
040 |a OCL  |b eng  |e pn  |c OCL  |d OCLCQ  |d OCLCG  |d VLB  |d OCLCQ  |d MBB  |d VMI  |d OCLCQ  |d OCLCF  |d OCLCQ  |d GO9  |d OCLCQ  |d CEF  |d WYU  |d AU@  |d VT2  |d OCLCO  |d OCLCQ 
015 |a GBA337801  |2 bnb 
019 |a 748105134  |a 759513570  |a 809685361  |a 1044346406  |a 1056375783  |a 1057941675  |a 1061024740  |a 1062873690  |a 1073061154  |a 1100907471  |a 1103262460  |a 1129355690 
020 |a 9780321166081  |q (alk. paper) 
020 |a 0321166086  |q (alk. paper) 
020 |z 0321166086  |q (alk. paper) 
024 8 |a 9780321166081 
024 8 |a 0321166086 
029 1 |a AU@  |b 000067113409 
029 1 |a HEBIS  |b 291420699 
035 |a (OCoLC)54115729  |z (OCoLC)748105134  |z (OCoLC)759513570  |z (OCoLC)809685361  |z (OCoLC)1044346406  |z (OCoLC)1056375783  |z (OCoLC)1057941675  |z (OCoLC)1061024740  |z (OCoLC)1062873690  |z (OCoLC)1073061154  |z (OCoLC)1100907471  |z (OCoLC)1103262460  |z (OCoLC)1129355690 
050 4 |a QA76.9.S88  |b S48 2003 
082 0 4 |a 005.1  |2 21 
049 |a UAMI 
100 1 |a Sessions, Roger,  |d 1896-1985. 
245 1 0 |a Software fortresses :  |b modeling enterpise architectures /  |c Roger Sessions ; art coordinated by Janet Van Sickler. 
260 |a Boston :  |b Addison-Wesley,  |c ©2003. 
300 |a 1 online resource (xxiv, 277 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
500 |a Includes index. 
505 0 |a Ch. 1. Introduction -- Ch. 2. Diagramming Software Fortresses -- Ch. 3. Transactions -- Ch. 4. Drawbridges -- Ch. 5. Synchronous Drawbridges -- Ch. 6. Asynchronous Drawbridges -- Ch. 7. Guards and Walls -- Ch. 8. Treaties -- Ch. 9. General Fortress Issues -- Ch. 10. Internet Fortresses -- Ch. 11. Business Application Fortresses -- Ch. 12. Legacy, Service, and Treaty Management Fortresses -- Ch. 13. Software Fortress Design Review -- Ch. 14. Case Study -- Ch. 15. Postlude. 
520 |a This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships. The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures. Software Fortresses is your essential roadmap to all aspects of software fortresses. Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies inches The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002. 
542 |f Copyright © Addison-Wesley Professional  |g 2003 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a System design. 
650 0 |a Computer architecture. 
650 6 |a Conception de systèmes. 
650 6 |a Ordinateurs  |x Architecture. 
650 7 |a Computer architecture.  |2 fast  |0 (OCoLC)fst00872026 
650 7 |a System design.  |2 fast  |0 (OCoLC)fst01141401 
776 0 8 |i Print version:  |z 0321166086  |w (DLC) 2003041454  |w (OCoLC)51478100 
856 4 0 |u https://learning.oreilly.com/library/view/~/0321166086/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP