|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm54115729 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
040130s2003 maua o 001 0 eng d |
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d OCLCG
|d VLB
|d OCLCQ
|d MBB
|d VMI
|d OCLCQ
|d OCLCF
|d OCLCQ
|d GO9
|d OCLCQ
|d CEF
|d WYU
|d AU@
|d VT2
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA337801
|2 bnb
|
019 |
|
|
|a 748105134
|a 759513570
|a 809685361
|a 1044346406
|a 1056375783
|a 1057941675
|a 1061024740
|a 1062873690
|a 1073061154
|a 1100907471
|a 1103262460
|a 1129355690
|
020 |
|
|
|a 9780321166081
|q (alk. paper)
|
020 |
|
|
|a 0321166086
|q (alk. paper)
|
020 |
|
|
|z 0321166086
|q (alk. paper)
|
024 |
8 |
|
|a 9780321166081
|
024 |
8 |
|
|a 0321166086
|
029 |
1 |
|
|a AU@
|b 000067113409
|
029 |
1 |
|
|a HEBIS
|b 291420699
|
035 |
|
|
|a (OCoLC)54115729
|z (OCoLC)748105134
|z (OCoLC)759513570
|z (OCoLC)809685361
|z (OCoLC)1044346406
|z (OCoLC)1056375783
|z (OCoLC)1057941675
|z (OCoLC)1061024740
|z (OCoLC)1062873690
|z (OCoLC)1073061154
|z (OCoLC)1100907471
|z (OCoLC)1103262460
|z (OCoLC)1129355690
|
050 |
|
4 |
|a QA76.9.S88
|b S48 2003
|
082 |
0 |
4 |
|a 005.1
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sessions, Roger,
|d 1896-1985.
|
245 |
1 |
0 |
|a Software fortresses :
|b modeling enterpise architectures /
|c Roger Sessions ; art coordinated by Janet Van Sickler.
|
260 |
|
|
|a Boston :
|b Addison-Wesley,
|c ©2003.
|
300 |
|
|
|a 1 online resource (xxiv, 277 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Ch. 1. Introduction -- Ch. 2. Diagramming Software Fortresses -- Ch. 3. Transactions -- Ch. 4. Drawbridges -- Ch. 5. Synchronous Drawbridges -- Ch. 6. Asynchronous Drawbridges -- Ch. 7. Guards and Walls -- Ch. 8. Treaties -- Ch. 9. General Fortress Issues -- Ch. 10. Internet Fortresses -- Ch. 11. Business Application Fortresses -- Ch. 12. Legacy, Service, and Treaty Management Fortresses -- Ch. 13. Software Fortress Design Review -- Ch. 14. Case Study -- Ch. 15. Postlude.
|
520 |
|
|
|a This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships. The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures. Software Fortresses is your essential roadmap to all aspects of software fortresses. Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies inches The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002.
|
542 |
|
|
|f Copyright © Addison-Wesley Professional
|g 2003
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a System design.
|
650 |
|
0 |
|a Computer architecture.
|
650 |
|
6 |
|a Conception de systèmes.
|
650 |
|
6 |
|a Ordinateurs
|x Architecture.
|
650 |
|
7 |
|a Computer architecture.
|2 fast
|0 (OCoLC)fst00872026
|
650 |
|
7 |
|a System design.
|2 fast
|0 (OCoLC)fst01141401
|
776 |
0 |
8 |
|i Print version:
|z 0321166086
|w (DLC) 2003041454
|w (OCoLC)51478100
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0321166086/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|