Flylib.com
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
The Software Fortress Model
Who Cares about Software Fortresses?
The Goals of This Book
Who Should Read This Book
The History of the Software Fortress Model
The Organization of This Book
Acknowledgments
About the Author
About the Art Coordinator
About the ObjectWatch Newsletter
Chapter 1. Introduction
1.1 Definitions
1.2 Software Fortress Organization
1.3 Typical Technologies
1.4 The Fortress as a Trust Boundary
1.5 The Main Fortress Types
1.6 Treaty Relationships
1.7 The Fortress as a Unit of Interoperability
1.8 Objects, Components, and Fortresses
Summary
Chapter 2. Diagramming Software Fortresses
2.1 Basic Software Fortress Diagram
2.2 FortressAlly Diagram
2.3 TreatyAlly Diagram
2.4 SequenceAlly Diagram
2.5 FortressAllyResponsibility Cards
2.6 TreatyAllyResponsibility Cards
2.7 Fortress Overview Document
2.8 Treaty Overview Document
Summary
Chapter 3. Transactions
3.1 Transactionally Aware Resources
3.2 Tightly Coupled Single-Resource Transactions
3.3 Multiple-Resource Transactions
3.4 The Distributed Transaction Coordinator
Summary
Chapter 4. Drawbridges
4.1 Drawbridge Overview
Summary
Chapter 5. Synchronous Drawbridges
5.1 Components
5.2 Homogeneous Synchronous Drawbridges
5.3 Heterogeneous Synchronous Drawbridges
Summary
Chapter 6. Asynchronous Drawbridges
6.1 Message Queues
6.2 Implementation of Asynchronous Drawbridges
6.3 Persistence and Transactions in Queues
6.4 Heterogeneous Asynchronous Drawbridges
6.5 Homogeneous Asynchronous Drawbridges
6.6 Advantages of Asynchronous Drawbridges
6.7 Performance Problems of Asynchronous Drawbridges
Summary
Chapter 7. Guards and Walls
7.1 Fortification
7.2 Validation
7.3 Auditing
7.4 Authentication
7.5 Privacy
7.6 Integrity
7.7 Nonrepudiation
7.8 Authorization
Summary
Chapter 8. Treaties
8.1 A Treaty between Two Fortresses
8.2 Treaty Considerations
Summary
Chapter 9. General Fortress Issues
9.1 Scalability
9.2 Reliability
9.3 Integrity
Summary
Chapter 10. Internet Fortresses
10.1 Presentation Fortresses
10.2 Web Service Fortresses
Summary
Chapter 11. Business Application Fortresses
11.1 Foundation: Components and COMWare
11.2 Leveraging Clusters
11.3 .NET versus the J2EE Approach
Summary
Chapter 12. Legacy, Service, and Treaty Management Fortresses
12.1 Legacy Fortresses
12.2 Service Fortresses
12.3 Treaty Management Fortresses
Summary
Chapter 13. Software Fortress Design Review
13.1 Group One: Enterprise Overview Questions
13.2 Group Two: Enterprise Architecture Questions
13.3 Group Three: Fortress Architecture Questions
Summary
Chapter 14. Case Study
14.1 The Problem
14.2 First-Pass Design
14.3 Second-Pass Design
14.4 The ProcessOrder Drawbridges
14.5 The CheckInventory Drawbridges
14.6 Guards
Summary
Chapter 15. Postlude
15.1 Ten Important Points about Software Fortresses
15.2 Ten Reasons to Adopt the Software Fortress Model
15.3 Ten Rules for Software Fortress Design
15.4 Ten Controversial Ideas within the Software Fortress Model
15.5 Ten Considerations for Evaluating J2EE versus .NET
15.6 Ten Observations on the State of the Software Industry
15.7 Where to Go Next
15.8 Final Words
Glossary
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
ERP System Acquisition: A Process Model and Results From an Austrian Survey
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Healthcare Information: From Administrative to Practice Databases
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.1 Authentication with Public Keys
Step 4.5 How to use OpenSSH Passphrase Agents
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 20. Share Your GPS
Hack 36. Estimate Network Performance
Hack 37. Get Real-Time Network Stats
Hack 59. Scan for Wireless Networks Automatically
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
PMP Practice Questions Exam Cram 2
Project Initiation
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Answers and Explanations
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Home Communication System Basics
Designing a Home Security System
Home Access Control Systems
Defining Users Needs and Desires
Appendix E CEDIA Installer Level I Classification System
MPLS Configuration on Cisco IOS Software
CSC Architecture Benefits
Command Reference
L2 VPN-Any to Any Interworking
Command Reference
Case Study 1: Implementing Multicast Support for MPLS VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies