Software fortresses: modeling enterpise architectures
This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other thro...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Boston
Addison-Wesley
2003
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/0321166086/?ar |
Summary: | This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships. The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures. Software Fortresses is your essential roadmap to all aspects of software fortresses. Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies inches The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002. |
Item Description: | Includes index |
Physical Description: | 1 online resource (xxiv, 277 pages) illustrations |
ISBN: | 9780321166081 0321166086 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047343397 | ||
003 | DE-627-1 | ||
005 | 20240228113904.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2003 xx |||||o 00| ||eng c | ||
020 | |a 9780321166081 |c alk. paper |9 978-0-321-16608-1 | ||
020 | |a 0321166086 |c alk. paper |9 0-321-16608-6 | ||
020 | |a 0321166086 |9 0-321-16608-6 | ||
035 | |a (DE-627-1)047343397 | ||
035 | |a (DE-599)KEP047343397 | ||
035 | |a (ORHE)0321166086 | ||
035 | |a (DE-627-1)047343397 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.1 |2 21 | |
100 | 1 | |a Sessions, Roger |d 1896-1985. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Software fortresses |b modeling enterpise architectures |c Roger Sessions ; art coordinated by Janet Van Sickler |
264 | 1 | |a Boston |b Addison-Wesley |c 2003 | |
300 | |a 1 online resource (xxiv, 277 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships. The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures. Software Fortresses is your essential roadmap to all aspects of software fortresses. Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies inches The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002. | ||
650 | 0 | |a System design | |
650 | 0 | |a Computer architecture | |
650 | 4 | |a Conception de systèmes | |
650 | 4 | |a Ordinateurs ; Architecture | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a System design | |
776 | 1 | |z 0321166086 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0321166086 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0321166086/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047343397 |
---|---|
_version_ | 1833357123685187584 |
adam_text | |
any_adam_object | |
author | Sessions, Roger 1896-1985 |
author_facet | Sessions, Roger 1896-1985 |
author_role | aut |
author_sort | Sessions, Roger 1896-1985 |
author_variant | r s rs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047343397 (DE-599)KEP047343397 (ORHE)0321166086 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03579cam a22004572c 4500</leader><controlfield tag="001">ZDB-30-ORH-047343397</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113904.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321166081</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-0-321-16608-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321166086</subfield><subfield code="c">alk. paper</subfield><subfield code="9">0-321-16608-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321166086</subfield><subfield code="9">0-321-16608-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047343397</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047343397</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0321166086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047343397</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sessions, Roger</subfield><subfield code="d">1896-1985.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software fortresses</subfield><subfield code="b">modeling enterpise architectures</subfield><subfield code="c">Roger Sessions ; art coordinated by Janet Van Sickler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 277 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships. The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures. Software Fortresses is your essential roadmap to all aspects of software fortresses. Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies inches The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">System design</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Conception de systèmes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System design</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0321166086</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0321166086</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0321166086/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047343397 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:41Z |
institution | BVB |
isbn | 9780321166081 0321166086 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xxiv, 277 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Sessions, Roger 1896-1985. VerfasserIn aut Software fortresses modeling enterpise architectures Roger Sessions ; art coordinated by Janet Van Sickler Boston Addison-Wesley 2003 1 online resource (xxiv, 277 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships. The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures. Software Fortresses is your essential roadmap to all aspects of software fortresses. Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies inches The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002. System design Computer architecture Conception de systèmes Ordinateurs ; Architecture 0321166086 Erscheint auch als Druck-Ausgabe 0321166086 |
spellingShingle | Sessions, Roger 1896-1985 Software fortresses modeling enterpise architectures System design Computer architecture Conception de systèmes Ordinateurs ; Architecture |
title | Software fortresses modeling enterpise architectures |
title_auth | Software fortresses modeling enterpise architectures |
title_exact_search | Software fortresses modeling enterpise architectures |
title_full | Software fortresses modeling enterpise architectures Roger Sessions ; art coordinated by Janet Van Sickler |
title_fullStr | Software fortresses modeling enterpise architectures Roger Sessions ; art coordinated by Janet Van Sickler |
title_full_unstemmed | Software fortresses modeling enterpise architectures Roger Sessions ; art coordinated by Janet Van Sickler |
title_short | Software fortresses |
title_sort | software fortresses modeling enterpise architectures |
title_sub | modeling enterpise architectures |
topic | System design Computer architecture Conception de systèmes Ordinateurs ; Architecture |
topic_facet | System design Computer architecture Conception de systèmes Ordinateurs ; Architecture |
work_keys_str_mv | AT sessionsroger softwarefortressesmodelingenterpisearchitectures |