Patterns of enterprise application architecture:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Munich [u.a.]
Addison-Wesley
2006
|
Ausgabe: | 11. printing |
Schriftenreihe: | The Addison-Wesley signature series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIV, 533 S. graph. Darst. |
ISBN: | 0321127420 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022394461 | ||
003 | DE-604 | ||
005 | 20070504 | ||
007 | t | ||
008 | 070419s2006 xxud||| |||| 00||| eng d | ||
020 | |a 0321127420 |9 0-321-12742-0 | ||
035 | |a (OCoLC)442541191 | ||
035 | |a (DE-599)BVBBV022394461 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 |a DE-11 | ||
080 | |a 004.4 | ||
082 | 0 | |a 005.1 |2 21 | |
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 505 |0 (DE-625)143675: |2 rvk | ||
084 | |a ST 515 |0 (DE-625)143677: |2 rvk | ||
084 | |a ST 610 |0 (DE-625)143683: |2 rvk | ||
084 | |a WIR 523f |2 stub | ||
100 | 1 | |a Fowler, Martin |d 1963- |e Verfasser |0 (DE-588)115868321 |4 aut | |
245 | 1 | 0 | |a Patterns of enterprise application architecture |c Martin Fowler |
250 | |a 11. printing | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Addison-Wesley |c 2006 | |
300 | |a XXIV, 533 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Addison-Wesley signature series | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Application software |x Development | |
650 | 4 | |a Business |x Data processing | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a System design | |
650 | 0 | 7 | |a Systementwicklung |0 (DE-588)4126945-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a EAI |0 (DE-588)4692639-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Objektorientierung |0 (DE-588)4346172-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Entwurfsmuster |0 (DE-588)4546895-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | 2 | |a Systementwicklung |0 (DE-588)4126945-7 |D s |
689 | 0 | 3 | |a Objektorientierung |0 (DE-588)4346172-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a EAI |0 (DE-588)4692639-2 |D s |
689 | 1 | 1 | |a Entwurfsmuster |0 (DE-588)4546895-3 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a EAI |0 (DE-588)4692639-2 |D s |
689 | 2 | 1 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-015603233 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136453934940160 |
---|---|
adam_text | Contents
Preface
Who This Book Is For
Acknowledgments
Colophon
Introduction
Architecture
Enterprise Applications
Kinds of Enterprise Application
Thinking About Performance
Patterns
The Structure of the Patterns
Limitations of These Patterns
PART
Chapter
The Evolution of Layers in Enterprise Applications
The Three Principal Layers
Choosing Where to Run Your Layers
Chapter
Making a Choice
Service Layer
Chapter
Architectural Patterns
The Behavioral Problem
VII
Contents
Reading in Data
Structural Mapping Patterns
Mapping Relationships
Inheritance
Building the Mapping
Double Mapping
Using Metadata
Database Connections
Some Miscellaneous Points
Further Reading
Chapter
View Patterns
Input Controller Patterns
Further Reading
Chapter
Concurrency Problems
Execution Contexts
Isolation and Immutability
Optimistic and Pessimistic Concurrency Control
Preventing Inconsistent Reads
Deadlocks
Transactions
ACID
Transactional Resources
Reducing Transaction Isolation for Liveness
Business and System Transactions
Patterns for Offline Concurrency Control
Application Server Concurrency
Further Reading
Chapter
The Value of Statelessness
Session State
Ways to Store Session State
Chapter
The Allure of Distributed Objects
Remote and Local Interfaces
Contents
Where You Have to Distribute
Working with the Distribution Boundary
Interfaces for Distribution
Chapter
Starting with the Domain Layer
Down to the Data Source Layer
Data Source for Transaction Script
Data Source for Table Module
Data Source for Domain Model
The Presentation Layer
Some Technology-Specific Advice
Java and J2EE
.NET
Stored Procedures
Web Services
Other Layering Schemes
PART
Chapter
Transaction Script
How It Works
When to Use It
The Revenue Recognition Problem
Example: Revenue Recognition (Java)
Domain Model
How It Works
When to Use It
Further Reading
Example: Revenue Recognition (Java)
Table Module
How It Works
When to Use It
Example: Revenue Recognition with a Table Module (C#)
Service Layer (by Randy Stafford)
How It Works
When to Use It
V
v
Contents
Further Reading
Example: Revenue Recognition (Java)
Chapter
Table Data Gateway
How It Works
When to Use It
Further Reading
Example: Person Gateway (C#)
Example: Using ADO.NET Data Sets (C#)
Row Data Gateway
How It Works
When to Use It
Example: A Person Record (Java)
Example: A Data Holder for a Domain Object (Java)
Active Record
How It Works
When to Use It
Example: A Simple Person (Java)
Data Mapper
How It Works
When to Use It
Example: A Simple Database Mapper (Java)
Example: Separating the Finders (Java)
Example: Creating an Empty Object (Java)
Chapter
Unit of Work
How It Works
When to Use It
Example: Unit of Work with Object Registration (Java)
(by David Rice)
Identity Map
How It Works
When to Use It
Example: Methods for an Identity Map (Java)
Contents
Lazy Load
How It Works
When to Use It
Example: Lazy Initialization (Java)
Example: Virtual Proxy (Java)
Example: Using a Value Holder (Java)
Example: Using Ghosts (C#)
Chapter
Identity Field
How It Works
When to Use It
Further Reading
Example: Integral Key (C#)
Example: Using a Key Table (Java)
Example: Using a Compound Key (Java)
Foreign Key Mapping
How It Works
When to Use It
Example: Single-Valued Reference (Java)
Example: Multitable Find (Java)
Example: Collection of References (C#)
Association Table Mapping
How It Works
When to Use It
Example: Employees and Skills (C#)
Example: Using Direct SQL (Java)
Example: Using a Single Query for Multiple Employees (Java)
(by Matt Foemmel and Martin Fowler)
Dependent Mapping
How It Works
When to Use It
Example: Albums and Tracks (Java)
Embedded Value
How It Works
When to Use It
▼
v
Contents
Further Reading
Example: Simple Value Object (Java)
Serialized LOB
How It Works
When to Use It
Example: Serializing a Department Hierarchy in
XML (Java)
Single Table Inheritance
How It Works
When to Use It
Example: A Single Table for Players (C#)
Loading an Object from the Database
Class Table Inheritance
How It Works
When to Use It
Further Reading
Example: Players and Their Kin (C#)
Concrete Table Inheritance
How It Works
When to Use It
Example: Concrete Players (C#)
Inheritance Mappers
How It Works
When to Use It
Chapter
Metadata Mapping
How It Works
When to Use It
Example: Using Metadata and Reflection (Java)
Query Object
How It Works
When to Use It
Further Reading
Example: A Simple Query Object (Java)
Contents
Repository (by Edward Hieatt and Rob
How It Works
When to Use It
Further Reading
Example: Finding a Person s Dependents (Java)
Example: Swapping Repository Strategies (Java)
Chapter
Model View Controller
How It Works
When to Use It
Page Controller
How It Works
When to Use It
Example: Simple Display with
and a JSP View (Java)
Example: Using a JSP as a Handler (Java)
Example: Page Handler with a Code Behind (C#)
Front Controller
How It Works
When to Use It
Further Reading
Example: Simple Display (Java)
Template View
How It Works
When to Use It
Example: Using a JSP as a View with a Separate
Controller (Java)
Example: ASP.NET Server Page (C#)
Transform View
How It Works
When to Use It
Example: Simple Transform (Java)
Two Step View
How It Works
When to Use It
Contents
Example: Two Stage XSLT (XSLT)
Example: JSP and Custom Tags (Java)
Application Controller
How It Works
When to Use It
Further Reading
Example: State Model Application Controller (Java)
Chapter
Remote Facade
How It Works
When to Use It
Example: Using a Java Session Bean as a Remote Facade (Java)
Example: Web Service (C#)
Data Transfer Object
How It Works
When to Use It
Further Reading
Example: Transferring Information About Albums (Java)
Example: Serializing Using XML (Java)
Chapter
Optimistic Offline Lock (by David Rice)
How It Works
When to Use It
Example: Domain Layer with Data Mappers
Pessimistic Offline Lock (by David Rice)
How It Works
When to Use It
Example: Simple Lock Manager (Java)
Coarse-Grained Lock (by David Rice and Matt Voemmel)
How It Works
When to Use It
Example: Shared Optimistic Offline Lock
Example: Shared Pessimistic Offline Lock
Example: Root Optimistic Offline Lock
Contents
Implicit Lock (by David Rice)
How It Works
When to Use It
Example: Implicit Pessimistic Offline Lock
Chapter
Client Session State
How It Works
When to Use It
Server Session State
How It Works
When to Use It
Database Session State
How It Works
When to Use It
Chapter
Gateway
How It Works
When to Use It
Example: A Gateway to a Proprietary Messaging
Service (Java)
Mapper
How It Works
When to Use It
Layer
How It Works
When to Use It
Example: Domain Object (Java)
Separated Interface
How It Works
When to Use It
Registry
How It Works
When to Use It
▼
▼
Contents
Example: A Singleton Registry (Java)
Example: Thread-Safe Registry (Java)
(by Matt Foemmel and Martin Fowler)
Value Object
How It Works
When to Use It
Money
How It Works
When to Use It
Example: A Money Class (Java)
(by Matt Foemmel and Martin Fowler)
Special Case
How It Works
When to Use It
Further Reading
Example: A Simple Null Object (C#)
Plugin
How It Works
When to Use It
Example: An Id Generator (Java)
Service Stub (by David Rice)
How It Works
When to Use It
Example: Sales Tax Service (Java)
Record Set
How It Works
When to Use It
References
Index
Y e
many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and
.NET, have become commonplace.These new tools and technologies are capable of build¬
ing powerful applications, but they are not easily implemented. Common failures in enterprise applica¬
tions often occur because their developers do not understand the architectural lessons that experienced
object developers have learned.
Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that
face enterprise application developers. The author, noted object-oriented designer Martin Fowler,
noticed that despite changes in technology
design ideas can be adapted and applied to solve common problems. With the help of an expert group of
contributors, Martin distills more than forty recurring solutions into patterns. The result is an indispensable
handbook of solutions that are applicable to any enterprise application platform.
This book is actually two books in one. The first section is a short tutorial on developing enterprise appli¬
cations, which you can read from start to finish to understand the scope of the book s lessons. The next
section, the bulk of the book,
usage and implementation information, as well as detailed code examples in Java or C#.The entire book
is also richly illustrated with UML diagrams to further explain the concepts.
Armed with this book, you will have the knowledge necessary to make important architectural decisions
about building an enterprise application and the proven patterns for use when building them.
The topics covered include:
•
•
•
•
•
•
Martin Fowler is the Chief Scientist forThoughtWorks, an enterprise application development and inte¬
gration company. He first pioneered the use of object technology for building multi-layered enterprise
applications in the
Programming, and
|
adam_txt |
Contents
Preface
Who This Book Is For
Acknowledgments
Colophon
Introduction
Architecture
Enterprise Applications
Kinds of Enterprise Application
Thinking About Performance
Patterns
The Structure of the Patterns
Limitations of These Patterns
PART
Chapter
The Evolution of Layers in Enterprise Applications
The Three Principal Layers
Choosing Where to Run Your Layers
Chapter
Making a Choice
Service Layer
Chapter
Architectural Patterns
The Behavioral Problem
VII
Contents
Reading in Data
Structural Mapping Patterns
Mapping Relationships
Inheritance
Building the Mapping
Double Mapping
Using Metadata
Database Connections
Some Miscellaneous Points
Further Reading
Chapter
View Patterns
Input Controller Patterns
Further Reading
Chapter
Concurrency Problems
Execution Contexts
Isolation and Immutability
Optimistic and Pessimistic Concurrency Control
Preventing Inconsistent Reads
Deadlocks
Transactions
ACID
Transactional Resources
Reducing Transaction Isolation for Liveness
Business and System Transactions
Patterns for Offline Concurrency Control
Application Server Concurrency
Further Reading
Chapter
The Value of Statelessness
Session State
Ways to Store Session State
Chapter
The Allure of Distributed Objects
Remote and Local Interfaces
Contents
Where You Have to Distribute
Working with the Distribution Boundary
Interfaces for Distribution
Chapter
Starting with the Domain Layer
Down to the Data Source Layer
Data Source for Transaction Script
Data Source for Table Module
Data Source for Domain Model
The Presentation Layer
Some Technology-Specific Advice
Java and J2EE
.NET
Stored Procedures
Web Services
Other Layering Schemes
PART
Chapter
Transaction Script
How It Works
When to Use It
The Revenue Recognition Problem
Example: Revenue Recognition (Java)
Domain Model
How It Works
When to Use It
Further Reading
Example: Revenue Recognition (Java)
Table Module
How It Works
When to Use It
Example: Revenue Recognition with a Table Module (C#)
Service Layer (by Randy Stafford)
How It Works
When to Use It
V
v
Contents
Further Reading
Example: Revenue Recognition (Java)
Chapter
Table Data Gateway
How It Works
When to Use It
Further Reading
Example: Person Gateway (C#)
Example: Using ADO.NET Data Sets (C#)
Row Data Gateway
How It Works
When to Use It
Example: A Person Record (Java)
Example: A Data Holder for a Domain Object (Java)
Active Record
How It Works
When to Use It
Example: A Simple Person (Java)
Data Mapper
How It Works
When to Use It
Example: A Simple Database Mapper (Java)
Example: Separating the Finders (Java)
Example: Creating an Empty Object (Java)
Chapter
Unit of Work
How It Works
When to Use It
Example: Unit of Work with Object Registration (Java)
(by David Rice)
Identity Map
How It Works
When to Use It
Example: Methods for an Identity Map (Java)
Contents
Lazy Load
How It Works
When to Use It
Example: Lazy Initialization (Java)
Example: Virtual Proxy (Java)
Example: Using a Value Holder (Java)
Example: Using Ghosts (C#)
Chapter
Identity Field
How It Works
When to Use It
Further Reading
Example: Integral Key (C#)
Example: Using a Key Table (Java)
Example: Using a Compound Key (Java)
Foreign Key Mapping
How It Works
When to Use It
Example: Single-Valued Reference (Java)
Example: Multitable Find (Java)
Example: Collection of References (C#)
Association Table Mapping
How It Works
When to Use It
Example: Employees and Skills (C#)
Example: Using Direct SQL (Java)
Example: Using a Single Query for Multiple Employees (Java)
(by Matt Foemmel and Martin Fowler)
Dependent Mapping
How It Works
When to Use It
Example: Albums and Tracks (Java)
Embedded Value
How It Works
When to Use It
▼
v
Contents
Further Reading
Example: Simple Value Object (Java)
Serialized LOB
How It Works
When to Use It
Example: Serializing a Department Hierarchy in
XML (Java)
Single Table Inheritance
How It Works
When to Use It
Example: A Single Table for Players (C#)
Loading an Object from the Database
Class Table Inheritance
How It Works
When to Use It
Further Reading
Example: Players and Their Kin (C#)
Concrete Table Inheritance
How It Works
When to Use It
Example: Concrete Players (C#)
Inheritance Mappers
How It Works
When to Use It
Chapter
Metadata Mapping
How It Works
When to Use It
Example: Using Metadata and Reflection (Java)
Query Object
How It Works
When to Use It
Further Reading
Example: A Simple Query Object (Java)
Contents
Repository (by Edward Hieatt and Rob
How It Works
When to Use It
Further Reading
Example: Finding a Person's Dependents (Java)
Example: Swapping Repository Strategies (Java)
Chapter
Model View Controller
How It Works
When to Use It
Page Controller
How It Works
When to Use It
Example: Simple Display with
and a JSP View (Java)
Example: Using a JSP as a Handler (Java)
Example: Page Handler with a Code Behind (C#)
Front Controller
How It Works
When to Use It
Further Reading
Example: Simple Display (Java)
Template View
How It Works
When to Use It
Example: Using a JSP as a View with a Separate
Controller (Java)
Example: ASP.NET Server Page (C#)
Transform View
How It Works
When to Use It
Example: Simple Transform (Java)
Two Step View
How It Works
When to Use It
Contents
Example: Two Stage XSLT (XSLT)
Example: JSP and Custom Tags (Java)
Application Controller
How It Works
When to Use It
Further Reading
Example: State Model Application Controller (Java)
Chapter
Remote Facade
How It Works
When to Use It
Example: Using a Java Session Bean as a Remote Facade (Java)
Example: Web Service (C#)
Data Transfer Object
How It Works
When to Use It
Further Reading
Example: Transferring Information About Albums (Java)
Example: Serializing Using XML (Java)
Chapter
Optimistic Offline Lock (by David Rice)
How It Works
When to Use It
Example: Domain Layer with Data Mappers
Pessimistic Offline Lock (by David Rice)
How It Works
When to Use It
Example: Simple Lock Manager (Java)
Coarse-Grained Lock (by David Rice and Matt Voemmel)
How It Works
When to Use It
Example: Shared Optimistic Offline Lock
Example: Shared Pessimistic Offline Lock
Example: Root Optimistic Offline Lock
Contents
Implicit Lock (by David Rice)
How It Works
When to Use It
Example: Implicit Pessimistic Offline Lock
Chapter
Client Session State
How It Works
When to Use It
Server Session State
How It Works
When to Use It
Database Session State
How It Works
When to Use It
Chapter
Gateway
How It Works
When to Use It
Example: A Gateway to a Proprietary Messaging
Service (Java)
Mapper
How It Works
When to Use It
Layer
How It Works
When to Use It
Example: Domain Object (Java)
Separated Interface
How It Works
When to Use It
Registry
How It Works
When to Use It
▼
▼
Contents
Example: A Singleton Registry (Java)
Example: Thread-Safe Registry (Java)
(by Matt Foemmel and Martin Fowler)
Value Object
How It Works
When to Use It
Money
How It Works
When to Use It
Example: A Money Class (Java)
(by Matt Foemmel and Martin Fowler)
Special Case
How It Works
When to Use It
Further Reading
Example: A Simple Null Object (C#)
Plugin
How It Works
When to Use It
Example: An Id Generator (Java)
Service Stub (by David Rice)
How It Works
When to Use It
Example: Sales Tax Service (Java)
Record Set
How It Works
When to Use It
References
Index
Y\e
many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and
.NET, have become commonplace.These new tools and technologies are capable of build¬
ing powerful applications, but they are not easily implemented. Common failures in enterprise applica¬
tions often occur because their developers do not understand the architectural lessons that experienced
object developers have learned.
Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that
face enterprise application developers. The author, noted object-oriented designer Martin Fowler,
noticed that despite changes in technology
design ideas can be adapted and applied to solve common problems. With the help of an expert group of
contributors, Martin distills more than forty recurring solutions into patterns. The result is an indispensable
handbook of solutions that are applicable to any enterprise application platform.
This book is actually two books in one. The first section is a short tutorial on developing enterprise appli¬
cations, which you can read from start to finish to understand the scope of the book's lessons. The next
section, the bulk of the book,
usage and implementation information, as well as detailed code examples in Java or C#.The entire book
is also richly illustrated with UML diagrams to further explain the concepts.
Armed with this book, you will have the knowledge necessary to make important architectural decisions
about building an enterprise application and the proven patterns for use when building them.
The topics covered include:
•
•
•
•
•
•
Martin Fowler is the Chief Scientist forThoughtWorks, an enterprise application development and inte¬
gration company. He first pioneered the use of object technology for building multi-layered enterprise
applications in the
Programming, and |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Fowler, Martin 1963- |
author_GND | (DE-588)115868321 |
author_facet | Fowler, Martin 1963- |
author_role | aut |
author_sort | Fowler, Martin 1963- |
author_variant | m f mf |
building | Verbundindex |
bvnumber | BV022394461 |
classification_rvk | QH 500 ST 230 ST 505 ST 515 ST 610 |
classification_tum | WIR 523f |
ctrlnum | (OCoLC)442541191 (DE-599)BVBBV022394461 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 11. printing |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03084nam a2200733zc 4500</leader><controlfield tag="001">BV022394461</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070504 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070419s2006 xxud||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321127420</subfield><subfield code="9">0-321-12742-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)442541191</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022394461</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">004.4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 505</subfield><subfield code="0">(DE-625)143675:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 515</subfield><subfield code="0">(DE-625)143677:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 610</subfield><subfield code="0">(DE-625)143683:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fowler, Martin</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)115868321</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Patterns of enterprise application architecture</subfield><subfield code="c">Martin Fowler</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">11. printing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 533 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Addison-Wesley signature series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System design</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systementwicklung</subfield><subfield code="0">(DE-588)4126945-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">EAI</subfield><subfield code="0">(DE-588)4692639-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Objektorientierung</subfield><subfield code="0">(DE-588)4346172-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Entwurfsmuster</subfield><subfield code="0">(DE-588)4546895-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Systementwicklung</subfield><subfield code="0">(DE-588)4126945-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Objektorientierung</subfield><subfield code="0">(DE-588)4346172-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">EAI</subfield><subfield code="0">(DE-588)4692639-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Entwurfsmuster</subfield><subfield code="0">(DE-588)4546895-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">EAI</subfield><subfield code="0">(DE-588)4692639-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015603233</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV022394461 |
illustrated | Illustrated |
index_date | 2024-07-02T17:16:01Z |
indexdate | 2024-07-09T20:56:39Z |
institution | BVB |
isbn | 0321127420 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015603233 |
oclc_num | 442541191 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-11 |
owner_facet | DE-355 DE-BY-UBR DE-11 |
physical | XXIV, 533 S. graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Addison-Wesley |
record_format | marc |
series2 | The Addison-Wesley signature series |
spelling | Fowler, Martin 1963- Verfasser (DE-588)115868321 aut Patterns of enterprise application architecture Martin Fowler 11. printing Boston ; Munich [u.a.] Addison-Wesley 2006 XXIV, 533 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier The Addison-Wesley signature series Includes bibliographical references and index Datenverarbeitung Wirtschaft Application software Development Business Data processing Computer architecture System design Systementwicklung (DE-588)4126945-7 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf EAI (DE-588)4692639-2 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Objektorientierung (DE-588)4346172-4 gnd rswk-swf Entwurfsmuster (DE-588)4546895-3 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Anwendungssystem (DE-588)4139375-2 s Systementwicklung (DE-588)4126945-7 s Objektorientierung (DE-588)4346172-4 s DE-604 EAI (DE-588)4692639-2 s Entwurfsmuster (DE-588)4546895-3 s 1\p DE-604 Softwareentwicklung (DE-588)4116522-6 s 2\p DE-604 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Fowler, Martin 1963- Patterns of enterprise application architecture Datenverarbeitung Wirtschaft Application software Development Business Data processing Computer architecture System design Systementwicklung (DE-588)4126945-7 gnd Unternehmen (DE-588)4061963-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd EAI (DE-588)4692639-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Objektorientierung (DE-588)4346172-4 gnd Entwurfsmuster (DE-588)4546895-3 gnd |
subject_GND | (DE-588)4126945-7 (DE-588)4061963-1 (DE-588)4116522-6 (DE-588)4692639-2 (DE-588)4139375-2 (DE-588)4346172-4 (DE-588)4546895-3 |
title | Patterns of enterprise application architecture |
title_auth | Patterns of enterprise application architecture |
title_exact_search | Patterns of enterprise application architecture |
title_exact_search_txtP | Patterns of enterprise application architecture |
title_full | Patterns of enterprise application architecture Martin Fowler |
title_fullStr | Patterns of enterprise application architecture Martin Fowler |
title_full_unstemmed | Patterns of enterprise application architecture Martin Fowler |
title_short | Patterns of enterprise application architecture |
title_sort | patterns of enterprise application architecture |
topic | Datenverarbeitung Wirtschaft Application software Development Business Data processing Computer architecture System design Systementwicklung (DE-588)4126945-7 gnd Unternehmen (DE-588)4061963-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd EAI (DE-588)4692639-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Objektorientierung (DE-588)4346172-4 gnd Entwurfsmuster (DE-588)4546895-3 gnd |
topic_facet | Datenverarbeitung Wirtschaft Application software Development Business Data processing Computer architecture System design Systementwicklung Unternehmen Softwareentwicklung EAI Anwendungssystem Objektorientierung Entwurfsmuster |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015603233&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT fowlermartin patternsofenterpriseapplicationarchitecture |