Implementing SOA: total architecture in practice
Saved in:
Format: | Book |
---|---|
Language: | English |
Published: |
Upper Saddle River, NJ [u.a.]
Addison-Wesley
2008
|
Edition: | 1. print. |
Subjects: | |
Online Access: | Inhaltsverzeichnis |
Physical Description: | XXX, 699 S. Ill., graph. Darst. |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023119273 | ||
003 | DE-604 | ||
005 | 20100202 | ||
007 | t| | ||
008 | 080208s2008 xx ad|| |||| 00||| eng d | ||
020 | |z 9780321504722 |9 978-0-321-50472-2 | ||
020 | |z 0321504720 |9 0-321-50472-0 | ||
035 | |a (OCoLC)172980368 | ||
035 | |a (DE-599)BVBBV023119273 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-N2 |a DE-522 | ||
050 | 0 | |a QA76.9.A73 | |
082 | 0 | |a 004.2/2 |2 22 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 515 |0 (DE-625)143677: |2 rvk | ||
245 | 1 | 0 | |a Implementing SOA |b total architecture in practice |c Paul C. Brown |
250 | |a 1. print. | ||
264 | 1 | |a Upper Saddle River, NJ [u.a.] |b Addison-Wesley |c 2008 | |
300 | |a XXX, 699 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Management | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Service-oriented architecture (Computer science) | |
650 | 4 | |a Web services | |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 0 | 1 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Brown, Paul C. |e Sonstige |4 oth | |
856 | 4 | |m HBZ Datenaustausch |u https://bvbr.bib-bvb.de:443/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |z Inhaltsverzeichnis | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016321775 |
Record in the Search Index
_version_ | 1832361403057438720 |
---|---|
adam_text | |
adam_txt |
Contents
Preface.xxvii
PART I. Fundamentals . 1
Chapter 1: SOA and the Enterprise . 3
The Challenge . 4
The Concept of Total Architecture . 5
Architecture Is Structure for a Purpose . 6
Constant Changes . 7
Total Architecture Synthesis . 8
Making Total Architecture Work in Your Enterprise . 9
Key Overview Questions . 10
Chapter 2: Architecture Fundamentals . 11
Structural Organization . 11
Components . 12
Subcomponents . 13
Functional Organization . 15
Shared Resources . 16
Coping with Evolving Requirements . 17
The Temptation of Expediency . 18
Collaborative Behavior . 20
Activities . 20
Objects . 21
Communications . 23
Business Processes . 24
Total Architecture . 26
vu
vili Contents
Nonfunctional Requirements . 27
Refinement . 28
The Role of the Architect . 29
Enterprise Architecture . 30
Architecture Styles . 30
Patterns . 33
Summary . 34
Key Architecture Fundamentals Questions . 35
Suggested Reading . 36
Chapter 3: Service Fundamentals . 37
What Is a Service? . 37
Operations . 38
Referenced Objects . 39
Owned Objects .'. 40
Owning Relationships . 42
Managing Cached Information . 44
Service Interfaces . 47
Common Access Technology . 47
Common Data Representation Technology . 48
Common Data Semantics . 50
Common Operation Semantics . 52
Choosing the Level of Interface Commonality . 52
The Rationale Behind Services . 54
Service Reuse . 54
Interface Stability . 55
Service Evolution . 56
Summary . 58
Key Service Fundamentals Questions . 59
Suggested Reading . 60
Chapter 4: Using Services . 61
Service Interaction Patterns . 61
Synchronous Request-Reply . 61
Asynchronous Request-Reply . 62
Contents ix
Subscription . 64
Unsolicited Notification . 64
Interaction Pattern Summary . 66
Service Access . 67
Direct Service Access . 67
Variations in Direct Service Access . 68
Direct Access Limitations . 69
Message-Based Service Access . 70
Access Control . 72
Policy Enforcement Points . 73
Access Control with Proxies . 74
Access Control with a Mediation Service . 75
Service Request Routing . 76
Load Distribution . 76
Location-Based Routing . 78
Content-Based Routing . 78
Service Composition . 80
Hard-Wired Composition . 81
Nested Composition . 82
Cached Composites . 83
Locating Services . 85
Enterprise Architecture for Services . 86
Summary . 87
Key Service Utilization Questions . 88
Suggested Reading . 89
Chapter 5: The SOA Development Process . 91
What Is Different about SOA Development? . 91
The Overall Development Process . 92
Architecture Tasks . 94
Architecture in Context . 96
Total Architecture Synthesis (TAS) . 97
Defining the Initial Scope . 101
Defining the Requirements . 102
Designing the Business Process Architecture . 103
Contents
Designing the Systems Architecture . 104
Evaluating Architectures . 105
Beware of Look-Alike Processes! . 105
Manage Risk: Architect Iteratively . 106
Summary . 108
Key Development Process Questions . 108
Suggested Reading . 109
PART II. The Business Process Perspective . Ill
Chapter 6: Processes . 113
Triggers, Inputs, and Results . 114
Related Processes . 115
Process Maturity . 116
Continuous Processes . 119
Structured Processes . 120
Summary . 121
Key Process Questions . 122
Suggested Reading . 122
Chapter 7: Initial Project Scoping . 123
Assembling the Business Process Inventory . 124
Conducting Interviews . 125
Documenting the Inventory . 128
Goals and Stakeholders . 128
Primary Processes . 130
Related Processes . 133
Business Process Variants . 134
Process Metrics . 136
Ranking Business Processes . 141
The Ranking Scheme . 142
Combining the Scores . 145
Organizing the Remaining Work . 147
Summary . 149
Key Scoping Questions . 150
Contents xi
Chapter 8: The Artifice of Requirements . 151
Differentiation . 153
Differentiating Activities . 154
Differentiating Participants . 156
Design Is Differentiation . 157
Characterizing Processes . 159
Collaborations Represent Processes . 160
Collaboration Roles . 161
Participants May Be Unaware of their Roles . 163
Patterns of Interaction . 163
Use Case Descriptions . 164
Use Case Limitations . 164
UML Activity Diagrams . 165
The Interface Perspective . 169
Interaction Patterns Characterize Participants . 171
Requirements Reflect Design . 172
Requirements Specify Interaction Patterns . 172
Requirements Are Rarely Complete . 174
Summary . 175
Key Requirements Questions . 177
Suggested Reading . 178
Chapter 9: Business Process Architecture . 179
Results . 180
Participants and Their Roles . 182
Differentiating Participant Types and Roles . 183
Roles Often Require Role-Specific Activities . 185
Roles and Business Process Evolution . 185
Identifying and Understanding Roles . 185
Activities and Scenarios . 186
Scenarios and Variations . 187
Project Efficiency . 189
xii Contents
Modeling Scenarios . 191
Differentiating Participant Roles . 192
Assigning Activity Responsibilities . 193
Modeling Interactions . 198
Producer-Consumer Interactions . 198
Simultaneous Interactions . 199
Notational Shortcuts . 200
Scenario Variations . 201
Exception Handling . 203
How Much Detail Is Enough? . 204
Guidelines for Using Activity Diagrams . 206
Summary . 207
Key Business Process Architecture Questions . 208
Suggested Reading . 209
Chapter 10: Milestones . 211
Basic Process Milestones . 211
Variations in Milestone Sequences . 214
Grouped Milestones . 215
Recognizing Milestones Requires Design . 216
Using Milestones to Reduce Inter-Process Coupling . 217
Summary . 218
Key Milestone Questions . 219
Chapter 11: Process Constraints . 221
Business Process Constraints Drive System Constraints . 222
Performance Constraints . 224
Rates and Response Times . 224
Key Performance Indicators . 226
Performance Service-Level Agreements . 228
High Availability and Fault Tolerance . 231
Definition of Terms . 231
It's All Relative . 232
Investment versus Risk . 233
Contents xiii
Business Process Design Impacts Systems Investment 234
Focus on Risk . 235
Risk-Related Service-Level Agreements . 237
Security . 238
Reporting, Monitoring, and Management . 240
Reporting . 240
Monitoring . 241
Management . 241
Exception Handling . 242
Test and Acceptance . 243
Testing Can Impact System Design . 244
Testing Can Require Additional Components . 244
Testing Requires an Environment . 245
Compliance Constraints . 245
Summary . 246
Key Process Constraint Questions . 247
Suggested Reading . 248
Chapter 12: Related Processes . 249
Identifying Services . 252
Managing Shared State . 252
Refining the Service Definition . 254
Modeling Existing Processes . 257
Triggering Events . 258
Independent Processes . 260
Dependent Processes . 260
Towards Event-Driven Processes . 263
Summary . 264
Key Related Process Questions . 265
Chapter 13: Modeling the Domain . 267
UML Class Notation . 269
ATM Example Domain Model . 274
Reverse Engineering the Domain Model . 276
xiv Contents
Domain Modeling Summary . 277
Key Domain Modeling Questions . 279
Suggested Reading . 279
Chapter 14: Enterprise Architecture: Process and Domain
Modeling . 281
Process and Domain Modeling Responsibilities . 282
Establishing Standards and Best Practices . 283
Managing Process and Domain Knowledge Transfer . 285
Reviewing Project Models . 286
Maintaining the Business Process and Domain Model
Repository . 287
Defining Business Process Patterns . 288
Defining Common Data Model Representations . 288
Summary . 289
Key Enterprise Process and Domain Modeling
Questions . 290
PART III. The Systems Perspective . 291
Chapter 15: Systems Architecture Overview . 293
The Challenge of Architecting Distributed Systems . 294
Learning from the CORBA Experience . 294
Efficiently Exploring Architectures . 300
Sequencing Architecture Issues . 301
Periodic Architecture Evaluation . 302
Summary . 303
Key Systems Architecture Overview Questions . 304
Chapter 16: Top-Level Systems Architecture . 305
First-Cut Structure . 305
Initial Evaluation . 307
Communications and Modularization . 309
Communications Latency . 309
Communications Bandwidth . 310
Contents XV
Data Marshalling . 311
Geographic Distribution . 311
Consider Other Modularization Approaches . 311
Service Identification and Performance . 312
Modeling System Interactions . 312
Modeling Deployment . 318
Addressing Performance . 322
Peak Loads . 322
Response Times . 323
Response Time Test Specifications . 325
Early Architecture Evaluation . 325
Key Top-Level Systems Architecture Questions . 327
Suggested Reading . 328
PART IV. Communications . 329
Chapter 17: Transport . 331
Transport Technology . 332
Person-to-Person Interactions . 333
Human-to-System Transport . 334
System-to-System Transport . 334
Selecting Transports . 336
Messaging Server Topology . 340
Coping with Capacity Limitations . 341
Coping with Geographic Distribution . 342
Capacity . 345
Point-to-Point Interaction Patterns . 347
Point-to-Point Intermediaries . 348
Transport-Supplied Services . 350
Summary . 351
Key Transport Questions . 351
Suggested Reading . 352
xvi Contents
Chapter 18: Adapters . 353
API-Based Adapters . 354
Database-Based Adapters . 355
Combining API and Database Approaches . 356
File-Based Adapters . 357
Protocol-Based Adapters . 357
Documenting Adapter Usage . 358
Summary . 359
Key Adapter Questions . 360
Chapter 19: Enterprise Architecture: Communications . 361
Defining a Communications Strategy . 361
Interaction Standards . 362
Standardizing Adapters . 363
Summary . 364
Key Enterprise Architecture Communications
Questions . 364
PART V. Data and Operations . 367
Chapter 20: Data Challenges . 369
Chapter 21: Messages and Operations . 371
Message Semantics and Operation Names . 371
Message Semantics . 371
Operation Naming . 373
Transport Destinations and Operation Bundling . 374
Bundling Advantages . 374
Bundling Disadvantages . 375
Compromises . 375
Mediated Transports . 376
Content Representation . 377
Content Transformation . 378
Reference Data in Content Transformation . 380
Summary . 381
Key Messages and Operations Questions . 381
Contents xvii
Chapter 22: Data Consistency: Maintaining One Version
of the Truth . 383
Approaches to Maintaining Data Consistency . 384
Cached Data with a Single System of Record . 385
Coordinated Updates via Distributed Transactions . 390
Edit Anywhere, Reconcile Later . 390
Dealing with Data Inconsistencies . 391
Data Management Business Processes . 393
Summary . 394
Key Data Consistency Questions . 394
Suggested Reading . 395
Chapter 23: Common Data Models (CDM) . 397
What Is a Common Data Model? . 397
CDM Relationship to the Domain Model . 402
The Need for Multiple CDM Representations . 405
Planning for CDM Changes . 407
Schema Versioning . 408
Versioning with Additive Changes . 409
Schema Migration Governance . 410
When to Use Common Data Models . 411
Criteria for Choosing Direct Transformation . 413
Criteria for Choosing a Common Data Model . 414
Summary . 415
Key Common Data Model Questions . 416
Chapter 24: Identifiers (Unique Names) . 417
Identity (Unique Name) Authorities . 418
Hierarchical Identifiers . 419
Hierarchical Identifiers within the Enterprise . 420
UUIDs and GUIDs . 421
Coping with Identity Errors . 423
Consequences of Identity Errors . 424
Sources of Identity Errors . 424
Associating an Identifier with the Wrong Object . 425
xviii Contexts
Associating an Identifier with More than One
Real-World Object . 426
Multiple Identifiers for the Same Object . 429
Mapping Identifiers . 429
Correlating Identifiers . 431
Summary . 433
Key Identifier Questions . 434
Chapter 25: Results Validation . 435
Checking Enumerated Values . 436
Where and When to Validate . 437
Summary . 438
Key Data Validation Questions . 439
Chapter 26: Enterprise Architecture: Data . 441
Naming Schemes . 441
Architecting Content Transformation . 443
Systems of Record . 445
Common Data Models . 446
Identifiers . 447
Data Quality Management . 448
Summary . 449
Key Enterprise Architecture Data Questions . 450
PART VI. Coordination . 451
Chapter 27: Coordination and Breakdown Detection . 453
Activity Execution Management Patterns (AEMPs)
Involving Interactions . 454
Coordination Pattern Styles . 456
Fire-and-Eorget Coordination Patterns . 457
Event-Driven Two-Party Fire-and-Forget . 457
Event-Driven Multi-Party Fire-and-Forget . 457
Breakdown Detection in Fire-and-Forget . 457
Non-Event-Driven Fire-and-Forget . 459
Contents xix
Request-Reply Patterns . 460
Event-Driven Two-Party Request-Reply . 460
Reply-Time Service-Level Agreements . 461
Event-Driven Multi-Party Request-Reply . 462
Event-Driven Asynchronous Request-Reply . 463
Complexities in Asynchronous Request-Reply . 463
Synchronous Promise with Asynchronous Result . 464
Delegation . 465
Delegation with Confirmation . 467
Summary . 468
Key Coordination Questions . 469
Chapter 28: Transactions: Coordinating Two or More
Activities . 471
Two-Phase Commit Distributed Transactions . 472
Limitations of Two-Phase Commit Protocols . 475
Compensating Transactions . 476
Working around the Limitations of Compensating
Transactions . 476
Summary . 478
Key Transaction Questions . 479
Suggested Reading . 479
Chapter 29: Process Monitors and Managers . 481
Process Monitoring . 483
Minimizing the Impact of Monitoring Breakdowns . 484
The Process Manager as a Monitor . 485
Process Management Limitations . 486
Summary . 488
Key Process Monitoring and Management Questions . 488
Chapter 30: Detecting and Responding to Breakdowns . 489
Selecting Coordination Patterns to Improve Breakdown
Detection . 489
Responding to Breakdowns . 493
Recording Breakdowns . 493
XX Contents
Annunciating Breakdowns . 495
Responding to Breakdown Annunciations . 496
Recovering from Breakdowns . 500
Summary . 504
Key Breakdown Detection and Recovery Questions . 505
Chapter 31: Enterprise Architecture: Coordination . 507
Preferred Coordination Patterns . 507
Breakdown Recording . 509
Breakdown Annunciation . 510
Recovery Processes . 511
Summary . 511
Key Enterprise Coordination Questions . 512
PART VII. High Availability, Fault Tolerance, and
Load Distribution . 513
Chapter 32: High Availability and Fault Tolerance
Fundamentals . 515
Fault Tolerance Strategies . 516
Failure Detection Strategies . 517
Direct Component Monitoring . 517
Heartbeat Monitoring . 518
Liveness Checks . 519
Failover Management . 519
Redirecting Clients . 520
Summary . 522
Key High-Availability and Fault Tolerance Questions . 523
Chapter 33: Stateless and Stateful Failover . 525
Stateless and Stateful Components . 525
Stateless Failover . 525
Saving Work in Progress through Coordination . 526
Stateful Failover . 528
Storage Replication . 530
Synchronous Replication within a Component . 530
Contents xxi
Synchronous Replication between Components . 532
Asynchronous Replication and Data Loss . 535
Persistent-State Component Failover . 538
Summary . 540
Key Failover Questions . 541
Suggested Reading . 541
Chapter 34: Multiple Component Failover . 543
Intra-Site versus Inter-Site Failover . 543
Clustering: An Intra-Site Failover Technique . 545
Coordinating Peer Application Failover with
Asynchronous Replication . 546
Making a Business Process Fault-Tolerant . 548
Summary . 550
Key Multi-Component Failover Questions . 551
Chapter 35: Workload Distribution . 553
Work Assignment Strategies . 553
Distribution Management and Work Completion . 554
The Sequencing Problem . 556
Centralized Sequence Management . 556
Distributed Sequence Management . 557
Access to Shared Persistent State . 557
Geographic Workload Distribution . 558
Summary . 558
Key Workload Distribution Questions . 559
Chapter 36: Enterprise Architecture: Fault Tolerance,
High Availability, and Load Distribution . 561
Business Process Categorization . 563
Information Storage . 565
Individual Component and Service Failover Patterns . 565
Composite Patterns for FT and HA Services . 566
Composite Patterns for FT and HA Business Processes . 568
Summary . 568
xxii Contents
Key Enterprise Fault Tolerance, High-Availability, and
Load Distribution Questions . 569
Suggested Reading . 569
PART VIII. Completing the Architecture . 571
Chapter 37: Process Security . 573
Security Information Classification . 574
Identity and Authentication . 574
The Authentication Process . 574
Reference Data for Authentication . 576
Authorization . 576
The Granularity Problem . 577
Groups and Roles . 577
Group and Role Limitations . 578
Encryption . 579
Digital Signatures . 580
Other Security-Related Requirements . 580
Reference Data Servers and Performance . 581
Trust Zones . 582
Channel Enforcement . 583
Zone Enforcement and Policy Agents . 585
Multi-Zone Security . 586
Summary . 587
Key Security Questions . 588
Suggested Reading . 589
Chapter 38: Process Monitoring . 591
Performance Monitoring . 592
Monitoring at One Point . 592
Uncorrelated Monitoring at Two Points . 593
Correlated Monitoring at Two Points . 593
Monitoring Process Status . 594
Supervisory Processes . 595
The Impact of Monitoring on Performance . 596
Contents xxiii
Summary . 596
Key Process Monitoring Questions . 597
Chapter 39: Architecture Evaluation . 599
Usability . 600
Performance . 600
Component Resource Demand Analysis . 601
Estimating CPU Requirements . 604
Messaging and Disk Performance . 605
Deployment Load Analysis . 609
Evolving the Load Model . 610
Cost and Schedule Feasibility . 612
Observability . 613
Ability to Evolve . 613
Ability to Handle Stress Situations . 614
Summary . 615
Key Architecture Evaluation Questions . 616
Suggested Reading . 617
Chapter 40: Testing . 619
Unit Testing, Test Harnesses, and Regression Testing . 620
Integration Testing and Order of Assembly . 621
Environments for Functional and System Testing . 622
Performance Testing . 623
Making Capacity Measurements . 624
System Capacity Testing . 626
Failure Mode Testing . 627
Summary . 628
Key Testing Questions . 628
PART IX. Advanced Topics . 631
Chapter 41: Representing a Complex Process . 633
Eliding Communications Detail . 634
Eliding Participant Activity Details . 634
xxiv Contents
Eliding Supporting Participants . 636
Abstracting Subprocesses .,. 638
Summary . 639
Key Complex Process Representation Questions . 639
Chapter 42: Process Management and Workflow . 641
Process Management . 642
Process Management Goals . 642
The Management Process Is Not the Work Process! . 644
Maintaining Separation between Processes and Work 645
Styles of Work Assignment . 647
Work Queues and Work Assignments . 647
Initiating Workflow . 649
Making the Management Process Fault Tolerant . 649
Using Fault-Tolerant Workflow Engines . 651
Checkpointing the Management Process State . 653
Request-Reply Invocation of the Management
Process . 655
Hybrid Fault Tolerance Techniques . 655
Human Interfaces . 656
Work Assignment Responsibilities . 657
Data Responsibilities . 658
User Interface Failure Recovery . 659
Related Processes . 660
Prioritized Work . 663
Dynamic Work Assignments . 665
Dynamic Result and Process Definitions . 666
Representing a Design . 667
Specifying an Implementation Process . 667
Accommodating Subsequent Changes . 668
Summary . 668
Key Process Management and Workflow Questions . 669
Suggested Reading . 670
Contents xxv
Chapter 43: The Enterprise Architecture Group . 671
Half a Group Is Better than None—But Not Good
Enough . 672
Best Practice Development . 672
Knowledge Transfer . 673
Documentation . 674
Training . 674
Mentoring . 675
Governance . 675
Designing with Evolving Requirements . 675
Hierarchical Architectures . 677
Geographic Deployment . 679
Organizational Alignment . 680
Summary . 681
Key Enterprise Architecture Group Questions . 682
Afterword . 683
Focus Your Work . 683
Seek the Expertise of Others . 684
Be Pragmatic, But Consider the Long View . 685
Index . 687 |
any_adam_object | |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV023119273 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A73 |
callnumber-search | QA76.9.A73 |
callnumber-sort | QA 276.9 A73 |
callnumber-subject | QA - Mathematics |
classification_rvk | QP 345 SR 860 ST 230 ST 515 |
ctrlnum | (OCoLC)172980368 (DE-599)BVBBV023119273 |
dewey-full | 004.2/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.2/2 |
dewey-search | 004.2/2 |
dewey-sort | 14.2 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV023119273</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100202</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080208s2008 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780321504722</subfield><subfield code="9">978-0-321-50472-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0321504720</subfield><subfield code="9">0-321-50472-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)172980368</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023119273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-N2</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A73</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.2/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 515</subfield><subfield code="0">(DE-625)143677:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing SOA</subfield><subfield code="b">total architecture in practice</subfield><subfield code="c">Paul C. Brown</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 699 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Service-oriented architecture (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brown, Paul C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">HBZ Datenaustausch</subfield><subfield code="u">https://bvbr.bib-bvb.de:443/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="z">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016321775</subfield></datafield></record></collection> |
id | DE-604.BV023119273 |
illustrated | Illustrated |
index_date | 2024-07-02T19:50:58Z |
indexdate | 2025-05-17T10:00:08Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016321775 |
oclc_num | 172980368 |
open_access_boolean | |
owner | DE-20 DE-N2 DE-522 |
owner_facet | DE-20 DE-N2 DE-522 |
physical | XXX, 699 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Implementing SOA total architecture in practice Paul C. Brown 1. print. Upper Saddle River, NJ [u.a.] Addison-Wesley 2008 XXX, 699 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Unternehmen (DE-588)4061963-1 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 s Unternehmen (DE-588)4061963-1 s DE-604 Brown, Paul C. Sonstige oth HBZ Datenaustausch https://bvbr.bib-bvb.de:443/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Implementing SOA total architecture in practice Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Unternehmen (DE-588)4061963-1 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd |
subject_GND | (DE-588)4061963-1 (DE-588)4841015-9 |
title | Implementing SOA total architecture in practice |
title_auth | Implementing SOA total architecture in practice |
title_exact_search | Implementing SOA total architecture in practice |
title_exact_search_txtP | Implementing SOA total architecture in practice |
title_full | Implementing SOA total architecture in practice Paul C. Brown |
title_fullStr | Implementing SOA total architecture in practice Paul C. Brown |
title_full_unstemmed | Implementing SOA total architecture in practice Paul C. Brown |
title_short | Implementing SOA |
title_sort | implementing soa total architecture in practice |
title_sub | total architecture in practice |
topic | Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Unternehmen (DE-588)4061963-1 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd |
topic_facet | Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Serviceorientierte Architektur |
url | https://bvbr.bib-bvb.de:443/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT brownpaulc implementingsoatotalarchitectureinpractice |