Patterns of enterprise application architecture:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Munich [u.a.]
Addison-Wesley
2008
|
Ausgabe: | [Nachdr.] |
Schriftenreihe: | The Addison-Wesley signature series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index. - Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | XXIV, 533 S. graph. Darst. |
ISBN: | 0321127420 9780321127426 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035478699 | ||
003 | DE-604 | ||
005 | 20121121 | ||
007 | t | ||
008 | 090508s2008 xxud||| |||| 00||| eng d | ||
020 | |a 0321127420 |9 0-321-12742-0 | ||
020 | |a 9780321127426 |9 978-0-321-12742-6 | ||
035 | |a (OCoLC)315935873 | ||
035 | |a (DE-599)BVBBV035478699 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-29T |a DE-83 |a DE-N2 |a DE-525 |a DE-863 |a DE-20 | ||
082 | 0 | |a 005.1 | |
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
084 | |a ST 505 |0 (DE-625)143675: |2 rvk | ||
084 | |a ST 515 |0 (DE-625)143677: |2 rvk | ||
084 | |a ST 610 |0 (DE-625)143683: |2 rvk | ||
084 | |a WIR 523f |2 stub | ||
100 | 1 | |a Fowler, Martin |d 1963- |e Verfasser |0 (DE-588)115868321 |4 aut | |
245 | 1 | 0 | |a Patterns of enterprise application architecture |c Martin Fowler |
250 | |a [Nachdr.] | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Addison-Wesley |c 2008 | |
300 | |a XXIV, 533 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Addison-Wesley signature series | |
500 | |a Includes bibliographical references and index. - Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Objektorientierung |0 (DE-588)4346172-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a EAI |0 (DE-588)4692639-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Entwurfsmuster |0 (DE-588)4546895-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systementwicklung |0 (DE-588)4126945-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | 2 | |a Systementwicklung |0 (DE-588)4126945-7 |D s |
689 | 0 | 3 | |a Objektorientierung |0 (DE-588)4346172-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a EAI |0 (DE-588)4692639-2 |D s |
689 | 1 | 1 | |a Entwurfsmuster |0 (DE-588)4546895-3 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a EAI |0 (DE-588)4692639-2 |D s |
689 | 2 | 1 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017398273&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017398273 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
DE-BY-863_location | 1000 1340 |
---|---|
DE-BY-FWS_call_number | 1000/ST 505 F787st 1340/ST 505 F787 |
DE-BY-FWS_katkey | 435126 |
DE-BY-FWS_media_number | 083101216570 083101276481 |
_version_ | 1806176420194418688 |
adam_text | Contents
Preface
....................................................xvii
Who This Book Is For
..................................xx
Acknowledgments
.....................................xxi
Colophon
...........................................xxiii
Introduction
..................................................1
Architecture
...........................................1
Enterprise Applications
...................................2
Kinds of Enterprise Application
............................5
Thinking About Performance
..............................6
Patterns
..............................................9
The Structure of the Patterns
...........................11
Limitations of These Patterns
...........................13
PART
1:
The Narratives
..................................15
Chapter
1:
Layering
........................................... 17
The Evolution of Layers in Enterprise Applications
............ 18
The Three Principal Layers
............................... 19
Choosing Where to Run Your Layers
....................... 22
Chapter
2:
Organizing Domain Logic
..............................25
Making a Choice
......................................29
Service Layer
.........................................30
Chapter
3:
Mapping to Relational Databases
........................33
Architectural Patterns
...................................33
The Behavioral Problem
.................................38
VII
Contents
Reading in Data
........................................40
Structural Mapping Patterns
..............................41
Mapping Relationships
................................41
Inheritance
..........................................45
Building the Mapping
...................................47
Double Mapping
.....................................48
Using Metadata
........................................49
Database Connections
...................................50
Some Miscellaneous Points
...............................52
Further Reading
........................................53
Chapter
4:
Web Presentation
.................................... 55
View Patterns
..........................................58
Input Controller Patterns
.................................61
Further Reading
........................................61
Chapter
5:
Concurrency (by Martin Fowler and David Rice)
............ 63
Concurrency Problems
...................................64
Execution Contexts
.....................................65
Isolation and Immutability
................................66
Optimistic and Pessimistic Concurrency Control
...............67
Preventing Inconsistent Reads
...........................68
Deadlocks
..........................................70
Transactions
...........................................71
ACID
................................................71
Transactional Resources
...............................72
Reducing Transaction Isolation for Liveness
................73
Business and System Transactions
........................74
Patterns for Offline Concurrency Control
....................76
Application Server Concurrency
............................78
Further Reading
........................................80
Chapter
6:
Session State
........................................ 81
The Value of Statelessness
................................81
Session State
...........................................83
Ways to Store Session State
...............................84
Chapter
7:
Distribution Strategies
................................ 87
The Allure of Distributed Objects
..........................87
Remote and Local Interfaces
..............................88
Contents
Where You Have to Distribute
............................90
Working with the Distribution Boundary
....................91
Interfaces for Distribution
...............................92
Chapter
8:
Putting It All Together
................................95
Starting with the Domain Layer
...........................96
Down to the Data Source Layer
...........................97
Data Source for Transaction Script
(110)..................97
Data Source for Table Module
(125) .....................98
Data Source for Domain Model
(116) ....................98
The Presentation Layer
..................................99
Some Technology-Specific Advice
.........................100
Java and J2EE
.....................................100
.NET
............................................101
Stored Procedures
...................................102
Web Services
.......................................103
Other Layering Schemes
................................103
PART
2:
The Patterns
...................................107
Chapter
9:
Domain Logic Patterns
............................... 109
Transaction Script
..................................... 110
How It Works
..................................... 110
When to Use It
.....................................
Ill
The Revenue Recognition Problem
...................... 112
Example: Revenue Recognition (Java)
................... 113
Domain Model
....................................... 116
How It Works
..................................... 116
When to Use It
..................................... 119
Further Reading
.................................... 119
Example: Revenue Recognition (Java)
................... 120
Table Module
........................................ 125
How It Works
..................................... 126
When to Use It
..................................... 128
Example: Revenue Recognition with a Table Module (C#)
.... 129
Service Layer (by Randy Stafford)
......................... 133
How It Works
..................................... 134
When to Use It
..................................... 137
▼
У
Contents
Further Reading
.....................................137
Example: Revenue Recognition (Java)
....................138
Chapter
10:
Data Source Architectural Patterns
..................... 143
Table Data Gateway
...................................144
How It Works
......................................144
When to Use It
......................................145
Further Reading
.....................................146
Example: Person Gateway (C#)
.........................146
Example: Using ADO.NET Data Sets (C#)
................148
Row Data Gateway
....................................152
How It Works
......................................152
When to Use It
......................................153
Example: A Person Record (Java)
.......................155
Example: A Data Holder for a Domain Object (Java)
........158
Active Record
........................................160
How It Works
......................................160
When to Use It
......................................161
Example: A Simple Person (Java)
........................162
Data Mapper
.........................................165
How It Works
......................................165
When to Use It
......................................170
Example: A Simple Database Mapper (Java)
...............171
Example: Separating the Finders (Java)
...................176
Example: Creating an Empty Object (Java)
................179
Chapter
11:
Object-Relational Behavioral Patterns
.................. 183
Unit of Work
.........................................184
How It Works
......................................184
When to Use It
......................................189
Example: Unit of Work with Object Registration (Java)
(by David Rice)
...................................190
Identity Map
.........................................195
How It Works
......................................195
When to Use It
......................................198
Example: Methods for an Identity Map (Java)
..............198
Contents
Lazy Load
...........................................200
How It Works
.....................................200
When to Use It
.....................................203
Example: Lazy Initialization (Java)
......................203
Example: Virtual Proxy (Java)
.........................203
Example: Using a Value Holder (Java)
...................205
Example: Using Ghosts (C#)
..........................206
Chapter
12:
Object-Relational Structural Patterns
...................215
Identity Field
........................................216
How It Works
.....................................216
When to Use It
.....................................220
Further Reading
....................................221
Example: Integral Key (C#)
...........................221
Example: Using a Key Table (Java)
......................222
Example: Using a Compound Key (Java)
.................224
Foreign Key Mapping
..................................236
How It Works
.....................................236
When to Use It
.....................................239
Example: Single-Valued Reference (Java)
.................240
Example: Multitable Find (Java)
.......................243
Example: Collection of References (C#)
..................244
Association Table Mapping
.............................248
How It Works
.....................................248
When to Use It
.....................................249
Example: Employees and Skills (C#)
.....................250
Example: Using Direct SQL (Java)
......................253
Example: Using a Single Query for Multiple Employees (Java)
(by Matt Foemmel and Martin Fowler)
.................256
Dependent Mapping
...................................262
How It Works
.....................................262
When to Use It
.....................................263
Example: Albums and Tracks (Java)
.....................264
Embedded Value
......................................268
How It Works
.....................................268
When to Use It
.....................................268
У
▼
Contents
Further Reading
.....................................270
Example: Simple Value Object (Java)
.....................270
Serialized LOB
........................................272
How It Works
......................................272
When to Use It
......................................274
Example: Serializing a Department Hierarchy in
XML (Java)
......................................274
Single Table Inheritance
.................................278
How It Works
......................................278
When to Use It
......................................279
Example: A Single Table for Players (C#)
..................280
Loading an Object from the Database
....................281
Class Table Inheritance
.................................285
How It Works
......................................285
When to Use It
......................................286
Further Reading
.....................................287
Example: Players and Their Kin (C#)
.....................287
Concrete Table Inheritance
..............................293
How It Works
......................................293
When to Use It
......................................295
Example: Concrete Players (C#)
........................296
Inheritance Mappers
...................................302
How It Works
......................................303
When to Use It
......................................304
Chapter
13:
Object-Relational Metadata Mapping Patterns
........... 305
Metadata Mapping
....................................306
How It Works
......................................306
When to Use It
......................................308
Example: Using Metadata and Reflection (Java)
............309
Query Object
.........................................316
How It Works
......................................316
When to Use It
......................................317
Further Reading
.....................................318
Example: A Simple Query Object (Java)
..................318
Contents
Repository (by Edward Hieatt and Rob
Mee)
................ 322
How It Works
..................................... 323
When to Use It
..................................... 324
Further Reading
.................................... 325
Example: Finding a Person s Dependents (Java)
............ 325
Example: Swapping Repository Strategies (Java)
........... 326
Chapter
14:
Web Presentation Patterns
............................329
Model View Controller
.................................330
How It Works
.....................................330
When to Use It
.....................................332
Page Controller
.......................................333
How It Works
.....................................333
When to Use It
.....................................334
Example: Simple Display with
a Serviet
Controller
and a JSP View (Java)
.............................335
Example: Using a JSP as a Handler (Java)
................337
Example: Page Handler with a Code Behind (C#)
..........340
Front Controller
......................................344
How It Works
.....................................344
When to Use It
.....................................346
Further Reading
....................................347
Example: Simple Display (Java)
........................347
Template View
.......................................350
How It Works
.....................................351
When to Use It
.....................................354
Example: Using a JSP as a View with a Separate
Controller (Java)
.................................355
Example: ASP.NET Server Page (C#)
....................357
Transform View
......................................361
How It Works
.....................................361
When to Use It
.....................................362
Example: Simple Transform (Java)
......................363
Two Step View
.......................................365
How It Works
.....................................365
When to Use It
.....................................367
Contents
Example: Two Stage XSLT (XSLT)
......................371
Example: JSP and Custom Tags (Java)
....................374
Application Controller
..................................379
How It Works
......................................380
When to Use It
......................................381
Further Reading
.....................................382
Example: State Model Application Controller (Java)
.........382
Chapter
15:
Distribution Patterns
............................... 387
Remote Facade
........................................388
How It Works
......................................389
When to Use It
......................................392
Example: Using a Java Session Bean as a Remote Facade (Java)
392
Example: Web Service (C#)
............................395
Data Transfer Object
...................................401
How It Works
......................................401
When to Use It
......................................406
Further Reading
.....................................407
Example: Transferring Information About Albums (Java)
.....407
Example: Serializing Using XML (Java)
...................411
Chapter
16:
Offline Concurrency Patterns
......................... 415
Optimistic Offline Lock (by David Rice)
.....................416
How It Works
......................................417
When to Use It
......................................420
Example: Domain Layer with Data Mappers
(165)
(Java)
.....421
Pessimistic Offline Lock (by David Rice)
.....................426
How It Works
......................................427
When to Use It
......................................431
Example: Simple Lock Manager (Java)
...................431
Coarse-Grained Lock (by David Rice and Matt Foemmel)
.......438
How It Works
......................................438
When to Use It
......................................441
Example: Shared Optimistic Offline Lock
(416)
(Java)
.......441
Example: Shared Pessimistic Offline Lock
(426)
(Java)
.......446
Example: Root Optimistic Offline Lock
(416)
(Java)
........447
Contents
Implicit Lock (by David Rice)
............................449
How It Works
.....................................450
When to Use It
.....................................451
Example: Implicit Pessimistic Offline Lock
(426)
(Java)
......451
Chapter
17:
Session State Patterns
............................... 455
Client Session State
.................................... 456
How It Works
..................................... 456
When to Use It
..................................... 457
Server Session State
.................................... 458
How It Works
..................................... 458
When to Use It
..................................... 460
Database Session State
................................. 462
How It Works
..................................... 462
When to Use It
..................................... 464
Chapter
18:
Base Patterns
......................................465
Gateway
............................................466
How It Works
.....................................466
When to Use It
.....................................467
Example: A Gateway to a Proprietary Messaging
Service (Java)
....................................468
Mapper
.............................................473
How It Works
.....................................473
When to Use It
.....................................474
Layer
Supertype
......................................475
How It Works
.....................................475
When to Use It
.....................................475
Example: Domain Object (Java)
........................475
Separated Interface
....................................476
How It Works
.....................................477
When to Use It
.....................................478
Registry
............................................480
How It Works
.....................................480
When to Use It
.....................................482
▼
Contents
Example: A Singleton Registry (Java)
....................483
Example: Thread-Safe Registry (Java)
(by Matt Foemmel and Martin Fowler)
.................484
Value Object
.........................................486
How It Works
......................................486
When to Use It
......................................487
Money
..............................................488
How It Works
......................................488
When to Use It
......................................490
Example: A Money Class (Java)
(by Matt Foemmel and Martin Fowler)
.................491
Special Case
..........................................496
How It Works
......................................497
When to Use It
......................................497
Further Reading
.....................................497
Example: A Simple Null Object (C#)
.....................498
Plugin
(by David Rice and Matt Foemmel)
...................499
How It Works
......................................499
When to Use It
......................................500
Example: An Id Generator (Java)
........................501
Service Stub (by David Rice)
..............................504
How It Works
......................................504
When to Use It
......................................505
Example: Sales Tax Service (Java)
.......................505
Record Set
...........................................508
How It Works
......................................508
When to Use It
......................................510
References
................................................. 511
Index
......................................................517
|
any_adam_object | 1 |
author | Fowler, Martin 1963- |
author_GND | (DE-588)115868321 |
author_facet | Fowler, Martin 1963- |
author_role | aut |
author_sort | Fowler, Martin 1963- |
author_variant | m f mf |
building | Verbundindex |
bvnumber | BV035478699 |
classification_rvk | QH 500 ST 505 ST 515 ST 610 |
classification_tum | WIR 523f |
ctrlnum | (OCoLC)315935873 (DE-599)BVBBV035478699 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
edition | [Nachdr.] |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02675nam a2200637zc 4500</leader><controlfield tag="001">BV035478699</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121121 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090508s2008 xxud||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321127420</subfield><subfield code="9">0-321-12742-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321127426</subfield><subfield code="9">978-0-321-12742-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)315935873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035478699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-N2</subfield><subfield code="a">DE-525</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 505</subfield><subfield code="0">(DE-625)143675:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 515</subfield><subfield code="0">(DE-625)143677:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 610</subfield><subfield code="0">(DE-625)143683:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fowler, Martin</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)115868321</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Patterns of enterprise application architecture</subfield><subfield code="c">Martin Fowler</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[Nachdr.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 533 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Addison-Wesley signature series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Objektorientierung</subfield><subfield code="0">(DE-588)4346172-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">EAI</subfield><subfield code="0">(DE-588)4692639-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Entwurfsmuster</subfield><subfield code="0">(DE-588)4546895-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systementwicklung</subfield><subfield code="0">(DE-588)4126945-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Systementwicklung</subfield><subfield code="0">(DE-588)4126945-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Objektorientierung</subfield><subfield code="0">(DE-588)4346172-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">EAI</subfield><subfield code="0">(DE-588)4692639-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Entwurfsmuster</subfield><subfield code="0">(DE-588)4546895-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">EAI</subfield><subfield code="0">(DE-588)4692639-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017398273&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017398273</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV035478699 |
illustrated | Illustrated |
indexdate | 2024-08-01T11:21:01Z |
institution | BVB |
isbn | 0321127420 9780321127426 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017398273 |
oclc_num | 315935873 |
open_access_boolean | |
owner | DE-29T DE-83 DE-N2 DE-525 DE-863 DE-BY-FWS DE-20 |
owner_facet | DE-29T DE-83 DE-N2 DE-525 DE-863 DE-BY-FWS DE-20 |
physical | XXIV, 533 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Addison-Wesley |
record_format | marc |
series2 | The Addison-Wesley signature series |
spellingShingle | Fowler, Martin 1963- Patterns of enterprise application architecture Softwareentwicklung (DE-588)4116522-6 gnd Objektorientierung (DE-588)4346172-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Unternehmen (DE-588)4061963-1 gnd EAI (DE-588)4692639-2 gnd Entwurfsmuster (DE-588)4546895-3 gnd Systementwicklung (DE-588)4126945-7 gnd |
subject_GND | (DE-588)4116522-6 (DE-588)4346172-4 (DE-588)4139375-2 (DE-588)4061963-1 (DE-588)4692639-2 (DE-588)4546895-3 (DE-588)4126945-7 |
title | Patterns of enterprise application architecture |
title_auth | Patterns of enterprise application architecture |
title_exact_search | Patterns of enterprise application architecture |
title_full | Patterns of enterprise application architecture Martin Fowler |
title_fullStr | Patterns of enterprise application architecture Martin Fowler |
title_full_unstemmed | Patterns of enterprise application architecture Martin Fowler |
title_short | Patterns of enterprise application architecture |
title_sort | patterns of enterprise application architecture |
topic | Softwareentwicklung (DE-588)4116522-6 gnd Objektorientierung (DE-588)4346172-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Unternehmen (DE-588)4061963-1 gnd EAI (DE-588)4692639-2 gnd Entwurfsmuster (DE-588)4546895-3 gnd Systementwicklung (DE-588)4126945-7 gnd |
topic_facet | Softwareentwicklung Objektorientierung Anwendungssystem Unternehmen EAI Entwurfsmuster Systementwicklung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017398273&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT fowlermartin patternsofenterpriseapplicationarchitecture |
Inhaltsverzeichnis
THWS Würzburg Zentralbibliothek Lesesaal
Signatur: |
1000 ST 505 F787st |
---|---|
Exemplar 1 | ausleihbar Verfügbar Bestellen |
Würzburg Teilbibliothek SHL, Raum I.2.11
Signatur: |
1340 ST 505 F787 |
---|---|
Exemplar 1 | nicht ausleihbar Verfügbar |