Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

Software Fortresses: Modeling Enterprise Architectures

by: Roger Sessions

Notify me when in stock

On-line Price: $59.95 (includes GST)

Paperback package 304

20%Off Retail Price

You save: $15.00

OUT OF PRINT. But we may be able to find a copy for you! Please contact Bookware customer service for availability.

Retail Price: $74.95

Publisher: ,Feb-2003


ISBN: 0321166086
ISBN13: 9780321166081

Add to Shopping Cart


      This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed treaty relationships.

  The software fortress model is an intuitive, simple, expressive approach that maps readily to existing technologies such as .NET and Java 2 Enterprise Edition (J2EE). This book is designed to meet an immediate need to define, clarify, and explain the basics of this new modeling methodology for large enterprise software architectures.

  Software Fortresses is your essential roadmap to all aspects of software fortresses.

  Key topics include:

  The fundamental concepts and terminology of software fortresses

Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams)

The proper use of drawbridges to provide fortress interoperability

The innovative software fortress model for enterprise security

Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies in.

The role of loosely coupled and tightly coupled transactions in a software fortress architecture

Design and technology issues associated with the six major software fortress types

This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation.


  Author Bio

      Roger Sessions is one of the world's leading experts in enterprise software architectures and the developer of the software fortress model. He has written six books and dozens of articles. He writes and publishes ObjectWatch, a widely read, highly regarded newsletter covering hotly debated topics on high-end software technologies. More than 50,000 people have attended his architect-level workshops in more than 30 countries.


Table of Contents


The Software Fortress Model.

Who Cares about Software Fortresses?

The Goals of This Book.

Who Should Read This Book.

The History of the Software Fortress Model.

The Organization of This Book.


About the Author.

1. Introduction.


Software Fortress Organization.

Typical Technologies.

The Fortress as a Trust Boundary.

The Main Fortress Types.

Treaty Relationships.

The Fortress as a Unit of Interoperability.

Objects, Components, and Fortresses.


      2. Diagramming Software Fortresses.

  Basic Software Fortress Diagram.

Fortress-Ally Diagram.

Treaty-Ally Diagram.

Sequence-Ally Diagram.

Fortress-Ally-Responsibility Cards.

Treaty-Ally-Responsibility Cards.

Fortress Overview Document.

Treaty Overview Document.


      3. Transactions.

  Transactionally Aware Resources.

Tightly Coupled Single-Resource Transactions.

Multiple-Resource Transactions.

  Loosely Coupled Multiple-Resource Transactions.

Tightly Coupled Multiple-Resource Transactions.

      The Distributed Transaction Coordinator.


      4. Drawbridges.

  Drawbridge Overview.


      5. Synchronous Drawbridges.


Homogeneous Synchronous Drawbridges.

Heterogeneous Synchronous Drawbridges.


      6. Asynchronous Drawbridges.

  Message Queues.

Implementation of Asynchronous Drawbridges.

Persistence and Transactions in Queues.

Heterogeneous Asynchronous Drawbridges.

Homogeneous Asynchronous Drawbridges.

Advantages of Asynchronous Drawbridges

  Nonblocking Workflow.


Workload Averaging.

Poor-Man's Clustering.

      Performance Problems of Asynchronous Drawbridges.


      7. Guards and Walls.










      8. Treaties.

  A Treaty between Two Fortresses.

Treaty Considerations.


      9. General Fortress Issues.





      10. Internet Fortresses.

  Presentation Fortresses.

  J2EE versus the .NET Approach.





      Web Service Fortresses.

  J2EE versus the .NET Approach.

Technology Overview.

SOAP Problems.






      11. Business Application Fortresses.

  Foundation: Components and COMWare.

  State Management.

Transaction Boundary Management.

State Management Revisited.

      Leveraging Clusters.

.NET versus the J2EE Approach.


Platform Support.



      12. Legacy, Service, and Treaty Management Fortresses.

  Legacy Fortresses.

Service Fortresses

  Broadcast Service Fortresses.

Data-Sharing Fortresses.

Security Fortresses.

Loosely Coupled Transaction Management Service Fortresses.

      Treaty Management Fortresses.


      13. Software Fortress Design Review.

  Group One: Enterprise Overview Questions.

Question 1: Do we need a software fortress architecture?

Question 2: Do we all have the same understanding of the software fortress methodology?

Question 3: Have the requirements for each fortress been clearly articulated?

Question 4: Have our fortresses been partitioned with organizational boundaries in mind?

Question 5: Are our fortresses organized around natural trust boundaries?

Question 6: Have we really made enterprise-level decisions at the enterprise level and fortress-level decisions at the fortress level?

Question 7: Have we confused objects, components, and fortresses?

Question 8: Have we identified all of the security issues?

Group Two: Enterprise Architecture Questions.

Question 9: Do we have the right number of fortresses?

Question 10: Are all drawbridge requests idempotent?

Question 11: Are all drawbridge requests for substantial work?

Question 12: Do we have any tightly coupled transactions across fortresses?

Question 13: Are all drawbridges heterogeneous asynchronous?

Question 14: Does all interfortress communication pass through drawbridges?

Question 15: Have we considered all of the risk factors inherent in our presentation and Web service fortresses?

Group Three: Fortress Architecture Questions.

Question 16: Are we considering fortress-appropriate technologies?

Question 17: If we must use a synchronous drawbridge, do we have an asynchronous back end?

Question 18: Are we using more than one technology base within a single fortress?

Question 19: Have we designed a scale-out architecture?

Question 20: Have we designed a fortress architecture that can leverage loosely coupled clusters for reliability?

Question 21: Have we designed adequate security for each of our guards?

Question 22: Have we built effective walls around the fortress?

Question 23: Are we using only homogeneous synchronous communications within the fortress?

Question 24: Do all of our outgoing communications pass through envoys?

Question 25: Is all of our data being stored in the data strongbox?


      14. Case Study.

  The Problem.

First-Pass Design.

Second-Pass Design.

The ProcessOrder Drawbridges.

The CheckInventory Drawbridges.



      15. Postlude.

  Ten Important Points about Software Fortresses.

Ten Reasons to Adopt the Software Fortress Model.

Ten Rules for Software Fortress Design.

Ten Controversial Ideas within the Software Fortress Model.

Ten Considerations for Evaluating J2EE versus .NET.

Ten Observations on the State of the Software Industry.

Where to Go Next.

Final Words.


Index. 0321166086T01292003