Medium 9781457167621

Intermediate Software Architecture

Views: 1048
Ratings: (0)

This is the second in a series of three tutorials that access learning resources available from Safari Books Online that cover the skills that Software Architects need to be fluent in. This tutorial contains fourteen topics that range from core project requirements, to cost and time estimates, to important aspects like security, development and deployment activities. Each topic lists its objectives along with the estimated time required to read each resource covered by the topic. Complete this tutorial and you will be well on your way to understanding what is required to transition from an entry level software architect to a software architect manager.

List price: $0.00

 

14 Slices

Format Buy Remix

1. TOPIC: REQUIREMENTS VIEWPOINT

ePub

 

2. TOPIC: FUNCTIONAL VIEWPOINT

ePub

 

3. TOPIC: INFORMATION VIEWPOINT

ePub

 

4. TOPIC: CONCURRENCY VIEWPOINT

ePub

 

5. TOPIC: DEVELOPMENT VIEWPOINT

ePub

[00h 30m]

Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development, 3rd Edition, by Craig Larman, Prentice Hall

[01h 10m]

Head First Design Patterns, by Eric T Freeman; Elisabeth Robson; Bert Bates; Kathy Sierra, OReilly Media, Inc.

[00h 40m]

Jenkins: The Definitive Guide, by John Ferguson Smart, OReilly Media, Inc.

[00h 25m]

Pro Agile .NET Development with Scrum, by Jerrel Blankenship; Matthew Bussa; Scott Millett, Apress

[00h 25m]

IBM Rational ClearCase, Ant, and CruiseControl: The Java Developers Guide to Accelerating and Automating the Build Process, by Kevin A. Lee, IBM Press

[02h 00m]

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation, by Jez Humble; David Farley, Addison-Wesley Professional

[02h 15m]

Systems Analysis and Design with UML, 4th Edition, by Alan Dennis; Barbara Haley Wixom; David Tegarden, John Wiley & Sons

[01h 40m]

The Art of Agile Development, by James Shore; Chromatic, OReilly Media, Inc.

 

6. TOPIC: DEPLOYMENT VIEWPOINT

ePub

 

7. TOPIC: OPERATIONAL VIEWPOINT

ePub

[01h 00m]

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives, 2nd Edition, by Nick Rozanski; Eoin Woods, Addison-Wesley Professional

[02h 50m]

Practical Data Migration, by John Morris, British Informatics Society Limited

[00h 40m]

Performance Testing Microsoft .NET Web Applications, by MICROSOFT ACE TEAM, Microsoft Press

[01h 30m]

Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, 2nd Edition, by Hung Q. Nguyen; Bob Johnson; Michael Hackett, John Wiley & Sons

[01h 30m]

Software Performance and Scalability: A Quantitative Approach, by Henry H. Liu, Wiley-Blackwell

[02h 30m]

High Performance MySQL, by Baron Schwartz; Peter Zaitsev; Vadim Tkachenko, OReilly Media, Inc.

[02h 40m]

Pro SharePoint 2010 Disaster Recovery and High Availability, by Stephen Cummins, Apress

[00h 15m]

Business Continuity Management: In Practice, by Stuart Hotchkiss, British Informatics Society Limited

[00h 40m]

Incident Response & Computer Forensics, 2nd Edition, by Kevin Mandia; Chris Prosise, McGraw-Hill Osborne Media

 

8. TOPIC: VALIDATION VIEWPOINT

ePub

 

9. TOPIC: SECURITY PERSPECTIVE

ePub

[01h 30m]

Web Application Security, by Bryan Sullivan; Vincent Liu, McGraw-Hill

[01h 00m]

Jenkins Continuous Integration Cookbook, by Alan Berg, Packt Publishing

[00h 50m]

Security Strategies in Web Applications and Social Networking, by Mike Harwood; Marcus Goncalves; Mathew Pemble, Jones & Bartlett Learning

[00h 45m]

BackTrack 4: Assuring Security by Penetration Testing, by Shakeel Ali; Tedi Heriyanto, Packt Publishing

[01h 00m]

AAA Identity Management Security, by Vivek Santuka; Premdeep Banga; Brandon J. Carroll, Cisco Press

[00h 45m]

Oracle Identity and Access Manager 11g for Administrators, by Atul Kumar, Packt Publishing

[00h 30m]

Identity Management: A Primer, by Graham Williamson; David Yip; Ilan Sharni; Kent Spaulding, MC Press

[04h 00m]

Enterprise Security Architecture Using IBM Tivoli Security Solutions, by Axel Buecker; Ana Veronica Carreno; Norman Field; Christopher Hockings; Daniel Kawer; Sujit Mohanty; Guilherme Monteiro, IBM Redbooks

[02h 30m]

Fundamentals of Information Systems Security, by David Kim, Jones & Bartlett Learning

 

10. TOPIC: PERFORMANCE & SCALABILITY PERSPECTIVE

ePub

 

11. TOPIC: AVAILABILITY AND RESILIENCE PERSPECTIVE

ePub

[00h 30m]

Software Architecture in Practice, Third Edition, by Len Bas; Paul Clements; Rick Kazman, Addison-Wesley

[01h 30m]

High Availability in WebSphere Messaging Solutions, by Bharat Bhushan; Sook Chua; Carolyn Elkins; Mark Scicluna; Wei-Dong Yang, IBM Redbooks

[01h 10m]

Creating Highly Available Database Solutions: Oracle Real Application Clusters (RAC) and Sun Cluster 3.x Software, by Kristien Hens; Michael Loebmann, Prentice Hall

[00h 20m]

Developing Real World Software, by Richard Schlesinger, Jones & Bartlett Learning

[01h 20m]

Patterns for Fault Tolerant Software, by Robert S. Hanmer, John Wiley & Sons

[00h 50m]

LargeScale Distributed Computing and Applications: Models and Trends, by Valentin Cristea; Ciprian Dobre; Corina Stratan; Florin Pop, IGI Global

[01h 20m]

CISSP Exam Cram, Second Edition, by Michael Gregg, Pearson Certification

[01h 40m]

Windows Server 2008 Unleashed, by Rand Morimoto Ph.D.; Michael Noel; Omar Droubi; Ross Mistry; Chris Amaris, Sams

[01h 20m]

Mission-Critical and Safety-Critical Systems Handbook, by Kim Fowler, Newnes

 

12. TOPIC: REGULATION PERSPECTIVE

ePub

 

13. TOPIC: EVOLUTION PERSPECTIVE

ePub

 

14. TOPIC: RESOURCE AND COST PERSPECTIVE

ePub

 

Details

Print Book
E-Books
Slices

Format name
ePub
Encrypted
No
Sku
9781457167638
Isbn
9781457167638
File size
0 Bytes
Printing
Not Allowed
Copying
Not Allowed
Read aloud
No
Format name
ePub
Encrypted
No
Printing
Allowed
Copying
Allowed
Read aloud
Allowed
Sku
In metadata
Isbn
In metadata
File size
In metadata