Showing posts with label patterns. Show all posts
Showing posts with label patterns. Show all posts

5/31/2012

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise Review

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise
Average Reviews:

(More customer reviews)
This book is an extensive rework of the authors' "The Adaptive Enterprise", and in my opinion supersedes that earlier book.
Like the first book this one borrows heavily from the software engineering community to employ proven techniques, such as layered design, patterns and a component-based approach to infrastructure. Where this book extends and builds upon the earlier work is the emphasis on extending the corporate infrastructure into a meta infrastructure that is characterized by B2B and supply chains. As such it lives up to the title because the goal of the extended infrastructure is to enrich the value chain - or at least support the underlying business goals.
What I like about this book is what the authors propose is not only attainable, but makes good business sense. It starts with a 22-page introduction that clearly defines what is and is not infrastructure, and the concept of an adaptivity. These are important to understanding the approach that follows. Chapter 2, Laying the Foundation, quickly gives the basics for a layered infrastructure, develops a model for associated services that are needed to make the infrastructure adaptable, and drills down into service-related issues. I am not in complete agreement with the impact that this approach has on IT organizational structures; however, I am not willing to write it off as unfeasible until I have a chance to carefully think it through. The ideas do have merit (on paper) and are better developed in the first book.
Much of the rest of the book is a rehash of "The Adaptive Enterprise", but the material is slanted towards the extended infrastructure. What is important is the emphasis on patterns and components as frameworks and building blocks. Where the first book brought infrastructure management to a new level, this book extends it in a manner that reflects the realities of connected enterprises defined by supply chain management and business partners. Please see my review of "The Adaptive Enterprise" for specifics that apply to this book, and if you're deciding between the two books, this is the one to get.

Click Here to see more reviews about: Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise

A guide telling you how to achieve success in value chain infrastructure planning. Provides strategic advice for mapping business drivers to a set of fundamental patterns and planning models.

Buy Now

Click here for more information about Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise

Read More...

4/02/2012

Essential LINQ Review

Essential LINQ
Average Reviews:

(More customer reviews)
Well, I'd have to say stuff the Entity Framework. Those of us who have spent many years watching Microsoft change its data access APIs more frequently than many people change their underpants are hardly likely to instantly jump as soon as Microsoft announces that the API they are currently using is now so last week.
The fact that this book has excellent coverage of Linq to SQL is all in its favour, in my opinion. However, the book also has a very clear explanation of the basic concepts, is the first book on Linq that I have seen which clearly explains why we have query expressions as well as query methods, and has excellent Linq to XML coverage if you absolutely can't avoid using the filthy bloated abomination that is XML.
All in all, a most excellent book, a pleasure to read, and highly recommended.

Click Here to see more reviews about: Essential LINQ



Buy NowGet 26% OFF

Click here for more information about Essential LINQ

Read More...

11/17/2011

Java(tm) in Practice: Design Styles and Idioms for Effective Java Review

Java(tm) in Practice: Design Styles and Idioms for Effective Java
Average Reviews:

(More customer reviews)
Overall, this book does a decent job of explaining good design techniques to the programmer who is already familiar with Java. There are plenty of code examples, along with UML diagrams to help explain the designs that are presented. There's even an appendix on UML for those unfamiliar with the modeling language.
There are some flaws in this book, however. The book is not updated for Java 2, and is therefore rapidly becoming obsolete. Additionally, a significant number of typos and inconsistent use of terms clouds the already difficult subject matter. Especially bad is the discussion of the Cloneable interface, in which the authors state that different compilers treat Cloneable classes differently, but do not explain what the correct behavior is according to the Java Language Specification or how to work around these compiler problems.
There is some good material in the book, but in my opinion not enough of it and too many problems in the presentation, to justify the cover price.

Click Here to see more reviews about: Java(tm) in Practice: Design Styles and Idioms for Effective Java



Buy Now

Click here for more information about Java(tm) in Practice: Design Styles and Idioms for Effective Java

Read More...

10/11/2011

Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management Review

Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management
Average Reviews:

(More customer reviews)
This is the best book I ever had for Java security. This book talks everything you need to know about java security architecture and how to implement them with patterns. In addition to patterns, the book also recommends security bestpractices considerations for J2EE production, how to do proactive and reactive security assessments using well-defined checklists, security design case-study for portal. Undoubtedly, this book is very easy to understand, good code examples and nicely organized to support the needs of a Java developer. It is highly recommended for anyone wants to get involved with security architecture in J2EE applications and web services. If you are a Java guy..then go for it.

Click Here to see more reviews about: Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management

Praise for Core Security Patterns
"Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications."

--Whitfield Diffie, inventor of Public-Key Cryptography

"A comprehensive book on Security Patterns, which are critical for secure programming."

--Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security

"As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts."

--Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc.

"This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry."

--Judy Lin, Executive Vice President, VeriSign, Inc.

"Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side."

--Bill Hamilton, author of ADO.NET Cookbook, ADO.NET in a Nutshell, and NUnit Pocket Reference

"As a trusted advisor, this book will serve as a Java developer™s security handbook, providing applied patterns and design strategies for securing Java applications."

--Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase

"Like Core J2EE Patterns, this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors™ strong security experience, they created a must-have book for any designer/developer looking to create secure applications."

--John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns

Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE' enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects today™s best practices for security in large-scale, industrial-strength applications.

The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME' applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.

Core Security Patterns covers all of the following, and more:

What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid

Implementing key Java platform security features in real-world applications

Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile

Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML

Designing secure personal identification solutions using Smart Cards and Biometrics

Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists

End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications


Buy NowGet 37% OFF

Click here for more information about Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management

Read More...

10/07/2011

J2EE Best Practices: Java Design Patterns, Automation, and Performance (Wiley Application Development Series) Review

J2EE Best Practices: Java Design Patterns, Automation, and Performance (Wiley Application    Development Series)
Average Reviews:

(More customer reviews)
This is the best J2EE helper book period. I've been developing J2EE based applications for 2 years now and have read many books on the subject. Most of the J2EE books just repackage the specifications and write about common sense approaches.
J2EE Best Practices, will give you concrete information on how to use EJB 2.0 for the "real" world now!. You can and will use this book to ensure the success of your current EJB 2.0 project.
The material on CMR Entity beans is extremely valuable for anyone trying to implement Business Objects based on J2EE.
I use Cocoon for my Web Interface, but this book has some good info for Struts users as well.
Go to your nearest book store and get that edge you've been looking for. While your buddies are reading "Core J2EE', "Bitter EJB', "Expert One on One J2EE Design..", "Mastering J2EE..", etc...

Click Here to see more reviews about: J2EE Best Practices: Java Design Patterns, Automation, and Performance (Wiley Application Development Series)



Buy NowGet 24% OFF

Click here for more information about J2EE Best Practices: Java Design Patterns, Automation, and Performance (Wiley Application Development Series)

Read More...