"Software Architecture Design Patterns in Java" By Partha Kuchana
Auerbach Publications in Software Development, Software Engineering, and Project Management
Auerbach Publications, CRC Press LLC | 2004 | ISBN: 0849321425 | 476 pages | PDF | 2 Mb
Auerbach Publications in Software Development, Software Engineering, and Project Management
Auerbach Publications, CRC Press LLC | 2004 | ISBN: 0849321425 | 476 pages | PDF | 2 Mb
This book is a detailed explanation of how to apply design patterns and develop software architectures. It provides in-depth examples in Java, and guides students by detailing when, why, and how to use specific patterns. This textbook presents 42 design patterns, including 23 GoF patterns.
Categories include: Basic, Creational, Collectional, Structural, Behavioral, and Concurrency, with multiple examples for each. The author explains the content so that it is easy to understand, and each pattern discussion includes Practice Questions to aid instructors. The textbook concludes with a case study that pulls several patterns together to demonstrate how patterns are not applied in isolation, but collaborate within domains to solve complicated problems.
Contents
SECTION I: AN INTRODUCTION TO DESIGN PATTERNS
1 Design Patterns: Origin and History
SECTION II: UNIFIED MODELING LANGUAGE (UML)
2 UML: A Quick Reference
SECTION III: BASIC PATTERNS
3 Interface
4 Abstract Parent Class
5 Private Methods
6 Accessor Methods
7 Constant Data Manager
8 Immutable Object
9 Monitor
SECTION IV: CREATIONAL PATTERNS
10 Factory Method
11 Singleton
12 Abstract Factory
13 Prototype
14 Builder
SECTION V: COLLECTIONAL PATTERNS
15 Composite
16 Iterator
17 Flyweight
18 Visitor
SECTION VI: STRUCTURAL PATTERNS
19 Decorator
20 Adapter
21 Chain of Responsibility
22 Façade
23 Proxy
24 Bridge
25 Virtual Proxy
26 Counting Proxy
27 Aggregate Enforcer
28 Explicit Object Release
29 Object Cache
SECTION VII: BEHAVIORAL PATTERNS
30 Command
31 Mediator
32 Memento
33 Observer
34 Interpreter
35 State
36 Strategy
37 Null Object
38 Template Method
39 Object Authenticator
40 Common Attribute Registry
SECTION VIII: CONCURRENCY PATTERNS
41 Critical Section
42 Consistent Lock Order
43 Guarded Suspension
44 Read-Write Lock
SECTION IX: CASE STUDY
45 Case Study: A Web Hosting Company
SECTION X: APPENDICES
Appendix A: List of Design Patterns
Appendix B: References
with TOC BookMarkLinks
More : You find here