Home
Business Guide
 
simplicable technology guide   »  soa guide

SOA Guide

        posted by , March 05, 2013

SOA is a widely misunderstood set of architectural design principles. SOA principles are really just a collection of time-honored best practices for service design.

Our collection of SOA resources includes overviews, design principles and security best practices.

AreaTool
BasicsSOA Diagram
Understand SOA with one magic diagram.

SOA Marketplace
Build your own SOA marketplace.

SOA for the Confused
A few clarifications.

SOA in the Real World
Beyond the ideal vision of SOA.

Big SOA
The world's biggest SOA.

Design Best PracticesSOA Design Principles
9 principles of SOA design.

SOA Design Patterns
10 SOA design patterns every architect should know.

SecuritySecurity Challenges
9 SOA security challenges.

SOA Security
SOA security from 50,000 feet.

SOA Security Implementation
How to implement SOA security the easy way.

SOA & Security
Why SOA is fundamentally challenging for security professionals.

Challenges & MythsSOA Myths
4 common SOA myths.

SOA Failure
This is what SOA failure looks like.

Related ArchitecturesEvent Driven Architecture
Not your Grandmother's SOA.

Complex Event Processing
Adventures in complex event processing.

Related GuidesEnterprise Architecture Guide
Our guide to enterprise architecture.

Security Guide
Information security guide.





Related Articles



Service Oriented Architecture
The 9 software design principles that changed the world.




Current state architectural blueprints.

Big data is on the rise — are you missing out?

A simple checklist for secure code reviews.

Understanding your vulnerabilities is the first step to managing risk.


Recently on Simplicable


IT Security Guide

posted by John Spacey
A guide to information security including cheat sheets, best practices and checklists.

Principle of Least Privilege

posted by Anna Mar
A look at least privilege and need to know.

Authentication vs Authorization

posted by Anna Mar
It is easy enough to confuse authentication and authorization.

Security Risks

posted by Anna Mar
Security threats and security risk management.

about     contact     sitemap     privacy     terms of service     copyright