- Acknowledgements
- About the Author
- Chapter 1
- 1. Introduction
- 1.1 Architects and Software Engineers
- 1.2 Risk of Narrow Focus
- 1.3 What This Book Aims to Achieve
- 1.4 Intended Audience
- Chapter 2
- 2. Type Of Applications
- 2.1. How Business Are Similar
- 2.2 CRM
- 2.3. ERP
- 2.4. E-Commerce SaaS
- 2.5. Omnichannel
- 2.6. Text Search
- 2.7. DWBI
- 2.8. Cloud
- 2.9. Singe Sign On (SSO)
- 2.10. Security Terminologies
- 2.11. SCM
- 2.12. POS
- 2.13. CMS
- 2.14. DevOps
- 2.15. AIML
- 2.16. IoT
- 2.17. Payment Gateway
- 2.18. Email
- 2.19. CDN
- 2.20. RDBMS
- 2.21. Collaboration and PM
- 2.22. Web Analytics
- Chapter 3
- 3. Emergence Of the Web
- 3.1. N Tier Applications
- 3.2. The Browser Front End
- 3.3. Mobile App Front End
- 3.4. The Middle Business Logic Tier
- 3.5. How Java Spring Boot Facilitates Microservices
- 3.6. The Communication (Messaging) Tier
- 3.7. The Backend Database
- 3.8. Content Delivery Network For Web Apps(CDN)
- 3.9. Load Balancing
- 3.10. Security of Web Applications
- Chapter 4
- 4. User Interface Technologies
- 4.1. Web UI Server-Side Rendering
- 4.2. Single Page App (SPAs)
- 4.3. Mobile UI
- Chapter 5
- 5. Cloud Computing
- 5.1. Virtual Machine
- 5.2. Linux Containers
- Chapter 6
- 6. AWS Cloud
- 6.1. Global Infrastructure
- 6.2. Our Job
- 6.3. Architects View of AWS Cloud
- 6.4. Regions
- 6.5. Virtual Private Cloud (VPC)
- 6.6. Availability Zones
- 6.7. IP Addressing
- 6.8. Routers and ISPs
- 6.9. Domain Name System
- 6.10. CIDR
- 6.11. Public / Private Subnet
- 6.12. Access Control Lists (ACLs)
- 6.13. Security Groups
- 6.14. EC2 Instances
- 6.15. Auto Scaling Groups
- 6.16. Key AWS Services
- 6.17. AWS Specialized Services
- 6.18. AWS Security & Compliance
- 6.19. Integration & Scalability
- 6.20. Support & Community
- 6.21. AWS IAM In Details
- 6.22. AWS Cognito
- 6.23. AWS SQS
- 6.24. AWS Kinesis
- 6.25. AWS CloudWatch
- 6.26. AWS CloudFormation
- 6.27. AWS SNS
- Chapter 7
- 7. Data Exchange Formats
- 7.1. XML
- 7.2. JSON
- 7.3. CSV
- 7.4. YAML
- Chapter 8
- 8. Relational Database
- 8.1. Origin
- 8.2. Schemas
- 8.3. Tables
- 8.4. Rows
- 8.5. Columns
- 8.6. Data Types
- 8.7. Primary Keys
- 8.8. Foreign Keys
- 8.9. Unique Keys
- 8.10. Relationships
- 8.11. Ecommerce ERD Diagram
- 8.12. Indexes
- 8.13. SQL
- Chapter 9
- 9. No SQL Database
- 9.1. Features of NoSQL Databases
- 9.2. MongoDB
- 9.3. Features of MongoDB
- 9.4. How MongoDB Works
- 9.5. Key MongoDB Concepts
- 9.6. Query Example in MongoDB
- Chapter 10
- 10. In Memory Data Grid
- 10.1. Infinispan
- 10.2. Hazelcast
- Chapter 11
- 11. Text Search
- 11.1. Elasticsearch
- 11.2. Architecture
- 11.3 Data Loading and Indexing
- 11.4. Tokenization
- 11.5. Sharding and Replication
- 11.6. Typeahead (Autocomplete)
- 11.7. Relevancy and Ranking
- 11.8. Sorting
- 11.9. Other Key Features
- 11.10. Scalability and Performance
- 11.11. Ecosystem
- 11.12. Elasticsearch Architecture
- 11.13. Elasticsearch 8.x
- 11.14. Large Data Loading
- 11.15. Master Node
- 11.16. Data Nodes
- 11.17. Query (Coordination) Nodes
- Chapter 12
- 12. Containerization
- 12.1. DevOps and Microservices Containerized Deployment
- 12.2. Kubernetes: Overview
- 12.3. Kubernetes Features
- 12.4. Kubernetes Architecture
- 12.5. Types of Objects Supported by Kubernetes
- 12.6. Kubernetes Architecture: In Detail
- 12.7. Kubernetes Object Examples
- Chapter 13
- 13. Non-Functional Requirements
- 13.1. Scalability
- 13.2. Performance
- 13.3. Security
- 13.4. Fraud Detection
- 13.5. Availability and Reliability
- 13.6. Compliance with GDPR
- 13.7. Compliance with HIPAA
- 13.8. Compliance with CCPA
- 13.9. Data Privacy and Confidentiality
- 13.10. Interoperability
- 13.11. Usability
- 13.12. Maintenance and Support:__
- 13.13. Monitoring and Logging
- 13.14. Disaster Recovery and Business Continuity:__
- 13.15. Auditing
- 13.16. Oauth 2.0 & OIDC
- 13.17. SAML 2.0
- 13.18. Monitoring
- 13.19. Scalability
- 13.20. High Availability
- 13.21. Disaster Recovery
- 13.22. Maintainability
- 13.23. Logging
- Chapter 14
- 14. Development Organization
- 14.1. Product Owners
- 14.2. Business Analysts
- 14.3. Project Managers
- 14.4. Software Engineers
- 14.5. Architects
- 14.6. Director / VP, Product
- 14.7. Director, Operations
- Chapter 15
- 15. Agile and Scrum
- 15.1. Agile Manifesto
- 15.2. Scrum Methodology
- Chapter 16
- 16. Microservice Architecture
- 16.1. Features
- 16.2. Monolithic Architecture
- 16.3. Origin and Adoption
- 16.4. Microservice 15 Factors
- 16.5. Microservice Ecosystem
- 16.6. Netflix OSS
- 16.7. Service Discovery
- 16.8. Spring Cloud Config
- 16.9. Hystrix (by Netflix)
- 16.10. Resilience4j
- 16.11. Ribbon
- References
Enterprise IT Architecture: A Comprehensive Guide for the Digital Age
A Brief Guide to Enterprise IT Architecture
Minimum price
$32.00
$32.00
You pay
$32.00Author earns
$25.60About
About the Book
My career in the IT industry began in 1995, a time when the landscape was markedly simpler. We dealt primarily with large mainframes running COBOL batch programs or engaged with the client-server model where relational databases served as the server backbone, supported by client-side tools such as PowerBuilder, Visual Basic, and Oracle Developer 2000. The introduction of Java in 1996 marked a pivotal shift, initially employed to enhance browser-based HTML pages through applets. However, this application quickly evolved as Java emerged as a dominant server-side development language. The release of Java 2 Enterprise Edition catalyzed an influx of application servers into the market, transforming those proficient in platforms like WebSphere or WebLogic into esteemed experts. As multinational corporations began transitioning their business logic from databases—moving triggers, procedures, and functions to application servers—the IT sector began to expand beyond the straightforward technologies of the mid-to-late nineties. Today, despite the bewildering array of terminologies, technologies, tools, and languages, many share a core similarity in their foundational use and application. This book aims to equip aspiring architects, managers, and engineers with the foundational knowledge required to navigate the complexities of today’s IT environment. It is designed to cut through the gloss of marketing campaigns and grasp the substantive technologies necessary to build effective systems.
The purpose of this book is to provide a solid foundation to an aspiring (or current) software architect for the following purposes:
- Informed Decision-Making: Equip yourself to make well-informed choices concerning both functional and non-functional requirements essential for project success.
- Effective Communication: Master the art of communicating effectively with stakeholders from diverse backgrounds, ensuring that every project is steered towards its intended outcome.
- Adaptability in Technology: Develop the ability to seamlessly transition between various technologies, products, and frameworks as they evolve or become obsolete, ensuring a resilient and enduring career in an ever-changing industry landscape.
Categories
Feedback
Author
About the Author
Binit Datta is a strategic, customer-centric technology leader with over three decades of experience designing, building, and operating large-scale enterprise systems across more than ten business verticals and numerous Fortune 50 organizations. His career has been defined by a rare ability to bridge deep technical execution with business outcomes—using architecture not as an academic exercise, but as a practical tool to deliver reliability, scalability, and measurable customer value.
With expertise spanning enterprise architecture, identity and access management, cloud platforms, security, and modern application development, Binit has consistently worked at the intersection of systems that must perform under real-world pressure. He is particularly known for his focus on prevention over cure—helping organizations avoid costly production failures through deep system understanding, fast root-cause analysis, and disciplined architectural thinking.
A passionate mentor and lifelong learner, Binit believes the most valuable technologists are those who can see beyond silos—understanding applications, platforms, and identity infrastructure as a single, interconnected system. In an era increasingly shaped by generative AI, his work advocates for the enduring importance of human judgment, architectural fluency, and customer-focused problem solving.
This book reflects that philosophy: written for practitioners who want to understand not just how systems work, but why they behave the way they do—and how that understanding translates into lower MTTR, stronger customer trust, and sustained product innovation.
Contents
Table of Contents
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earned over $14 million writing, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Write and Publish on Leanpub
You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!
Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.
Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.