Literature
Recommended Literature
The iSAQB recommends the following literature selection for the preparation and follow-up of the CPSA® training courses at Foundation and Advanced Level. The publications offer well-founded supplements to the various topics covered in the CPSA® training courses.
- All CPSA Topics
- ADOC
Architecture Documentation
- AGILA
Agile Software Architecture
- ARCEVAL
Architecture Evaluation
- BLOCKCHAIN
Low-Trust Consensus in Decentralized Applications
- CLOUDINFRA
Infrastructure, Container and Cloud Native
- DDD
Domain Driven Design
- EAM
Enterprise Architecture Management
- EMBEDDED
Embedded Systems
- FLEX
Flexible Architectural Models
- Foundation
- FUNAR
Functional Software Architecture
- IMPROVE
Evolution and Improvement of Software Architectures
- REQ4ARC
Requirements for Software Architects
- SOA‑T
Service-oriented Architecture
- SOFT
Soft Skills for Software Architects
- SWAM
Mobile Architectures
- WEB
Web Architecture
- WEBSEC
Web Security
arc42 by Example – Volume 2: Architecture Documentation for Embedded Systems and IoT
https://leanpub.com/arc42byexample-volume2

arc42 by Example: Software architecture documentation in practice

Architecture for Blockchain Applications

BDD in Action: Behavior-driven development for the whole software lifecycle

Building Evolutionary Architectures: Support Constant Change

Building Microservices: Designing Fine-Grained Systems

Cloud Native Patterns: Designing change-tolerant software

Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation

Design Sprint: A Practical Guidebook for Building Great Digital Products

Documenting Software Architectures: Views and Beyond

Domain-Driven Design: Tackling Complexity in the Heart of Software

Enterprise Architecture As Strategy: Creating a Foundation for Business Execution

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Evaluating Software Architectures: Methods and Case Studies

Fifty Quick Ideas to Improve Your User Stories

Foundations of Security: What Every Programmer Needs to Know

How to Design Programs

INCOSE Systems Engineering Handbook: A Guide for System Life Cycle Processes and Activities

JavaScript: The Good Parts: Working with the Shallow Grain of JavaScript

Kubernetes Patterns: Reusable Elements for Designing Cloud Native Applications

Managed Evolution: A Strategy for Very Large Information Systems

Managing Technical Debt

Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Ethereum: Building Smart Contracts and Dapps

Mastering the Requirements Process: Getting Requirements Right

Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web apps

NASA Software Safety Guidebook: NASA-GB-8719.13

Object Oriented Reengineering Patterns

Patterns for Fault Tolerant Software (Wiley Software Patterns Series)

Practices for Scaling Lean and Agile Development: Large, Multisite, and Offshore Product Development with Large-Scale Scrum

Pragmatic Evaluation of Software Architectures

Programming in Haskell

Real-Time Systems

Real-Time Systems: Design Principles for Distributed Embedded Applications (Real-Time Systems Series)

Refactoring Databases: Evolutionary Database Design

Release It! Design and Deploy Production-Ready Software

Security Engineering: A Guide to Building Dependable Distributed Systems

Site Reliability Engineering: How Google Runs Production Systems

Software Architecture Foundation: CPSA‑F Exam Preparation
This book can be purchased here at Van Haren Publishing.

Software Architecture in Practice

Software Design X‑Rays: Fix Technical Debt with Behavioral Code Analysis

Software Security: Building Security In

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives

Specification by Example: How Successful Teams Deliver the Right Software

The Art of Scalability

The Mikado Method

The Surprising Power of Liberating Structures: Simple Rules to Unleash A Culture of Innovation

Working Effectively with Legacy Code

Your Code As a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs
