Flylib.com
Software Configuration Management
ISBN: 0849319765
EAN: 2147483647
Year: 2006
Pages: 235
Authors:
Jessica Keyes
BUY ON AMAZON
Preface
Introduction to Software Configuration Management
Project Management in a CM Environment
The DoD CM Process Model
Configuration Identification
Configuration Control
Configuration Status Accounting
A Practical Approach to Documentation and Configuration Status Accounting
Configuration Verification and Audit
A Practical Approach to Configuration Verification and Audit
Configuration Management and Data Management
Configuration Change Management
Configuration Management and Software Engineering Standards Reference
Metrics and Configuration Management Reference
CM Automation
Appendix A Project Plan
Appendix C Sample Data Dictionary
Appendix D Problem Change Report
Appendix E Test Plan
Appendix G Sample Inspection Plan
Appendix I System Service Request
Appendix J Document Change Request (DCR)
Appendix K Problem/Change Report
Appendix L Software Requirements Changes
Appendix M Problem Report (PR)
Appendix N Corrective Action Processing (CAP)
Appendix P Project Statement of Work
Appendix Q Problem Trouble Report (PTR)
Appendix S Sample Maintenance Plan
Appendix T Software Configuration Management Plan (SCMP)
Appendix U Acronyms and Glossary
Appendix V Functional Configuration Audit (FCA) Checklist
Appendix W Physical Configuration Audit (PCA) Checklist
Appendix X SCM Guidance for Achieving the Repeatable Level on the Software
Appendix Y Supplier CM Market Analysis Questionnaire
Software Configuration Management
ISBN: 0849319765
EAN: 2147483647
Year: 2006
Pages: 235
Authors:
Jessica Keyes
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.2 Passphrase Considerations
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 5.1 General Troubleshooting
Conclusion
Metrics and Models in Software Quality Engineering (2nd Edition)
Process Maturity Framework and Quality Standards
Pareto Diagram
Defect Removal Effectiveness
In-Process Metrics for Software Testing
Audit and Assessment
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Forming Your Kanban Team
Conduct Data Collection
Appendix C Two-Bin Kanban Systems
Appendix J Abbreviations and Acronyms
Network Security Architectures
Layer 2 Security Considerations
DNS
Factors in Identity
Campus Trust Model
Special Edition Using Crystal Reports 10
Creating and Implementing Parameters Fields
Troubleshooting
Understanding the Report Designer Component
Troubleshooting
Review of SQL Commands
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies