Table of content
The decomposition style shows how responsibilities are allocated across modules.
The decomposition style is especially suitable to show newcomers and for performing change-impact analysis.
The uses style shows how modules depend on one another.
The uses style helps achieve incremental development and the building of useful subsets of the system.
The generalization style relates modules by showing how one is a generalization or specialization of the other.
The generalization style is widely used in object-oriented systems. It shows inheritance, and is used to exploit commonality among modules.
The layered style divides a system into a set of virtual machines, related by the allowed-to-use relation.
The layered style helps a system achieve portability and modifability.
Table of content
Documenting Software Architectures: Views and Beyond
BUY ON AMAZON
Simiral book on Amazon
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Software Systems Architecture: Working With Stakeholders Using Viewpoints and Perspectives (2nd Edition)
Software Architecture in Practice (2nd Edition)
The Process of Software Architecting
Just Enough Software Architecture: A Risk-Driven Approach
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.1 General Troubleshooting
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Managing IT Functions
The Evolution of IT Governance at NB Power
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Identifying Project Resource Risk
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Appendix A Selected Detail From the PERIL Database
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
DTMF Relay for H.323
Integrating Cisco CME in a SIP Network
Managing Enterprise Systems with the Windows Script Host
Logon Scripts and Scheduling
Java Concurrency in Practice
Delegating Thread Safety
Executing Tasks in Threads
Cancellation and Shutdown
Hardware Support for Concurrency
Flylib.com © 2008-2017.
If you may any questions please contact us: firstname.lastname@example.org