[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] DAL (Data Access Layer) data archiving operations strategies caching BLL encryption SSL 2nd purging operations strategies 2nd sorting localized applications translating data access authentication (security policies) service accounts Windows accounts data access authorization (security policies) 2nd data access components 2nd service agents 2nd Data Access Layer building data services data access components 2nd service agents 2nd data elements entity relationships conceptual design ORM ORM representation data encryption IPSec security strategies RPC security strategies security strategies 2nd IPSec RPC SSL SSL/TLS SSL security strategies SSL/TLS security strategies data entry errors development strategies data flow symbol (DFD) data integration deployment strategies data integrity business rules (data modeling) 2nd data marshaling data migration deployment strategies data migration (physical deployment design) bandwidth BCP (SQL Server 2000) 2nd DTS (SQL Server 2000) 2nd transfer capacity calculating data modeling 2nd 3rd 4th 5th 6th business rules 2nd columns defining 2nd 3rd 4th 5th 6th 7th 8th 9th entities relationships 2nd 3rd 4th 5th 6th 7th ER Model 2nd entities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st ERWIN tables defining 2nd 3rd 4th 5th 6th denormalizing 2nd 3rd normalizing 2nd 3rd 4th 5th 6th 7th Visio 2nd XML 2nd complexType elements 2nd 3rd 4th namespaces 2nd simpleType versus DTD data objects (BLL) data privacy strategies security strategies data protection (security requirements) data requirements defining 2nd 3rd 4th data services data access components 2nd service agents 2nd data storage cookies client-side state management 2nd server-side state management 2nd development strategies 2nd 3rd 4th data store symbol (DFD) data tampering data type validation data validation 2nd 3rd code checking complex validation data type validation range checking database connection strings encryption database logging database partitions 2nd 3rd database schemas database sessions databases federated databases relational databases DataSets 2nd date and time formats localized applications DBMS (Database Management Systems) conceptual design ORM constraints converting conceptual diagrams to relational databases entities keys 2nd redundancy Debug class Debug classes decentralized business unit organizational structures defensive programming defining attributes (logical data models) 2nd columns (logical data models) 2nd 3rd 4th 5th 6th 7th 8th 9th data requirements 2nd 3rd 4th foreign keys 2nd 3rd primary keys 2nd 3rd 4th standards 2nd successful projects 2nd tables (logical data models) 2nd 3rd 4th 5th 6th user personas (Envisioning Phase deliverables) 2nd deliverables documentation review processes proof-of-concept deliverables logical design 2nd physical design deliverables (Envisioning Phase) goals lists 2nd problem statements 2nd 3rd user personas defining 2nd vision statements denormalization denormalizing tables (logical data models) 2nd 3rd dependencies external dependencies internal dependencies dependencies (entities) many-to-many dependencies one-to-many dependencies one-to-one dependencies deployability (PASS MADE) logical design validation physical design validation deploying applications automated deployment deployment no-touch deployment 2nd 3rd deployment (physical deployment design) Form deployment no-touch deployment 2nd 3rd Visual Studio .NET deployment projects CAB Projects Merge Module Projects 2nd 3rd selecting Setup Projects 2nd Web Setup Projects 2nd Web interface deployment Web Service deployment deployment diagrams (UML) deployment requirements (PASS MADE) 2nd application configuration application distribution deployment strategies 2nd 3rd automated application deployment coexisitence deployment strategies data integration data migration distributable media licensing 2nd Web Service licensing 2nd merge modules Visual Studio .NET Web servers 2nd Windows Installer designing architectures guidelines 2nd logical data models columns 2nd 3rd 4th 5th 6th 7th 8th 9th data modeling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th entities, relationships 2nd 3rd 4th 5th 6th 7th tables 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th threads coding standards UI (User Interfaces) desktop user interfaces (Windows Forms) determining entities 2nd developing extranet applications scope internet applications scope intranet applications scope security policies 2nd world-ready applications .NET Framework, System.Globalization namespaces .NET Framework, System.Resources namespaces .NET Framework, Unicode globalization 2nd 3rd 4th localization 2nd developing-specifications phase 2nd 3rd development strategies 2nd auditing system activity 2nd 3rd data storage 2nd 3rd 4th deployment strategies 2nd 3rd 4th 5th 6th 7th error handling 2nd 3rd 4th 5th 6th 7th 8th 9th globalization 2nd localizability localization 2nd 3rd 4th logging system activity 2nd 3rd logic handling monitoring system activity 2nd 3rd state management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th storing system activity information 2nd system integration operations strategies data archiving data purging 2nd upgrades security strategies ASP.NET assigning permissions data encryption 2nd data privacy strategies sealing messages securing system access signing 2nd system support 2nd testing strategies development strategies 2nd data storage 2nd 3rd 4th deployment strategies 2nd 3rd automated application deployment coexistence deployment strategies data integration data migration distributable media licensing 2nd 3rd 4th merge modules Visual Studio .NET Web servers 2nd Windows Installer error handling data entry errors logic errors structured exception handling 2nd 3rd syntax errors system malfunctions unstructured exception handling user errors globalization cultures/locales rule localizability localization 2nd multilingual user interfaces Unicode character encoding state management client-side state management 2nd 3rd data validation 2nd 3rd server-side state management 2nd 3rd 4th system activity auditing 2nd 3rd logging 2nd 3rd monitoring 2nd 3rd system activity information storing 2nd system integration DFD (data flow diagrams) 2nd 3rd 4th 5th context diagrams data flow symbol data store symbol external entity symbol level-0 diagrams level-n diagrams primitive level diagrams 2nd 3rd process symbol diagrams activity diagrams (UML) class diagrams (UML) collaboration diagrams (UML) component diagrams (UML) context diagrams (DFD) deployment diagrams (UML) DFD 2nd 3rd 4th 5th context diagrams data flow symbol data store symbol external entity symbol level-0 diagrams level-n diagrams primitive level diagrams 2nd 3rd process symbol level-0 diagrams (DFD) level-n diagrams (DFD) object diagrams (UML) primitive level diagrams (DFD) 2nd 3rd sequence diagrams (UML) statechart diagrams (UML) system block diagrams use case diagrams (UML) 2nd 3rd workflow diagrams digital certificates security strategies dimensioning variables 2nd DirectX disk partitions 2nd displays character displays localized applications documentation review processes documentation standards 2nd documents input documents building fact lists (conceptual design) vision/scope documents building 2nd documents. [See deliverables] DoS (Denial of Service) attacks drag-and-drop questions (exams) DTD (Document Type Definitions) versus XML schemas DTS (Data Transformation Services) 2nd 3rd 4th |