Flylib.com
Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Back Cover
Back Cover
Software Requirement Patterns
Foreword
Preface
Who Will Benefit from Using This Book
Benefits the Reader Will Gain
Skills and Experience Needed by the Reader
The Structure of This Book
Supporting Resources
Acknowledgments
Part I: Setting the Scene
Chapter 1: Synopsis of
1.1 What Are Requirements?
1.2 Where Do Requirements Fit in the Grand Scheme?
1.3 A Few General Principles
1.4 A Traditional Requirements Process
1.5 Agile Requirements Processes
Chapter 2: Synopsis of
2.1 Introduction Section
2.2 Context Section
2.3 Functional Area Sections
2.4 Major Nonfunctional Capabilities Section
Chapter 3: Requirement Pattern Concepts
3.2 The Anatomy of a Requirement Pattern
3.3 Domains
3.4 Requirement Pattern Groups
3.5 Relationships Between Requirement Patterns
Chapter 4: Using and Producing Requirement Patterns
4.2 Tailoring Requirement Patterns
4.3 Writing New Requirement Patterns
Part II: Requirement Pattern Catalog
Chapter 5: Fundamental Requirement Patterns
5.1 Inter-System Interface Requirement Pattern
5.2 Inter-System Interaction Requirement Pattern
5.3 Technology Requirement Pattern
5.4 Comply-with-Standard Requirement Pattern
5.5 Refer-to-Requirements Requirement Pattern
5.6 Documentation Requirement Pattern
Chapter 6: Information Requirement Patterns
6.1 Data Type Requirement Pattern
6.2 Data Structure Requirement Pattern
6.3 ID Requirement Pattern
6.4 Calculation Formula Requirement Pattern
6.5 Data Longevity Requirement Pattern
6.6 Data Archiving Requirement Pattern
Chapter 7: Data Entity Requirement Patterns
7.1 Living Entity Requirement Pattern
7.2 Transaction Requirement Pattern
7.3 Configuration Requirement Pattern
7.4 Chronicle Requirement Pattern
7.5 Information Storage Infrastructure
Chapter 8: User Function Requirement Patterns
8.1 Inquiry Requirement Pattern
8.2 Report Requirement Pattern
8.3 Accessibility Requirement Pattern
8.4 User Interface Infrastructure
8.5 Reporting Infrastructure
Chapter 9: Performance Requirement Patterns
9.1 Response Time Requirement Pattern
9.2 Throughput Requirement Pattern
9.3 Dynamic Capacity Requirement Pattern
9.4 Static Capacity Requirement Pattern
9.5 Availability Requirement Pattern
Chapter 10: Flexibility Requirement Patterns
10.1 Scalability Requirement Pattern
10.2 Extendability Requirement Pattern
10.3 Unparochialness Requirement Pattern
10.4 Multiness Requirement Pattern
10.5 Multi-Lingual Requirement Pattern
10.6 Installability Requirement Pattern
Chapter 11: Access Control Requirement Patterns
11.1 User Registration Requirement Pattern
11.2 User Authentication Requirement Pattern
11.3 User Authorization Requirement Patterns
11.4 Specific Authorization Requirement Pattern
11.5 Configurable Authorization Requirement Pattern
11.6 Approval Requirement Pattern
Chapter 12: Commercial Requirement Patterns
12.1 Multi-Organization Unit Requirement Pattern
12.2 FeeTax Requirement Pattern
Glossary
References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
List of Figures
List of Sidebars
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Quality: Popular Views
Reliability and Predictive Validity
Cyclomatic Complexity
Customer Satisfaction Surveys
Software Process Improvement Sequences
Snort Cookbook
Sniffing Gigabit Ethernet
Testing Rules
Detecting Fragmentation Attacks and Fragment Reassembly with Frag2
Managing Snort Sensors
Installing and Configuring IDScenter
An Introduction to Design Patterns in C++ with Qt 4
Destructors
The Keyword static
Streams and Dates
Reusing Other Libraries
Run-Time Type Identification (RTTI)
Ruby Cookbook (Cookbooks (OReilly))
Reading the Contents of a File
Fixing Bugs in Someone Elses Class
Representing Data as MIDI Music
Using Object Relational Mapping with ActiveRecord
Using breakpoint in Your Web Application
File System Forensic Analysis
Computer Foundations
Ext2 and Ext3 Concepts and Analysis
Content Category
File System Category
UFS2 Group Descriptor
Java All-In-One Desk Reference For Dummies
Welcome to Java
Making Choices
Using the Object and Class Classes
Book IV - Strings, Arrays, and Collections
Working with XML
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies