Flylib.com
index_B
Previous page
Table of content
Next page
< Day Day Up >
Index
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
big picture
guidelines
binary state, objects
business rules, discounts
< Day Day Up >
Previous page
Table of content
Next page
Prefactoring: Extreme Abstraction, Extreme Separation, Extreme Readability
ISBN: 0596008740
EAN: 2147483647
Year: 2005
Pages: 175
Authors:
Ken Pugh
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Getting Started
Object Types, Predicates, and Basic Constraints
ORM Constraints
Reverse Engineering and Importing to ORM
Creating a Basic Logical Database Model
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Managing Project Risk
SQL Hacks
Hack 41. Copy Web Pages into a Table
Hack 67. Lock Implicitly Within Transactions
Hack 76. Compress to Avoid LOBs
Hack 79. Identify Updates Uniquely
Hack 81. Build Decision Tables
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
Junos Cookbook (Cookbooks (OReilly))
Configuring the Router for the First Time
Configuring the Router by Copying a File from a Server
Leaking IS-IS Level 2 Routes into Level 1
Moving OSPF Traffic off a Router
Checking the Groups for Which a PIM-SM Router Maintains Join State
Extending and Embedding PHP
The Resource Data Type
The Other refcounter
Exceptions
Resources/Lists
Appendix D. Additional Resources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies