Flylib.com
Use Cases: Requirements in Context (2nd Edition)
Use Cases: Requirements in Context (2nd Edition)
ISBN: 0321154983
EAN: 2147483647
Year: 2002
Pages: 90
Authors:
Daryl Kulak
,
Eamonn Guiney
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Acknowledgments
Preface to the First Edition
Acknowledgments
Chapter 1. The Trouble with Requirements
1.1 First and Least of All . . .
1.2 What Is a Requirement?
1.3 Requirements Gathering, Definition, and Specification
1.4 The Challenges of Requirements Gathering
1.5 Issues with the Standard Approaches
1.6 Those Troublesome Requirements
Chapter 2. Moving to Use Cases
2.1 It s All About Interactions
2.2 The Unified Modeling Language
2.3 Introducing Use Cases, Use Case Diagrams, and Scenarios
2.4 Use Cases Apply Here
2.5 Applying Use Cases to the Requirements Problem
Chapter 3. A Use-Case-Driven Approach to Requirements Gathering
3.1 Requirements Specification Tools
3.2 Principles for Requirements Success
3.3 Three Steps for Gathering Requirements
3.4 The Role of the Mission, Vision, Values
3.5 The Role of the Statement of Work
3.6 The Role of the Risk Analysis
3.7 The Role of the Prototype
3.8 The Roles of Use Cases
3.9 The Role of the Business Rules Catalog
3.10 Managing Success
Chapter 4. The Facade Iteration
4.1 Objectives
4.2 Steps in the Facade Iteration
4.3 Tools
4.4 Deliverables
4.5 Roles
4.6 Context
4.7 Summary
Chapter 5. The Filled Iteration
5.1 Objectives
5.2 Steps
5.3 Tools
5.4 Deliverables
5.5 Roles
5.6 Context
5.7 Summary
Chapter 6. Focused Iteration
6.1 Objectives
6.2 What Are Focused Use Cases?
6.3 Steps
6.4 Tools
6.5 Deliverables
6.6 Roles
6.7 Context
6.8 Summary
Chapter 7. Managing Requirements and People
7.1 Introduction
7.2 Waterfall Lifecycle Management
7.3 Alternatives to Waterfall
7.4 Introducing the Holistic IterativeIncremental Use-Case-Driven Project Lifecycle
7.5 Process
7.6 Principles of the Holistic IterativeIncremental Software Lifecycle
Chapter 8. Requirements Traceability
8.1 Tracing Back to Use Cases
8.2 Tracing Back to Nonfunctionals
8.3 Tracing Back to Business Rules
Chapter 9. Classic Mistakes
9.1 Mistakes, Pitfalls, and Bruised Knees
9.2 Classic Mistakes: Make Them and Move On
Chapter 10. The Case for Use Cases
10.1 Why Did Use Cases Win?
10.2 Use Cases Beyond Software
10.3 Summary
Appendix A. Real Estate Management System
A.1 Overview
A.2 The Use Cases
A.3 Scope Decisions
A.4 Refining the Requirements
Appendix B. Integrated Systems
B.1 Overview
B.2 Background
B.3 Problem Description
B.4 Solution Analysis
Appendix C. Instant Messaging Encryption
C.1 Overview
C.2 The Use Cases
Appendix D. Order a Product from a Catalog
Bibliography
Use Cases: Requirements in Context (2nd Edition)
ISBN: 0321154983
EAN: 2147483647
Year: 2002
Pages: 90
Authors:
Daryl Kulak
,
Eamonn Guiney
BUY ON AMAZON
Snort Cookbook
Logging Only Alerts
Using PostgreSQL with Snort and ACID
Logging to a Pager or Cell Phone
Detecting Port Scans and Talkative Hosts
Generating Statistical Output from Snort Databases
Network Security Architectures
Everything Is a Target
Components of a Hardening Strategy
High-End Resilient Edge Security Design
Utopian Management Goals
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Risk Analysis
The Test Organization
Some Final Thoughts…
Appendix B Testing Survey
C & Data Structures (Charles River Media Computer Engineering)
Data Types
Files
Trees
Problems in Arrays, Searching, Sorting, Hashing
Problems in Linked Lists
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Line Editing
Unions
Another Approach to Headers
Executing a Script
Branching in SQL*Plus
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
LAN Basics
The Broadband Evolution
The Broadband Infrastructure
DSL Technology
Wireless Broadband
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies