Flylib.com
Discussion
Previous page
Table of content
Next page
What are the advantages and disadvantages of using JSP tag libraries for separating UX and engineering team activities?
What types of debugging aids can be created to assist the code/build/test/model cycle?
Overview of Modeling and Web-Related Technologies
What This Book Is About
Role of Modeling
Role of Process
Influences of Architecture
Web Application Basics
HTTP
HTML
Web Applications
Summary
Discussion
Activities
Dynamic Clients
Document Object Model
Scripting
JavaScript Objects
Custom JavaScript Objects
Events
Java Applets
ActiveX/COM
Summary
Discussion
Activities
Beyond HTTP and HTML
Distributed Objects
XML
Web Services
Summary
Discussion
Activities
Security
Types of Security Risk
Technical Risk
Server-Side Risks
Client-Side Risks
Security Strategies
Modeling Secure Systems
Summary
Discussion
Activities
Building Web Applications
Building Web Applications
The Process
Overview of Software Development
Software Development for Web Applications
The Artifacts
Summary
Discussion
Activities
Defining the Architecture
Architectural Viewpoints
Architecture Activities
Web Application Presentation Tier: Architectural Patterns
Summary
Discussion
Activities
Requirements and Use Cases
The Vision
Requirements
Glossary
Gathering and Prioritizing Requirements
Use Cases
The Use Case Model
The User Experience
Summary
Discussion
Activities
The User Experience
Artifacts of the UX Model
UX Modeling with UML
Summary
Activities
Analysis
Iteration
Analysis Model Structure
UX Model Mapping
Architecture Elaboration
Summary
Discussion
Activities
Design
Web Application Extension for UML
Designing Web Applications
Mapping to the UX Model
Integrating with Content Management Systems
Guidelines for Web Application Design
Summary
Discussion
Activities
Advanced Design
HTML Frames
Advanced Client-Side Scripting
Virtual and Physical HTTP Resources
JavaServer Page Custom Tags
Summary
Discussion
Activities
Implementation
Number Store Main Control Mechanism
Glossary Application Tag Libraries
Summary
Discussion
Activities
Overview
HTML to UML
UML to HTML
Mapping Web Elements to UML, and Vice Versa
Vision
Background
Requirements and Features
Software Architecture Document
Sample Screen Shots
Controlled Controllers Pattern
Use Case View
Analysis Model Classes
Analysis Model Collaborations
Master Template Pattern
Overview
Use Case View
Logical View
Glossary Application
Requirements and Use Case Model
User Experience Model
Design Model
Sample Screen Shots
show all menu
Previous page
Table of content
Next page
Building Web Applications with UML (2nd Edition)
ISBN: 0201730383
EAN: 2147483647
Year: 2002
Pages: 141
Authors:
Jim Conallen
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk-Assessment Methodologies
Roles, Responsibilities, and Accountabilities
Training IT Staff and End Users
Level II Assessment Forms
Recommendations
Certified Ethical Hacker Exam Prep
Key Terms
Automated Assessment Tools
Key Terms
Linux Hacking
License
FileMaker Pro 8: The Missing Manual
Tab Order
Commenting Scripts
FileMaker Network Sharing
FileMaker Server
Script Debugger
SQL Hacks
Hack 5. Solve a Crossword Puzzle Using SQL
Hack 10. Convert Subqueries to JOINs
Hack 15. Search for Keywords Without LIKE
Hack 35. Tally Results into a Chart
Hack 44. Tunnel into MySQL from Microsoft Access
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Transparent Firewalls
Cisco IPS Software Architecture
Summary
System Clock
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies