Flylib.com
1
Discussion
Previous page
Table of content
Next page
What are the advantages and disadvantages of using JSP tag libraries for separating UX and engineering team activities?
What types of debugging aids can be created to assist the code/build/test/model cycle?
Overview of Modeling and Web-Related Technologies
What This Book Is About
Role of Modeling
Role of Process
Influences of Architecture
Web Application Basics
HTTP
HTML
Web Applications
Summary
Discussion
Activities
Dynamic Clients
Document Object Model
Scripting
JavaScript Objects
Custom JavaScript Objects
Events
Java Applets
ActiveX/COM
Summary
Discussion
Activities
Beyond HTTP and HTML
Distributed Objects
XML
Web Services
Summary
Discussion
Activities
Security
Types of Security Risk
Technical Risk
Server-Side Risks
Client-Side Risks
Security Strategies
Modeling Secure Systems
Summary
Discussion
Activities
Building Web Applications
Building Web Applications
The Process
Overview of Software Development
Software Development for Web Applications
The Artifacts
Summary
Discussion
Activities
Defining the Architecture
Architectural Viewpoints
Architecture Activities
Web Application Presentation Tier: Architectural Patterns
Summary
Discussion
Activities
Requirements and Use Cases
The Vision
Requirements
Glossary
Gathering and Prioritizing Requirements
Use Cases
The Use Case Model
The User Experience
Summary
Discussion
Activities
The User Experience
Artifacts of the UX Model
UX Modeling with UML
Summary
Activities
Analysis
Iteration
Analysis Model Structure
UX Model Mapping
Architecture Elaboration
Summary
Discussion
Activities
Design
Web Application Extension for UML
Designing Web Applications
Mapping to the UX Model
Integrating with Content Management Systems
Guidelines for Web Application Design
Summary
Discussion
Activities
Advanced Design
HTML Frames
Advanced Client-Side Scripting
Virtual and Physical HTTP Resources
JavaServer Page Custom Tags
Summary
Discussion
Activities
Implementation
Number Store Main Control Mechanism
Glossary Application Tag Libraries
Summary
Discussion
Activities
Overview
HTML to UML
UML to HTML
Mapping Web Elements to UML, and Vice Versa
Vision
Background
Requirements and Features
Software Architecture Document
Sample Screen Shots
Controlled Controllers Pattern
Use Case View
Analysis Model Classes
Analysis Model Collaborations
Master Template Pattern
Overview
Use Case View
Logical View
Glossary Application
Requirements and Use Case Model
User Experience Model
Design Model
Sample Screen Shots
show all menu
Previous page
Table of content
Next page
Building Web Applications with UML (2nd Edition)
ISBN: 0201730383
EAN: 2147483647
Year: 2002
Pages: 141
Authors:
Jim Conallen
BUY ON AMAZON
Similar book on Amazon
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
UML for Database Design
UML Software Design with Visual Studio 2010: What you need to know, and no more!
Enterprise Modeling with UML: Designing Successful Software through Business Analysis
Use Case Driven Object Modeling with UML : A Practical Approach (Addison-Wesley Object Technology Series)
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Interprocess Communications in Linux: The Nooks and Crannies
Executable File Format
Process Memory
Executing Remote Commands at a System Level
Creating a Thread
C.3. RPC Keywords
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk-Assessment Terminology
Compiling the Needed Documentation
Making Sure You Are Ready to Begin
Statement of Work
Procurement Best Practices
Information Dashboard Design: The Effective Visual Communication of Data
Categorizing Dashboards
Using Poorly Designed Display Media
Understanding the Limits of Short-Term Memory
Visually Encoding Data for Rapid Perception
Sample CIO Dashboard
Ruby Cookbook (Cookbooks (OReilly))
Arrays
Writing Block Methods That Classify or Collect
Guessing a Documents Encoding
Storing Hashed User Passwords in the Database
Writing a SOAP Server
802.11 Wireless Networks: The Definitive Guide, Second Edition
Why Wireless?
Cryptographic Background to WEP
Differential Phase Shift Keying (DPSK)
Windows Computer Authentication
Selecting Access Points
Python Programming for the Absolute Beginner, 3rd Edition
A Regression Test Script
Part IV: Assorted Topics
Binary Search Trees
Hand-Coded Parsers
A C Extension Type String Stack
Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies