Flylib.com
Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Back Cover
Back Cover
Software Requirement Patterns
Foreword
Preface
Who Will Benefit from Using This Book
Benefits the Reader Will Gain
Skills and Experience Needed by the Reader
The Structure of This Book
Supporting Resources
Acknowledgments
Part I: Setting the Scene
Chapter 1: Synopsis of
1.1 What Are Requirements?
1.2 Where Do Requirements Fit in the Grand Scheme?
1.3 A Few General Principles
1.4 A Traditional Requirements Process
1.5 Agile Requirements Processes
Chapter 2: Synopsis of
2.1 Introduction Section
2.2 Context Section
2.3 Functional Area Sections
2.4 Major Nonfunctional Capabilities Section
Chapter 3: Requirement Pattern Concepts
3.2 The Anatomy of a Requirement Pattern
3.3 Domains
3.4 Requirement Pattern Groups
3.5 Relationships Between Requirement Patterns
Chapter 4: Using and Producing Requirement Patterns
4.2 Tailoring Requirement Patterns
4.3 Writing New Requirement Patterns
Part II: Requirement Pattern Catalog
Chapter 5: Fundamental Requirement Patterns
5.1 Inter-System Interface Requirement Pattern
5.2 Inter-System Interaction Requirement Pattern
5.3 Technology Requirement Pattern
5.4 Comply-with-Standard Requirement Pattern
5.5 Refer-to-Requirements Requirement Pattern
5.6 Documentation Requirement Pattern
Chapter 6: Information Requirement Patterns
6.1 Data Type Requirement Pattern
6.2 Data Structure Requirement Pattern
6.3 ID Requirement Pattern
6.4 Calculation Formula Requirement Pattern
6.5 Data Longevity Requirement Pattern
6.6 Data Archiving Requirement Pattern
Chapter 7: Data Entity Requirement Patterns
7.1 Living Entity Requirement Pattern
7.2 Transaction Requirement Pattern
7.3 Configuration Requirement Pattern
7.4 Chronicle Requirement Pattern
7.5 Information Storage Infrastructure
Chapter 8: User Function Requirement Patterns
8.1 Inquiry Requirement Pattern
8.2 Report Requirement Pattern
8.3 Accessibility Requirement Pattern
8.4 User Interface Infrastructure
8.5 Reporting Infrastructure
Chapter 9: Performance Requirement Patterns
9.1 Response Time Requirement Pattern
9.2 Throughput Requirement Pattern
9.3 Dynamic Capacity Requirement Pattern
9.4 Static Capacity Requirement Pattern
9.5 Availability Requirement Pattern
Chapter 10: Flexibility Requirement Patterns
10.1 Scalability Requirement Pattern
10.2 Extendability Requirement Pattern
10.3 Unparochialness Requirement Pattern
10.4 Multiness Requirement Pattern
10.5 Multi-Lingual Requirement Pattern
10.6 Installability Requirement Pattern
Chapter 11: Access Control Requirement Patterns
11.1 User Registration Requirement Pattern
11.2 User Authentication Requirement Pattern
11.3 User Authorization Requirement Patterns
11.4 Specific Authorization Requirement Pattern
11.5 Configurable Authorization Requirement Pattern
11.6 Approval Requirement Pattern
Chapter 12: Commercial Requirement Patterns
12.1 Multi-Organization Unit Requirement Pattern
12.2 FeeTax Requirement Pattern
Glossary
References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
List of Figures
List of Sidebars
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Normalizing the Output of an FFT Routine
Pcb Configurations
Intentional Clock Modulation
Signal Integrity Simulation Process
Simple Cases Involving Transmission Lines
The Complete Cisco VPN Configuration Guide
Summary
IPsec
Router Site-to-Site Connections
PIX and ASA Site-to-Site Connections
ISAKMP/IKE Phase 1 Connections
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter XV Customer Trust in Online Commerce
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Chapter XVII Internet Markets and E-Loyalty
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Other Events
Programming InfoPath
A Handy Client-Side ServerDocument Utility
Local Machine Deployment Without a Deployment Manifest
Exporting the Mapped XML in the Document to an XML Data File
MPLS Configuration on Cisco IOS Software
VPN Categories
Carrier Supporting Carriers Overview
MPLS TE Theory
Introduction to Layer 2 VPNs
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies