Flylib.com
Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Back Cover
Back Cover
Software Requirement Patterns
Foreword
Preface
Who Will Benefit from Using This Book
Benefits the Reader Will Gain
Skills and Experience Needed by the Reader
The Structure of This Book
Supporting Resources
Acknowledgments
Part I: Setting the Scene
Chapter 1: Synopsis of
1.1 What Are Requirements?
1.2 Where Do Requirements Fit in the Grand Scheme?
1.3 A Few General Principles
1.4 A Traditional Requirements Process
1.5 Agile Requirements Processes
Chapter 2: Synopsis of
2.1 Introduction Section
2.2 Context Section
2.3 Functional Area Sections
2.4 Major Nonfunctional Capabilities Section
Chapter 3: Requirement Pattern Concepts
3.2 The Anatomy of a Requirement Pattern
3.3 Domains
3.4 Requirement Pattern Groups
3.5 Relationships Between Requirement Patterns
Chapter 4: Using and Producing Requirement Patterns
4.2 Tailoring Requirement Patterns
4.3 Writing New Requirement Patterns
Part II: Requirement Pattern Catalog
Chapter 5: Fundamental Requirement Patterns
5.1 Inter-System Interface Requirement Pattern
5.2 Inter-System Interaction Requirement Pattern
5.3 Technology Requirement Pattern
5.4 Comply-with-Standard Requirement Pattern
5.5 Refer-to-Requirements Requirement Pattern
5.6 Documentation Requirement Pattern
Chapter 6: Information Requirement Patterns
6.1 Data Type Requirement Pattern
6.2 Data Structure Requirement Pattern
6.3 ID Requirement Pattern
6.4 Calculation Formula Requirement Pattern
6.5 Data Longevity Requirement Pattern
6.6 Data Archiving Requirement Pattern
Chapter 7: Data Entity Requirement Patterns
7.1 Living Entity Requirement Pattern
7.2 Transaction Requirement Pattern
7.3 Configuration Requirement Pattern
7.4 Chronicle Requirement Pattern
7.5 Information Storage Infrastructure
Chapter 8: User Function Requirement Patterns
8.1 Inquiry Requirement Pattern
8.2 Report Requirement Pattern
8.3 Accessibility Requirement Pattern
8.4 User Interface Infrastructure
8.5 Reporting Infrastructure
Chapter 9: Performance Requirement Patterns
9.1 Response Time Requirement Pattern
9.2 Throughput Requirement Pattern
9.3 Dynamic Capacity Requirement Pattern
9.4 Static Capacity Requirement Pattern
9.5 Availability Requirement Pattern
Chapter 10: Flexibility Requirement Patterns
10.1 Scalability Requirement Pattern
10.2 Extendability Requirement Pattern
10.3 Unparochialness Requirement Pattern
10.4 Multiness Requirement Pattern
10.5 Multi-Lingual Requirement Pattern
10.6 Installability Requirement Pattern
Chapter 11: Access Control Requirement Patterns
11.1 User Registration Requirement Pattern
11.2 User Authentication Requirement Pattern
11.3 User Authorization Requirement Patterns
11.4 Specific Authorization Requirement Pattern
11.5 Configurable Authorization Requirement Pattern
11.6 Approval Requirement Pattern
Chapter 12: Commercial Requirement Patterns
12.1 Multi-Organization Unit Requirement Pattern
12.2 FeeTax Requirement Pattern
Glossary
References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
List of Figures
List of Sidebars
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Appendix - Sample sshd_config File
VBScript Programmers Reference
A Quick Introduction to Programming
Script Encoding
Adding VBScript to Your VB Applications
Appendix E VBScript Error Codes and the Err Object
Appendix L ActiveX Data Objects
Oracle Developer Forms Techniques
Intersession and Interdatabase Communication from Forms
Summary
Object-oriented Methods in Forms
Does Subclassing Exhibit Intelligence?
Programmatically Canceling a Query
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
Combos and Lists
Text Controls
Tables
Sample Application
SQL Hacks
Hack 24. Multiply Across a Result Set
Hack 25. Keep a Running Total
Hack 54. Denormalize Your Tables
Hack 68. Cope with Unexpected Redo
Wider Access
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Arrays and Collections
Network Programming
Windows Controls
Security and Cryptography
Useful COM Interop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies