Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Synopsis of "Crash Course in Specifying Requirements"
Figure 1-1: Development life cycle phases
Figure 1-2: Morsel sizes for different development approaches
Figure 1-3: Activities in traditional requirements process
Chapter 2: Synopsis of "The Contents of a Requirements Specification"
Figure 2-1: Suggested structure of a requirements specification, with thirteen kinds of sections
Chapter 3: Requirement Pattern Concepts
Figure 3-1: Pervasive and follow-on relationships between requirements
Figure 3-2: Relationships between domains, requirement patterns, and infrastructures
Figure 3-3: Annotated sample requirement pattern diagram
Chapter 5: Fundamental Requirement Patterns
Figure 5-1: Requirement patterns in the fundamental domain
Figure 5-2: Sample system context diagram
Chapter 6: Information Requirement Patterns
Figure 6-1: Requirement patterns in the information domain
Chapter 7: Data Entity Requirement Patterns
Figure 7-1: Requirement patterns in the data entity domain
Chapter 8: User Function Requirement Patterns
Figure 8-1: Requirement patterns in the user function domain
Chapter 9: Performance Requirement Patterns
Figure 9-1: Requirement patterns in the performance domain
Figure 9-2: The relative cost of different availability levels
Chapter 10: Flexibility Requirement Patterns
Figure 10-1: Requirement patterns in the flexibility domain
Figure 10-2: The sequence of extendability-related requirements
Figure 10-3: Identifying multinesses from logical entities
Chapter 11: Access Control Requirement Patterns
Figure 11-1: Requirement patterns in the access control domain
Chapter 12: Commercial Requirement Patterns
Figure 12-1: Requirement patterns in the commercial domain
Previous page
Table of content
Next page
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
CMS and S/MIME
Software Configuration Management
The DoD CM Process Model
A Practical Approach to Configuration Verification and Audit
Appendix A Project Plan
Appendix C Sample Data Dictionary
Appendix I System Service Request
Oracle Developer Forms Techniques
Ordering by Foreign Key Items in Forms
Myths About the Form Filename, Form Module Name , and Form ID
Intelligence with Regard to Form Wizards
Planting and Growing Trees -Dynamically Adding Nodes Along with Data to an Existing Base Tree
A New Look at Relations Using REFS
C++ GUI Programming with Qt 3
Implementing Application Functionality
Enabling Drag and Drop
Pointer-Based Containers
Databases
Internationalization
Visual C# 2005 How to Program (2nd Edition)
Wrap-Up
Control Structures
DateTimePicker Control
Exercises
Establishing a Simple TCP Client (Using Stream Sockets)
Cultural Imperative: Global Trends in the 21st Century
Culture and Religion
Culture and Globalization
Conclusion
Appendix B Leadership Test
Appendix C National Traits
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies