Flylib.com
Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Back Cover
Back Cover
Software Requirement Patterns
Foreword
Preface
Who Will Benefit from Using This Book
Benefits the Reader Will Gain
Skills and Experience Needed by the Reader
The Structure of This Book
Supporting Resources
Acknowledgments
Part I: Setting the Scene
Chapter 1: Synopsis of
1.1 What Are Requirements?
1.2 Where Do Requirements Fit in the Grand Scheme?
1.3 A Few General Principles
1.4 A Traditional Requirements Process
1.5 Agile Requirements Processes
Chapter 2: Synopsis of
2.1 Introduction Section
2.2 Context Section
2.3 Functional Area Sections
2.4 Major Nonfunctional Capabilities Section
Chapter 3: Requirement Pattern Concepts
3.2 The Anatomy of a Requirement Pattern
3.3 Domains
3.4 Requirement Pattern Groups
3.5 Relationships Between Requirement Patterns
Chapter 4: Using and Producing Requirement Patterns
4.2 Tailoring Requirement Patterns
4.3 Writing New Requirement Patterns
Part II: Requirement Pattern Catalog
Chapter 5: Fundamental Requirement Patterns
5.1 Inter-System Interface Requirement Pattern
5.2 Inter-System Interaction Requirement Pattern
5.3 Technology Requirement Pattern
5.4 Comply-with-Standard Requirement Pattern
5.5 Refer-to-Requirements Requirement Pattern
5.6 Documentation Requirement Pattern
Chapter 6: Information Requirement Patterns
6.1 Data Type Requirement Pattern
6.2 Data Structure Requirement Pattern
6.3 ID Requirement Pattern
6.4 Calculation Formula Requirement Pattern
6.5 Data Longevity Requirement Pattern
6.6 Data Archiving Requirement Pattern
Chapter 7: Data Entity Requirement Patterns
7.1 Living Entity Requirement Pattern
7.2 Transaction Requirement Pattern
7.3 Configuration Requirement Pattern
7.4 Chronicle Requirement Pattern
7.5 Information Storage Infrastructure
Chapter 8: User Function Requirement Patterns
8.1 Inquiry Requirement Pattern
8.2 Report Requirement Pattern
8.3 Accessibility Requirement Pattern
8.4 User Interface Infrastructure
8.5 Reporting Infrastructure
Chapter 9: Performance Requirement Patterns
9.1 Response Time Requirement Pattern
9.2 Throughput Requirement Pattern
9.3 Dynamic Capacity Requirement Pattern
9.4 Static Capacity Requirement Pattern
9.5 Availability Requirement Pattern
Chapter 10: Flexibility Requirement Patterns
10.1 Scalability Requirement Pattern
10.2 Extendability Requirement Pattern
10.3 Unparochialness Requirement Pattern
10.4 Multiness Requirement Pattern
10.5 Multi-Lingual Requirement Pattern
10.6 Installability Requirement Pattern
Chapter 11: Access Control Requirement Patterns
11.1 User Registration Requirement Pattern
11.2 User Authentication Requirement Pattern
11.3 User Authorization Requirement Patterns
11.4 Specific Authorization Requirement Pattern
11.5 Configurable Authorization Requirement Pattern
11.6 Approval Requirement Pattern
Chapter 12: Commercial Requirement Patterns
12.1 Multi-Organization Unit Requirement Pattern
12.2 FeeTax Requirement Pattern
Glossary
References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
List of Figures
List of Sidebars
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
PL/SQL
Optimizing: The Oracle Side
Optimizing: Reducing Parses
The Crystal Repository
High-Speed Signal Propagation[c] Advanced Black Magic
Derivation of Telegraphers Equations
Single-Mode Fiber-Optic Cabling
IBIS (I/O Buffer Information Specification)
IBIS: Issues with SSO Noise
Simple Cases Involving Transmission Lines
Documenting Software Architectures: Views and Beyond
Client-Server Style
Discussion Questions
What to Document
C4ISR Architecture Framework
Rationale, Background, and Design Constraints
C++ GUI Programming with Qt 3
Subclassing QDialog
Subclassing QTable
Loading and Saving
Basic Layouts
QString and QVariant
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Internet Security Systems RealSecure
Cisco Secure IDS
Data Correlation
Laws, Standards, and Organizations
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Ways to Customize Excel
Introduction to the Collaboration Data Objects
Introduction
Excel-Friendly XML Schemas
VSTO Support for Excel Schema Mapping
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies