Flylib.com
Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Back Cover
Back Cover
Software Requirement Patterns
Foreword
Preface
Who Will Benefit from Using This Book
Benefits the Reader Will Gain
Skills and Experience Needed by the Reader
The Structure of This Book
Supporting Resources
Acknowledgments
Part I: Setting the Scene
Chapter 1: Synopsis of
1.1 What Are Requirements?
1.2 Where Do Requirements Fit in the Grand Scheme?
1.3 A Few General Principles
1.4 A Traditional Requirements Process
1.5 Agile Requirements Processes
Chapter 2: Synopsis of
2.1 Introduction Section
2.2 Context Section
2.3 Functional Area Sections
2.4 Major Nonfunctional Capabilities Section
Chapter 3: Requirement Pattern Concepts
3.2 The Anatomy of a Requirement Pattern
3.3 Domains
3.4 Requirement Pattern Groups
3.5 Relationships Between Requirement Patterns
Chapter 4: Using and Producing Requirement Patterns
4.2 Tailoring Requirement Patterns
4.3 Writing New Requirement Patterns
Part II: Requirement Pattern Catalog
Chapter 5: Fundamental Requirement Patterns
5.1 Inter-System Interface Requirement Pattern
5.2 Inter-System Interaction Requirement Pattern
5.3 Technology Requirement Pattern
5.4 Comply-with-Standard Requirement Pattern
5.5 Refer-to-Requirements Requirement Pattern
5.6 Documentation Requirement Pattern
Chapter 6: Information Requirement Patterns
6.1 Data Type Requirement Pattern
6.2 Data Structure Requirement Pattern
6.3 ID Requirement Pattern
6.4 Calculation Formula Requirement Pattern
6.5 Data Longevity Requirement Pattern
6.6 Data Archiving Requirement Pattern
Chapter 7: Data Entity Requirement Patterns
7.1 Living Entity Requirement Pattern
7.2 Transaction Requirement Pattern
7.3 Configuration Requirement Pattern
7.4 Chronicle Requirement Pattern
7.5 Information Storage Infrastructure
Chapter 8: User Function Requirement Patterns
8.1 Inquiry Requirement Pattern
8.2 Report Requirement Pattern
8.3 Accessibility Requirement Pattern
8.4 User Interface Infrastructure
8.5 Reporting Infrastructure
Chapter 9: Performance Requirement Patterns
9.1 Response Time Requirement Pattern
9.2 Throughput Requirement Pattern
9.3 Dynamic Capacity Requirement Pattern
9.4 Static Capacity Requirement Pattern
9.5 Availability Requirement Pattern
Chapter 10: Flexibility Requirement Patterns
10.1 Scalability Requirement Pattern
10.2 Extendability Requirement Pattern
10.3 Unparochialness Requirement Pattern
10.4 Multiness Requirement Pattern
10.5 Multi-Lingual Requirement Pattern
10.6 Installability Requirement Pattern
Chapter 11: Access Control Requirement Patterns
11.1 User Registration Requirement Pattern
11.2 User Authentication Requirement Pattern
11.3 User Authorization Requirement Patterns
11.4 Specific Authorization Requirement Pattern
11.5 Configurable Authorization Requirement Pattern
11.6 Approval Requirement Pattern
Chapter 12: Commercial Requirement Patterns
12.1 Multi-Organization Unit Requirement Pattern
12.2 FeeTax Requirement Pattern
Glossary
References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
List of Figures
List of Sidebars
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Effect of Inadequate Sampling Rate
Differential Signaling
100-Ohm Balanced Twisted-Pair Cabling
UTP Connectors
150-Ohm STP-A Cabling
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Case Study: Device Pool Design
Security and Hot Fix Policy
Summary
Snort Cookbook
Configuring MySQL for Snort
Logging to a Pager or Cell Phone
Detecting Binary Content
Detecting P2P
Installing and Configuring ACID
MySQL Cookbook
Setting Up a MySQL User Account
Performing Phrase Searches with a FULLTEXT Index
Obtaining Result Set Metadata
Eliminating Duplicates from a Query Result
Using MySQL for Session BackingStore with Tomcat
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 12. Send SMS from Linux
Hack 14. Control Your Bluetooth Phone with FMA
Hack 34. grep Your Network
Hack 62. Mobilize Your WRT54G with the WiFiCar
Hack 82. Use Your Orinoco Card with Hermes AP
Programming .Net Windows Applications
Web Applications Versus Windows Applications
Form Properties
DialogResult
Creating Your First Menu
Bugs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies