Flylib.com
Index_E
Previous page
Table of content
Next page
E
encapsulation, 7
entity stereotype, 126
entry action
defined, 94
notation, 94
entry point
defined, 95
notation, 96
enumeration stereotype, 21
event, 69
event occurrence, 112
exception, 77
exception handler
defined, 81
notation, 82
exceptional flow of events
defined, 50
examples, 54, 56
exceptions, 13
executable node, 81
executable stereotype, 127
execution environment
defined, 129
notation, 129
execution occurrence, 112
exit action
defined, 94
notation, 94
exit point
defined, 96
notation, 96
expansion node, 83
expansion region
defined, 86
notation, 87
extend dependency
defined, 57
notation, 57
extension
defined, 135
notation, 135
extension points, 57
Previous page
Table of content
Next page
Fast Track UML 2.0
ISBN: 1590593200
EAN: 2147483647
Year: 2004
Pages: 97
Authors:
Kendall Scott
,
Apress
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Mapping ORM Models to Logical Database Models
Creating a Basic Logical Database Model
Logical Database Model Reports
Other Features and Best Practices
CISSP Exam Cram 2
Self-Assessment
Honeypots
Malicious Code
The Risks of Poor Business Planning
Steganography
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 5 Printers
Domain 6 Basic Networking
Domain 2 Installation, Configuration, and Upgrading
Domain 3 Diagnosing and Troubleshooting
The Complete Cisco VPN Configuration Guide
Configuring the Windows VPN Client
Router Remote Access Connections
PIX and ASA Site-to-Site Connections
Easy VPN Server Support for 7.0
Summary
Junos Cookbook (Cookbooks (OReilly))
Scheduling the Activation of a Configuration
Setting Router Information for the MIB-II System Group
Introduction
Configuring an ATM Interface
Viewing Routes Learned by IS-IS
Comparing, Designing, and Deploying VPNs
What Is a Virtual Private Network?
Designing and Implementing AToM-Based Layer 2 VPNs
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Understanding the Operation of SSL Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies