Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: What’s UML About, Alfie?
The evolution of UML
Chapter 2: Following Best Practices
A little information hiding goes a long way
Chapter 3: Objects and Classes
Perfecting your class and object names
Tip
Attributes and analysis
Technical Stuff
What’s in an icon?
Tip
Derived attributes
Chapter 4: Relating Objects That Work Together
Noname associations
Reading reflexive associations
Chapter 8: Introducing Use-Case Diagrams
Consider the stakeholders
Chapter 9: Defining the Inside of a Use Case
Use cases are not just descriptions
Warning
Avoid the Happy Path
Chapter 14: Capturing How Objects Collaborate
Looping or selecting?
Chapter 18: Avoiding States of Confusion
Avoiding data-flow diagrams
Chapter 19: Deploying the System’s Components
Logical versus physical
Chapter 20: Breaking the System into Packages/Subsystems
Considering coupling and cohesion
Previous page
Table of content
UML 2 For Dummies
ISBN: 0764526146
EAN: 2147483647
Year: 2006
Pages: 193
Authors:
Michael Jesse Chonoles
,
James A. Schardt
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.5 How to use OpenSSH Passphrase Agents
Appendix - Sample sshd_config File
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Sorting a Range
Introduction
Copying a File
Sorting Localized Strings
Transforming an XML Document with XSLT
C & Data Structures (Charles River Media Computer Engineering)
Introduction to the C Language
C Operators
The printf Function
Problems in Arrays, Searching, Sorting, Hashing
Miscellaneous Problems
Introduction to 80x86 Assembly Language and Computer Architecture
Bit Manipulation
The Assembly Process
Floating-Point Arithmetic
Appendix A Hexadecimal/ASCII conversion
Appendix B Useful MS-DOS Commands
.NET System Management Services
Using the System.Management Namespace
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Providers
WMI Security
MPLS Configuration on Cisco IOS Software
Special Outgoing Label Types
Implementing VPNs with Layer 2 Tunneling Protocol Version 3
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
Case Study 10: BGP Site of Origin
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies