Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: Information Technology
Table 2.1: Performance Metrics Relevant to a Software Application
Table 2.2: Estimated Improvement in Performance per Unit Cost for the Information Technologies
Table 2.3: The Four Historical Overlapping Phases of Computing
Table 2.4: Scaling Laws for MOS Integrated Circuits with a Fixed Electric Field Intensity
Chapter 4: Creating Software
Table 4.1: Typical Phases in a Waterfall Model of Software Development
Table 4.2: Considerations in Choosing Single-Stage Compilation vs. Interpretation
Table 4.3: Examples of Middleware Services That Would Extend the Infrastructure Utility Model
Chapter 5: Management
Table 5.1: Stages of the Software Supply Value Chain and Their Generic Tasks
Table 5.2: Generic Types of Software Releases
Table 5.3: Characteristics Ascribed to Different Types of Releases
Table 5.4: Four Major Threats to Information as It Crosses a Network
Table 5.5: Issues to be Addressed in Privacy Policies
Table 5.6: Examples of Access Control Mechanisms Enforced in the Infrastructure
Chapter 6: Software Supply Industry
Table 6.1: Considerations in Choosing an Application and Its Supplier
Chapter 7: Software Creation Industry
Table 7.1: Description of Layers Shown in Figure 7.5
Table 7.2: Core Competencies Relating to the Software Industry
Table 7.3: Examples of infrastructure Defined by Application and Technology Dependence
Table 7.4: Methodologies for Building Software on an Existing Code Base
Table 7.5: Properties That Distinguish a Component
Table 7.6: Industrial Contexts for Development Methodologies
Chapter 8: Government
Table 8.1: Generic Types of Source Code Software Licenses
Table 8.2: Approaches to Copy Protection
Chapter 9: Economics
Table 9.1: Examples of Pricing Options for Software Applications
Table 9.2: Costs in Supplying Software to the End-User
Previous page
Table of content
Software Ecosystem: Understanding an Indispensable Technology and Industry
ISBN: 0262633310
EAN: 2147483647
Year: 2005
Pages: 145
Authors:
David G. Messerschmitt
,
Clemens Szyperski
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
CMS and S/MIME
SSL and TLS
Snort Cookbook
Running Snort as a Linux Daemon
Debugging Snort Rules
Logging Alerts to a Database
Installing and Configuring MySQL
Installing and Configuring SnortCenter
C++ GUI Programming with Qt 3
Setting Up the Status Bar
Creating Custom Widgets
Printing
Using QFtp
Translating Applications
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Basics
Transmission Control Protocol (TCP) Basics
Transmission Control Protocol (TCP) Data Flow
Internet Protocol Security (IPSec)
Virtual Private Networks (VPNs)
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Templates and Velocity
Creating a Search Engine with Lucene
Comparing, Designing, and Deploying VPNs
Review Questions
Review Questions
Advanced MPLS Layer 3 VPN Deployment Considerations
Designing and Building SSL Remote Access VPNs (WebVPN)
Understanding VPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies