Flylib.com
Index_E
Previous page
Table of content
Next page
E
encapsulation, 7
entity stereotype, 126
entry action
defined, 94
notation, 94
entry point
defined, 95
notation, 96
enumeration stereotype, 21
event, 69
event occurrence, 112
exception, 77
exception handler
defined, 81
notation, 82
exceptional flow of events
defined, 50
examples, 54, 56
exceptions, 13
executable node, 81
executable stereotype, 127
execution environment
defined, 129
notation, 129
execution occurrence, 112
exit action
defined, 94
notation, 94
exit point
defined, 96
notation, 96
expansion node, 83
expansion region
defined, 86
notation, 87
extend dependency
defined, 57
notation, 57
extension
defined, 135
notation, 135
extension points, 57
Previous page
Table of content
Next page
Fast Track UML 2.0
ISBN: 1590593200
EAN: 2147483647
Year: 2004
Pages: 97
Authors:
Kendall Scott
,
Apress
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
What Security Is and Isnt
Network Vulnerability Assessment
Basic Security Principles
Security and the Employee (Social Engineering)
Level II Assessments
Software Configuration Management
Configuration Verification and Audit
Configuration Change Management
Metrics and Configuration Management Reference
Appendix L Software Requirements Changes
Appendix N Corrective Action Processing (CAP)
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hacks 1728: Introduction
Hack 27. Add Google Maps to Any Web Site
Hack 32. Locate a Phone Number
Hack 56. Pin Your Own Maps to Google Maps with TPhoto
Hack 65. Add More Imagery with a WMS Interface
Junos Cookbook (Cookbooks (OReilly))
Turning On Basic Tracing
Filtering Traffic Transiting the Router
Configuring RIP for IPv6
Viewing the IS-IS Link-State Database
Configuring Multiple RPs in a PIM-SM Domain Anycast PIM
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Technology Fundamentals
Coaxial Cable
The PSTN Versus the Internet
LAN Characteristics
The Broadband Infrastructure
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Indirect Privilege Escalation
Defeating Virtual Private Databases
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies