Flylib.com
UML 2.0 in a Nutshell (In a Nutshell (OReilly))
UML 2.0 in a Nutshell (In a Nutshell (OReilly))
ISBN: 0596007957
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Dan Pilone
,
Neil Pitman
BUY ON AMAZON
UML 2.0 in a Nutshell
Table of Contents
Copyright
dedicationDedication
Preface
About This Book
How to Use This Book
Typographic Conventions
Safari Enabled
Comments and Questions
Acknowledgments
Chapter 1. Fundamentals of UML
Section 1.1. Getting Started
Section 1.2. Background
Section 1.3. UML Basics
Section 1.4. UML Specifications
Section 1.5. Putting UML to Work
Section 1.6. Modeling
Section 1.7. UML Rules of Thumb
Chapter 2. Class Diagrams
Section 2.1. Classes
Section 2.2. Attributes
Section 2.3. Operations
Section 2.4. Methods
Section 2.5. Abstract Classes
Section 2.6. Relationships
Section 2.7. Interfaces
Section 2.8. Templates
Section 2.9. Variations on Class Diagrams
Chapter 3. Package Diagrams
Section 3.1. Representation
Section 3.2. Visibility
Section 3.3. Importing and Accessing Packages
Section 3.4. Merging Packages
Section 3.5. Variations on Package Diagrams
Chapter 4. Composite Structures
Section 4.1. Composite Structures
Section 4.2. Collaborations
Section 4.3. Collaboration Occurrences
Chapter 5. Component Diagrams
Section 5.1. Components
Section 5.2. Component Views
Chapter 6. Deployment Diagrams
Section 6.1. Artifacts
Section 6.2. Nodes
Section 6.3. Deployment
Section 6.4. Variations on Deployment Diagrams
Chapter 7. Use Case Diagrams
Section 7.1. Use Cases
Section 7.2. Actors
Section 7.3. Advanced Use Case Modeling
Section 7.4. Use Case Scope
Chapter 8. Statechart Diagrams
Section 8.1. Behavioral State Machines
Section 8.2. States
Section 8.3. State Machine Extension
Section 8.4. Protocol State Machines
Section 8.5. Pseudostates
Section 8.6. Event Processing
Section 8.7. Variations on Statechart Diagrams
Chapter 9. Activity Diagrams
Section 9.1. Activities and Actions
Section 9.2. Tokens
Section 9.3. Activity Nodes
Section 9.4. Advanced Activity Modeling
Chapter 10. Interaction Diagrams
Section 10.1. What Are Interactions?
Section 10.2. Interaction Participants
Section 10.3. Messages
Section 10.4. Execution Occurrences
Section 10.5. State Invariants
Section 10.6. Event Occurrences
Section 10.7. Traces
Section 10.8. Combined Fragments
Section 10.9. Interaction Occurrences
Section 10.10. Decomposition
Section 10.11. Continuations
Section 10.12. Sequence Timing
Section 10.13. Alternate Interaction Notations
Chapter 11. Tagged Values, Stereotypes, and UML Profiles
Section 11.1. Modeling and UML in Context
Section 11.2. Stereotypes
Section 11.3. Tagged Values
Section 11.4. Constraints
Section 11.5. UML Profiles
Section 11.6. Tools and How They Use Profiles
Chapter 12. Effective Diagramming
Section 12.1. Wallpaper Diagrams
Section 12.2. Sprawling Scope
Section 12.3. One DiagramOne Abstraction
Section 12.4. Besides UML
Appendix A. MDA: Model-Driven Architecture
Section A.1. What Is MDA?
Section A.2. The Models of MDA
Section A.3. Design Decisions
Section A.4. Sewing the Models Together
Section A.5. Transforming Models
Section A.6. Languages to Formally Describe MDA
Appendix B. The Object Constraint Language
Section B.1. OCL Basics
Section B.2. OCL Syntax
Section B.3. Advanced OCL Modeling
Colophon
About the Author
Colophon
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
UML 2.0 in a Nutshell (In a Nutshell (OReilly))
ISBN: 0596007957
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Dan Pilone
,
Neil Pitman
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Using an IP Address to Connect to SQL Server
Transferring Login Credentials Securely
Using a Transaction with a DataAdapter
Determining the Length of Columns in a SQL Server Table
Listing Installed ODBC Drivers
MySQL Stored Procedure Programming
Variables
MySQL 5 Strict Mode
Handling SQL Errors: A Preview
SQL Statements for Managing Stored Programs
Using MySQL Stored Programs in Applications
Certified Ethical Hacker Exam Prep
Determining Assessment Scope
Key Terms
Wireless Technologies, Security, and Attacks
Wireless Hacking Tools
Ethics and Legality
Managing Enterprise Systems with the Windows Script Host
Introduction
File Operations
Input/Output Streams
Network Administration/WMI
Messaging Operations
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Python Programming for the Absolute Beginner, 3rd Edition
File Tools
Dialogs
Plumbing the Internet
A Simple C Extension Module
Section B.2. Book Examples Distribution
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies