Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: Information Technology
Table 2.1: Performance Metrics Relevant to a Software Application
Table 2.2: Estimated Improvement in Performance per Unit Cost for the Information Technologies
Table 2.3: The Four Historical Overlapping Phases of Computing
Table 2.4: Scaling Laws for MOS Integrated Circuits with a Fixed Electric Field Intensity
Chapter 4: Creating Software
Table 4.1: Typical Phases in a Waterfall Model of Software Development
Table 4.2: Considerations in Choosing Single-Stage Compilation vs. Interpretation
Table 4.3: Examples of Middleware Services That Would Extend the Infrastructure Utility Model
Chapter 5: Management
Table 5.1: Stages of the Software Supply Value Chain and Their Generic Tasks
Table 5.2: Generic Types of Software Releases
Table 5.3: Characteristics Ascribed to Different Types of Releases
Table 5.4: Four Major Threats to Information as It Crosses a Network
Table 5.5: Issues to be Addressed in Privacy Policies
Table 5.6: Examples of Access Control Mechanisms Enforced in the Infrastructure
Chapter 6: Software Supply Industry
Table 6.1: Considerations in Choosing an Application and Its Supplier
Chapter 7: Software Creation Industry
Table 7.1: Description of Layers Shown in Figure 7.5
Table 7.2: Core Competencies Relating to the Software Industry
Table 7.3: Examples of infrastructure Defined by Application and Technology Dependence
Table 7.4: Methodologies for Building Software on an Existing Code Base
Table 7.5: Properties That Distinguish a Component
Table 7.6: Industrial Contexts for Development Methodologies
Chapter 8: Government
Table 8.1: Generic Types of Source Code Software Licenses
Table 8.2: Approaches to Copy Protection
Chapter 9: Economics
Table 9.1: Examples of Pricing Options for Software Applications
Table 9.2: Costs in Supplying Software to the End-User
Previous page
Table of content
Software Ecosystem: Understanding an Indispensable Technology and Industry
ISBN: 0262633310
EAN: 2147483647
Year: 2005
Pages: 145
Authors:
David G. Messerschmitt
,
Clemens Szyperski
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Appendix B Algorithms Provided by the Bouncy Castle Provider
Certified Ethical Hacker Exam Prep
Study Strategies
Security and the Stack
Summary
Footprinting and Scanning
Apply Your Knowledge
FileMaker Pro 8: The Missing Manual
Bringing It All Together
Layout Basics
Logical Functions
Organizing Complex Scripts
Disable Script Steps
The Java Tutorial: A Short Course on the Basics, 4th Edition
Code Samples
Working with Random Access Files
Your First Swing Program
Appendix E. Reference
Path Help
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 34. Map Other Planets
Hack 36. Shorten Online Map URLs
Hack 69. Find Your Way Around GRASS
Hack 81. Clean Up U.S. Addresses
Hack 85. Geocode U.S. Locations with the GNIS
Cultural Imperative: Global Trends in the 21st Century
Culture and Climate
Cognitive Processes
Culture and Globalization
Epilogue After September 11
Appendix A Cultural Categorization Characteristics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies