Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Use Cases: Requirements in Context, Second Edition

Buy

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition: Requirements in Context describes a three-step method for establishing requirements--an iterative process that produces increasingly refined requirements. Drawing on their extensive, real- world experience, the authors offer a wealth of advice on use-case driven lifecycles, planning for change, and keeping on track. In addition, they include numerous detailed examples to illustrate practical applications.

This second edition incorporates the many advancements in use case methodology that have occurred over the past few years. Specifically, this new edition features major changes to the methodology's iterations, and the section on management reflects the faster-paced, more "chaordic" software lifecycles prominent today. In addition, the authors have included a new chapter on use case traceability issues and have revised the appendixes to show more clearly how use cases evolve.

The book opens with a brief introduction to use cases and the Unified Modeling Language (UML). It explains how use cases reduce the incidence of duplicate and inconsistent requirements, and how they facilitate the documentation process and communication among stakeholders.

The book shows you how to:

  • Describe the context of relationships and interactions between actors and applications using use case diagrams and scenarios
  • Specify functional and nonfunctional requirements
  • Create the candidate use case list
  • Break out detailed use cases and add detail to use case diagrams
  • Add triggers, preconditions, basic course of events, and exceptions to use cases
  • Manage the iterative/incremental use case driven project lifecycle
  • Trace back to use cases, nonfunctionals, and business rules
  • Avoid classic mistakes and pitfalls

The book also highlights numerous currently available tools, including use case name filters, the context matrix, user interface requirements, and the authors' own "hierarchy killer."

About the Author
Daryl Kulak is the president and CEO of Water-Logic Software (www.water-logic.com), an Internet business and technology consulting firm based in Columbus, Ohio. He is a graduate of the Northern Alberta Institute of Technology (NAIT) in Edmonton, Alberta. During much of his seventeen-year career managing software development projects in the United States and Canada, Daryl has focused on use cases, iterative/incremental development, and component design. Eamonn Guiney is a consultant at NewtonPartners (www.newtonpartners.com), a company that provides management consulting and system integration services to the money management industry. He is based in Sacramento, California. Eamonn creates business systems using a variety of tools, particularly object-oriented methodologies and use cases.
(HTML tags aren't allowed.)

MCITP Guide to Microsoft Windows Server 2008, Server Administration, Exam #70-646 (Mcts Series)
MCITP Guide to Microsoft Windows Server 2008, Server Administration, Exam #70-646 (Mcts Series)
MCITP Guide to Microsoft® Windows Server® 2008, Server Administration (Exam 70-646) provides thorough coverage of the 70-646 certifi cation exam objectives, giving you the skills you need to be a Windows Server 2008 administrator. Windows Server 2008 offers more server roles, more fl exibility, more security, and more...
Head First Networking
Head First Networking
Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory...
Identity and Access Management: Business Performance Through Connected Intelligence
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a...


From Secret Ballot to Democracy Sausage: How Australia Got Compulsory Voting
From Secret Ballot to Democracy Sausage: How Australia Got Compulsory Voting
NOT MANY COUNTRIES compel their citizens to vote, but Australia is one. Voting is compulsory in nineteen of the world’s 166 electoral democracies and only nine strictly enforce it.

None of Europe’s most influential democracies has it, and none of the countries in the mainstream of Australia’s
...
Multi-Gigabit Transmission over Multimode Optical Fibre: Theory and Design Methods for 10GbE Systems
Multi-Gigabit Transmission over Multimode Optical Fibre: Theory and Design Methods for 10GbE Systems
Multi-Gigabit Transmission over Multimode Optical Fibre presents a system design approach to single-wavelength laser-based multimode optical fibre transmission systems, operating at multi-gigabit data rates. 

The first part of the book focuses on theoretical issues, covering close-form mathematical modelling of multimode fibre...

The Art of Software Architecture: Design Methods and Techniques
The Art of Software Architecture: Design Methods and Techniques

Software architecture is emerging as a new discipline in response to the growing complexity of software systems and the problems they attempt to solve. Software is becoming the dominant component of many systems and it is necessary for the software development community to develop new practices, principles, and standards to manage the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy