買這商品的人也買了...
-
$580$458 -
$680$537 -
$980$774 -
$920$727 -
$860$568 -
$450$351 -
$690$587 -
$420$328 -
$620$527 -
$780$741 -
$280$218 -
$600$474 -
$450$383 -
$750$638 -
$620$527 -
$650$553 -
$650$553 -
$580$458 -
$760$600 -
$580$458 -
$590$466 -
$620$527 -
$690$538 -
$750$638 -
$560$476
相關主題
商品描述
Description:
Official Microsoft study guide for analyzing requirements and defining Microsoft .NET solution architectures.
Now you can build real-world programming skills as you prepare for MCP Exam 70-300—the only exam every MCSD certification candidate must pass. Work at your own pace through the scenario-based lessons and hands-on labs to learn how to analyze requirements and define a Microsoft .NET solution architecture for a software development project. This official Microsoft study guide maps one-to-one with the MCP exam objectives, including envisioning the solution; gathering and analyzing business requirements; developing specifications; creating the conceptual, logical, and physical designs; and creating standards and processes. As you develop proficiency in these critical skill areas, you’re also preparing for MCSD certification for Microsoft .NET.
Table of Contents:
About This Book | vii |
Intended Audience | vii |
Prerequisites | viii |
Reference Materials | viii |
About the CD-ROM | viii |
Features of This Book | ix |
The Microsoft Certified Professional Program | xx |
Technical Support | xxv |
CHAPTER 1 Introduction to Designing Business Solutions | 1 |
Lesson 1: Overview of Microsoft Solutions Framework | 2 |
Lesson 2: Phases in the MSF Process Model | 15 |
Lesson 3: Introducing the Case Study—Adventure Works Cycles Application | 25 |
Summary | 34 |
Review | 35 |
CHAPTER 2 Gathering and Analyzing Information | 37 |
Lesson 1: Gathering Information | 38 |
Lesson 2: Analyzing Information | 49 |
Lesson 3: Using Modeling Notations | 57 |
Lesson 4: Creating Use Cases and Usage Scenarios | 69 |
Activity: Gathering and Analyzing Information | 78 |
Summary | 81 |
Review | 82 |
CHAPTER 3 Envisioning the Solution | 85 |
Lesson 1: The Envisioning Phase | 86 |
Lesson 2: Creating a Vision/Scope Document | 91 |
Lesson 3: Creating the Project Structure Document | 104 |
Lesson 4: Analyzing Risks | 110 |
Activity: Developing a Vision/Scope Document | 114 |
Summary | 118 |
Review | 120 |
CHAPTER 4 Creating the Conceptual Design | 123 |
Lesson 1: An Introduction to the Planning Phase | 125 |
Lesson 2: An Overview of the Functional Specification | 131 |
Lesson 3: An Overview of the Conceptual Design Process | 138 |
Lesson 4: Building the Conceptual Design | 143 |
Lesson 5: Optimizing the Conceptual Design | 157 |
Activity: Analyzing Requirements | 163 |
Summary | 165 |
Review | 168 |
CHAPTER 5 Creating the Logical Design | 171 |
Lesson 1: An Overview of Logical Design | 173 |
Lesson 2: Creating a Logical Design | 180 |
Lesson 3: Documenting Logical Design Output | 194 |
Lesson 4: Optimizing Logical Design | 202 |
Activity: Identifying Objects for the Logical Design | 208 |
Summary | 210 |
Review | 212 |
CHAPTER 6 Creating the Physical Design | 215 |
Lesson 1: An Overview of Physical Design | 216 |
Lesson 2: Physical Design Analysis | 225 |
Lesson 3: Physical Design Rationalization | 232 |
Lesson 4: Physical Design Implementation | 241 |
Activity: Working on the Physical Design | 247 |
Summary | 248 |
Review | 250 |
CHAPTER 7 Designing the Presentation Layer | 253 |
Lesson 1: Basics of User Interface Design | 255 |
Lesson 2: Designing the User Interface | 262 |
Lesson 3: Designing User Process Components | 275 |
Activity: Creating the User Interface | 279 |
Summary | 281 |
Review | 283 |
CHAPTER 8 Designing the Data Layer | 285 |
Lesson 1: Designing the Data Store | 286 |
Lesson 2: Optimizing Data Access | 298 |
Lesson 3: Implementing Data Validation | 307 |
Activity: Creating a Data Schema | 314 |
Summary | 315 |
Review | 317 |
CHAPTER 9 Designing Security Specifications | 319 |
Lesson 1: Overview of Security in Application Development | 320 |
Lesson 2: Planning for Application Security | 323 |
Lesson 3: Using .NET Framework Security Features | 330 |
Lesson 4: Designing Authorization, Authentication, and Auditing Strategies | 339 |
Activity: Threat Modeling and Mitigation | 349 |
Summary | 350 |
Review | 352 |
CHAPTER 10 Completing the Planning Phase | 355 |
Lesson 1: Incorporating Design Considerations | 356 |
Lesson 2: Planning for Administrative Features | 371 |
Lesson 3: Planning for Future Phases | 375 |
Lesson 4: Creating the Technical Specification | 381 |
Activity: Reviewing a Test Plan and Technical Specification | 383 |
Summary | 385 |
Review | 388 |
CHAPTER 11 Stabilizing and Deploying the Solution | 391 |
Lesson 1: The MSF Stabilizing Phase | 392 |
Lesson 2: Testing and Piloting for Stabilization | 397 |
Lesson 3: The MSF Deploying Phase | 410 |
Lesson 4: Deploying to a Production Environment | 412 |
Activity: Prioritizing Bugs | 421 |
Summary | 423 |
Review | 424 |
APPENDIX A Questions and Answers | 427 |
GLOSSARY | 455 |
INDEX | 469 |