Index
Numbers
4GL products, 289
80:20 syndrome, software development, 56
A
Access control
context design analysis of user group, 346
context design specifying requirements of, 307
designing, 299
security programming vulnerability in, 316–317
unchecked by application, 304
user interface design for, 312
Access devices, designing for, 120, 280
Accuracy, data
completeness analysis for process layer, 152
integration design improving, 40–41, 186
as operations challenge, 334–335
ACID (atomicity, consistency, isolation, and durability) properties
of transactions, 209
Actions, screen
logical user interface design, 192–193
recording dependencies for flexibility, 332
user ...
Get Designing the Requirements: Building Applications that the User Wants and Needs now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.