No edit summary |
No edit summary |
||
Line 114: | Line 114: | ||
[[Information security|Information Security]] | [[Information security|Information Security]] | ||
The basics of IT security | [[Information security|The basics of IT security]] | ||
Building safer software systems | [[Information security|Building safer software systems]] | ||
How MDriven Turnkey does it – every time | [[Information security|How MDriven Turnkey does it – every time]] | ||
How the access control system is constructed in MDriven | How the access control system is constructed in MDriven | ||
[[Category:The MDriven Book]] | [[Category:The MDriven Book]] |
Revision as of 06:24, 16 June 2023
What is MDriven
Information design
Short introduction to UML– class diagram
How do I know if it is correct?
Composite and Aggregate and what they imply
Derived attributes & associations
The ViewModel
What an Action can do
BringUpViewModel & ViewModelRootObjectExpression
ViewModelIsModal & ExpressionAfterModalOk
Microsoft Office and OpenDocument as a Report generator
Prototyping
This is how you do Prototyping with MDriven
Security concerns for MDriven Server
MDrivenServer periodic server-side actions
Other uses of Server side Actions
- Emailing from the server
- Importing data from other SQL sources
- Producing export files from MDriven Server
Shaping and transforming export files
What is Object Constraint Language
OCL, EAL, OCLps Introduction
Efficient fetch – real case (advanced – skip until you have the need)
Creating your own MDriven Turnkey instance in your Azure account
Set up MDriven Turnkey on premise
Turnkey architecture
Security
Building safer software systems
How MDriven Turnkey does it – every time
How the access control system is constructed in MDriven