Quality Tactics (Book)
Quality Tactics
Developing Quality-Driven Solution Strategies for Software Architectures
About the Book
In a world where software architecture makes the difference between success and failure of a project, a box of ideas full of suitable strategies is needed to create quality in software systems at an appropriate level. The book lists several hundred quality tactics for software architects, which raise the quality of software systems (and everything around them) to an appropriate level. It serves as a source of ideas for finding initial answers in a wide variety of situations and contexts in order to create exactly the right level of quality for relevant stakeholders that is required and can also be realized by the development team.
Packages
Book
PDF
EPUB
WEB
English
Book with flashcards
Includes:
Quality Tactics Cards
This is the cards version of quality tactics containing the core information.
PDF
EPUB
WEB
English
Table of Contents
- Foreword
- Acknowledgments
- Use of AI
- About this edition
- About Quality Tactics
- Functional Suitability
- Requirements Analysis
- User Stories
- Prototyping
- Functional Tests
- User Acceptance Tests
- Definition of Done
- Product Owner
- Personas
- Continuous Feedback
- Direct Feedback
- Domain Experts
- On-Site Customer
- Iterative Development
- Feature Driven Development
- Domain Modeling
- Domain-Driven Design
- Bounded Contexts
- Domain-aligned Architecture
- Business Process Modeling
- Standard Software
- Evolutionary Requirements Development
- Subject Matter Reviews
- Code Reviews
- Architecture Reviews
- Functional Debt Management
- Usability Tests
- Business Test Cases
- Domain Quiz
- Business Quality Scenarios
- Behavior-Driven Development (BDD)
- Acceptance Tests
- Domain-Specific Languages
- Domain Patterns
- Continuous Delivery
- Business Metrics
- Prototypes
- Tracer Bullets
- Spikes
- Customizing
- Decision Tables
- Business process automation
- Rule-Based Systems
- Business Event Processing
- Data Quality Checks
- Value Range Definition
- Domain-based Authorization Concept
- Domain Data Versioning
- Microservices
- Data Archiving
- Datensparsamkeit
- Data Integration
- Data Enrichment
- Data Modeling
- Data Strategy
- Data Ecosystems
- Usability
- User-Centered Design
- Usability Tests
- Wireframing
- Responsive Design
- Mobile First Design
- Consistent User Interface
- Style Guide
- Consistent Terminology
- Cognitive Load Minimization
- Intuitive Navigation
- Icons
- Visual Hierarchy
- Progressive Disclosure
- Plain Language
- Understandable Error Messages
- Real-time Input Validation
- Contextual Help
- Feedback
- Gamification
- Customizable User Interface
- Custom Views
- Adaptive Behavior
- Localization
- Performance Optimization
- Asynchronous Operations
- Single Page Application
- Progressive Web App
- Keyboard Support
- Search Function
- Integrated Onboarding
- Interactive Tutorials
- Video Tutorials
- Frequently Asked Questions (FAQ)
- Feedback Mechanisms
- A/B Testing
- User Communities
- Personal Support
- Knowledge Base
- Accessibility Concept
- Assistive Technology Support
- Adjustable Font Sizes
- High Color Contrasts
- Subtitles and Transcripts
- Reliability
- Error Handling
- Redundancy
- Exceptions
- Checklists
- Runbooks
- Error Logging
- Monitoring
- Monitoring System Utilization
- Boring Technologies
- Resilience
- Disaster Recovery
- On-Call Duty
- Load Balancing
- Chaos Engineering
- Elastic Resource Utilization
- Proactive Capacity Management
- Service Level Agreements
- Service Level Objectives
- Service Level Indicators
- Data Replication
- Failover Mechanisms
- Self-Monitoring and Diagnosis
- Isolation of Faulty Components
- Environment Parity
- Production environment maintenance
- Site Reliability Engineering (SRE)
- Graceful Degradation
- Circuit Breaker
- Bulkhead
- Self-Test
- Ping
- Heartbeat
- Transactions
- Retry
- Watchdog
- Smoke Testing
- Nonstop Forwarding
- Timestamping
- Status Monitoring
- Failover Cluster
- Redundant Data Storage
- Rollback Mechanisms
- Blue-Green Deployment
- Feature Toggles
- Rolling Updates
- Dark Launches
- Canary Releases
- Fault-Tolerant Data Structures
- Fault Containment
- Error Correction Codes
- Error Reporting and Analysis
- Checksums
- Redundant Checksums
- Continuous Data Verification
- Plausibility Checks
- Restore Points
- Monitoring System Integrity
- Load Testing
- Regular Backups
- Incident Management
- Root Cause Analysis
- High Availability Architectures
- Error Logs
- Data Integrity
- Secure Software
- Regular Maintenance and Updates
- Continuous Integration and Delivery
- Immutable Infrastructure
- Automated Tests
- Performance Efficiency
- Caching
- Load Balancing
- Asynchronous Processing
- Asynchronous Logging
- Performance Budgets
- Resource usage optimization
- Compression
- API calls optimization
- Efficient algorithms
- Database Optimization
- NoSQL Databases
- Graph Databases
- Load Testing
- Stress Testing
- Profiling
- Resource Pooling
- Parallelization
- Distributed Processing
- Concurrency
- Pipelining
- Streaming
- Elastic Scaling
- Vertical Scaling
- Horizontal Scaling
- Content Delivery Networks
- Static Site Generation
- Server Side Rendering
- Edge Computing
- Client Side Rendering
- Batch Processing
- In-Memory Processing
- Lazy Loading
- Deferred Static Generation
- Lazy Evaluation
- Adaptive Streaming
- Progressive Loading
- Pagination
- Infinite Scrolling
- Virtualized Lists
- Approximation methods
- Neural Networks
- Predictive Loading
- Predictive Prefetching
- Code splitting
- Tree Shaking
- Specialized hardware
- Continuous Performance Monitoring
- Performance Measurements
- Static Code Analysis
- Dynamic Programming
- Probabilistic Data Structures
- Vectorization
- Genetic Algorithms
- Quantum Computing
- Quantum-Optimized Algorithms
- Performance Modeling
- Transparent Performance Metrics
- Serverless Computing
- Reactive Programming
- Mass Test Data Generation
- Memory Hierarchy
- Distributed Caching
- Data Partitioning
- Data Deduplication
- Data Aggregation
- Materialized Views
- Sampling
- Data Archiving
- Data Stream Processing
- Security
- Encryption
- Authentication
- Two-Factor Authentication
- Authorization
- Authorization Concept
- Role-Based Access Control
- Least Privilege
- Logging and Monitoring
- Input Validation
- Secure Session Management
- Secure Configuration
- Security Community
- Security Policies for Users
- Security Policies for Development
- Security Training
- Raising User Awareness
- Network Segmentation
- Secure Software Development
- Security by Design
- Security Frameworks
- Security Certification
- Security Audits
- Risk Analysis
- Incident Response Measures
- Backup and Recovery
- Secure Protocols
- Datensparsamkeit
- Security Tests
- Threat Intelligence
- Red Teaming
- Security Architecture Analysis
- Digital Forensics
- Honeypots
- Security Metrics
- Threat Modeling
- Abuse Case Definition
- Security Requirements Definition
- Secure by Default
- Trust Boundaries
- Data Flow Control
- Cryptographic Methods
- Key Management
- Secure Coding Guidelines
- Static Code Analysis
- Dynamic Code Analysis
- Secure Programming Interfaces
- Prepared Statements
- Output Encoding
- Canonicalization
- Fuzz-Testing
- Negative Testing
- Regression Tests
- Security Tests by External Parties
- Penetration Tests
- System Hardening
- Patch Management
- Defense Lines
- Malware Protection
- Security Monitoring
- Endpoint Detection and Response
- Vulnerability Scans
- Third-Party Dependency Check
- Configuration Checks
- Emergency Drills
- Security-Relevant Metrics
- Security Incident Handling
- Physical Security
- Security Culture
- Maintainability
- Domain-Driven Design
- Separation of Concerns
- Modularization
- Bubble Context
- Modulith
- Layered Architecture
- Pattern Language
- Anti Corruption Layer
- Architecture Reviews
- Clean Code
- SOLID Principles
- Refactoring
- Refactoring Katas
- Static Code Analysis
- Code Reviews
- Strategic Code Deletion
- Deprecation Strategy
- Collaborative Problem Solving
- Pair Programming
- Fair Source
- Code Conventions
- Code Metrics
- Code Quality Gates
- Automated Tests
- Integration Tests
- Test-Driven Development (TDD)
- Behavior-Driven Development (BDD)
- Code Coverage Analysis
- Dependency Injection
- Dependency Injection Container
- Dependency Management
- Continuous Integration
- Agile Development Methods
- Architecture Workshops
- Architecture Review Board
- Architecture Governance
- Architecture Conformity Analysis
- Fitness Functions
- Architecture Roadmap
- Version Control
- Feature Toggles
- Logging
- Knowledge Management System
- Architecture Documentation
- Architecture Decision Records (ADR)
- Living Documentation
- Docs as Code
- API-First Design
- API Documentation
- Code Comments
- Fluent Interfaces
- Mutation Testing
- Property-Based Testing
- Aspect-Oriented Programming (AOP)
- Code Generation
- Continuous Delivery
- Continuous Deployment
- Microservices
- Containerization
- Infrastructure as Code
- Compatibility
- Standardized Interfaces
- Protocol Abstraction
- Data Formats
- Versioning Scheme
- Compatibility Testing
- Cross-Version Testing
- Continuous Integration
- Loose Coupling
- Configurability
- Abstraction
- Adapter
- Facades
- Anti Corruption Layer
- Bridges
- Mediator
- Microservices
- Containerization
- Virtualization and Containerization
- Emulation
- Standardized Protocols
- Cross-Platform Serialization
- Compatibility Layers
- Data Format Conversion
- Version Control
- API Versioning Strategy
- Backward Compatible APIs
- Backward Compatibility
- Forward Compatibility
- Feature Flags
- Isolated Test Environments
- Simulation Environments
- Documentation of Compatibility Requirements
- Compatibility Matrix
- Compatibility Guidelines
- Compatibility Testing by Users
- Compatibility Metrics
- Compatibility Audits
- Backward-Compatible Schema Migrations
- Browser Compatibility
- Compatibility Backlog
- Compatibility Roadmap
- Compatibility Champions
- Interoperability Tests
- Consumer Driven Contracts
- Compatibility Error Message
- Backward Compatible Data Formats
- Compatibility Risk Assessment
- Compatibility Requirements
- Compatibility Guidelines for Third-Party Providers
- Compatibility Certification
- Compatibility Smoke Tests
- Compatibility Testing Before Releases
- Compatibility Criteria in Definition of Done
- Continuous Deployment
- Portability
- Containerization
- Platform-Independent Programming Languages
- Externalized configuration
- Portability Checklists
- Cross-Platform Frameworks
- Standardized Data Formats
- Microservices Architecture
- Cloud-native Development
- Abstraction Layers
- Virtualization
- API-First Development
- Dependency Injection
- Cross-Platform Build Tools
- Cross-Platform UI Frameworks
- Database Abstraction
- Object-Relational Mapping (ORM)
- Platform-Independent Configuration Management
- Portable Binary Formats
- Environment Variables for Configuration
- Platform Independence
- Platform-Independent Scripting Languages
- Virtual Development Environments
- Platform-Independent Data Storage
- Standardized Deployment Scripts
- Platform-Independent Build Pipelines
- Abstracted File System Access
- Platform-Independent Logging Frameworks
- Platform-Independent Configuration Files
- Virtual Networks
- Platform-Independent Test Frameworks
- Containerized Databases
- Cross-Platform Encryption Libraries
- Platform-Independent Time Zone Handling
- Cross-Platform Graphics Libraries
- Cross-Platform Build Scripts
- Cross-Platform Package Managers
- Quality Illusions
- Skeleton Screens
- Optimistic UI Updates
- Shimmer Effect
- Micro Interactions
- Fake Progress Bar
- Navigation Maze
- Pseudo-Personalization
- Phantom Notifications
- Simulated Real-Time Data
- Artificial Delays
- Pseudo-AI Interactions
- Phantom Functionality
- Artificial Learning Curve
- Fake Localization
- Pseudo-Multitasking
- Fake Datensparsamkeit
- Concluding Remarks
- Foreword
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them