Filter
(found 148 products)
Book cover image
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and ...
Testing Code Security
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.
https://magrudy-assets.storage.googleapis.com/9780367389017.jpg
78.700000 USD

Testing Code Security

by Maura A. van der Linden
Paperback / softback
Book cover image
Embodied conversational agents (ECA) and speech-based human-machine interfaces can together represent more advanced and more natural human-machine interaction. Fusion of both topics is a challenging agenda in research and production spheres. The important goal of human-machine interfaces is to provide content or functionality in the form of a dialog resembling ...
Coverbal Synchrony in Human-Machine Interaction
Embodied conversational agents (ECA) and speech-based human-machine interfaces can together represent more advanced and more natural human-machine interaction. Fusion of both topics is a challenging agenda in research and production spheres. The important goal of human-machine interfaces is to provide content or functionality in the form of a dialog resembling face-to-face conversations. All natural interfaces strive to exploit and use different communication strategies that provide additional meaning to the content, whether they are human-machine interfaces for controlling an application or different ECA-based human-machine interfaces directly simulating face-to-face conversation. Coverbal Synchrony in Human-Machine Interaction presents state-of-the-art concepts of advanced environment-independent multimodal human-machine interfaces that can be used in different contexts, ranging from simple multimodal web-browsers (for example, multimodal content reader) to more complex multimodal human-machine interfaces for ambient intelligent environments (such as supportive environments for elderly and agent-guided household environments). They can also be used in different computing environments-from pervasive computing to desktop environments. Within these concepts, the contributors discuss several communication strategies, used to provide different aspects of human-machine interaction.
https://magrudy-assets.storage.googleapis.com/9780367379292.jpg
78.700000 USD
Paperback / softback
Book cover image
Device miniaturization, wireless computing, and mobile communication are driving ubiquitous, pervasive, and transparent computing. Supporting these rapidly evolving technologies requires middleware solutions that address connectivity-level, location-dependent, and context-dependent issues. The Handbook of Mobile Middleware is an exhaustive overview of recent developments in the various fields related to this infrastructure software. ...
The Handbook of Mobile Middleware
Device miniaturization, wireless computing, and mobile communication are driving ubiquitous, pervasive, and transparent computing. Supporting these rapidly evolving technologies requires middleware solutions that address connectivity-level, location-dependent, and context-dependent issues. The Handbook of Mobile Middleware is an exhaustive overview of recent developments in the various fields related to this infrastructure software. Authored by internationally recognized experts, this advanced reference integrates valuable insight gained from actual system deployments. It begins by presenting mobile middleware requirements and technologies, then offers solutions organized by such challenges as mobility/disconnection handling, location-based support, and context-based support. This volume focuses on the application domains in which mobile middleware has demonstrated its feasibility and effectiveness and details the pros, cons, and trade-offs of each solution. The book also analyzes future directions of mobile applications, including wearable computing, ubiquitous entertainment, and context-dependent distribution.
https://magrudy-assets.storage.googleapis.com/9780367390105.jpg
78.700000 USD

The Handbook of Mobile Middleware

Paperback / softback
Book cover image
The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy ...
Enterprise Systems Integration
The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration, Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives, knowledge, and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively, these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies, you must successfully deploy ERP systems within budget and on time. In addition, you must be able to integrate them into the rest of the enterprise. Still, ERP software does not make up the full picture of today's enterprise. Legacy systems, e-commerce and other Web-based systems, client/server applications, networks and communications systems, data warehousing, and integrated databases enter into the mix. Enterprise Systems Integration, Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.
https://magrudy-assets.storage.googleapis.com/9780367396947.jpg
78.700000 USD
Paperback / softback
Book cover image
The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed ...
Financial Services Information Systems
The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed to support them. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining. Get a handle on all these new and newer ripples with Financial Services Information Systems. Here, in this exhaustive new guide and reference book, industry guru Jessica Keyes gives you the no-nonsense scoop on not just the tried and true IT tools of today, but also the up-and-coming hot technologies of tomorrow, and how to plan for them. Financial Services Information Systems addresses challenges and solutions associated with: supporting the self-service revolution by servicing kiosks and ATMs efficiently and economically, straight-through processing for the securities industry, outsourcing business communications in the insurance industry, distributed integration as a cost-effective alternative to data warehousing, and putting inbound fax automation to work in financial organizations.
https://magrudy-assets.storage.googleapis.com/9780367398828.jpg
78.700000 USD
Paperback / softback
Book cover image
Rapid advancements in the application of soft computing tools and techniques have proven valuable in the development of highly scalable systems and resulted in brilliant applications, including those in biometric identification, interactive voice response systems, and data mining. Although many resources on the subject adequately cover the theoretic concepts, few ...
Real Life Applications of Soft Computing
Rapid advancements in the application of soft computing tools and techniques have proven valuable in the development of highly scalable systems and resulted in brilliant applications, including those in biometric identification, interactive voice response systems, and data mining. Although many resources on the subject adequately cover the theoretic concepts, few provide clear insight into practical application. Filling this need, Real Life Applications of Soft Computing explains such applications, including the underlying technology and its implementation. While these systems initially seem complex, the authors clearly demonstrate how they can be modeled, designed, and implemented. Written in a manner that makes it accessible to novices, the book begins by covering the theoretical foundations of soft computing. It supplies a concise explanation of various models, principles, algorithms, tools, and techniques, including artificial neural networks, fuzzy systems, evolutionary algorithms, and hybrid algorithms. Supplying in-depth exposure to real life systems, the text provides: Multi-dimensional coverage supported by references, figures, and tables Warnings about common pitfalls in the implementation process, as well as detailed examinations of possible solutions A timely account of developments in various areas of application Solved examples and exercises in each chapter Detailing a wide range of contemporary applications, the text includes coverage of those in biometric systems, including physiological and behavioral biometrics. It also examines applications in legal threat assessment, robotic path planning, and navigation control. The authors consider fusion methods in biometrics and bioinformatics and also provide effective disease identification techniques. Co
https://magrudy-assets.storage.googleapis.com/9780367384012.jpg
78.700000 USD

Real Life Applications of Soft Computing

by Rahul Kala, Ritu Tiwari, Anupam Shukla
Paperback / softback
Book cover image
The widespread deployment of millions of current and emerging software applications has placed software economic studies among the most critical of any form of business analysis. Unfortunately, a lack of an integrated suite of metrics makes software economic analysis extremely difficult. The International Function Point Users Group (IFPUG), a nonprofit ...
The IFPUG Guide to IT and Software Measurement
The widespread deployment of millions of current and emerging software applications has placed software economic studies among the most critical of any form of business analysis. Unfortunately, a lack of an integrated suite of metrics makes software economic analysis extremely difficult. The International Function Point Users Group (IFPUG), a nonprofit and member-governed organization, has become the recognized leader in promoting the effective management of application software development and maintenance activities. The IFPUG Guide to IT and Software Measurement brings together 52 leading software measurement experts from 13 different countries who share their insights and expertise. Covering measurement programs, function points in measurement, new technologies, and metrics analysis, this volume: Illustrates software measurement's role in new and emerging technologies Addresses the impact of agile development on software measurement Presents measurement as a powerful tool for auditing and accountability Includes metrics for the CIO Edited by IFPUG's Management and Reporting Committee, the text is useful for IT project managers, process improvement specialists, measurement professionals, and business professionals who need to interact with IT professionals and participate in IT decision-making. It includes coverage of cloud computing, agile development, quantitative project management, process improvement, measurement as a tool in accountability, project ROI measurement, metrics for the CIO, value stream mapping, and benchmarking.
https://magrudy-assets.storage.googleapis.com/9780367381479.jpg
78.700000 USD
Paperback / softback
Book cover image
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job. The ...
VMware Certified Professional Test Prep
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job. The guide covers the body of knowledge required of a VMware certified professional, provides the tools needed to keep that knowledge current, and helps develop the wherewithal to apply that knowledge to real solutions. Covering the ESX 3.0.x through ESX 3.5.x releases that are the focus of the VCP test, this volume: Reproduces many of the real-world examples that have proven very helpful to students in the authors' classrooms Applies step-by-step instructions to more than 700 software screenshots, providing a virtual hands-on experience Points to Web resources that will keep the reader current with the latest advances Includes logistical information on the test, including costs and class location Covers background information on various topics such as storage and networking to provide a complete understanding on the implementation of a VMWare VI3 solution Provides questions at the end of the chapters that cover the important concepts Also of great use to those administrators who have already received their certification, this book includes solutions to many of the common gotchas that they are certain to encounter in virtual environments. In particular, capacity-planning concepts reveal the specific details needed to make full use of VMware's unique resource management capabilities. Troubleshooting tips appear throughout the book, making it a useful resource in the virtualized datacenter.
https://magrudy-assets.storage.googleapis.com/9780367386726.jpg
78.700000 USD

VMware Certified Professional Test Prep

by John Ilgenfritz, Merle Ilgenfritz
Paperback / softback
Book cover image
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to ...
Building and Maintaining a Data Warehouse
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is theoretically sound, is not especially easy. That's the challenge that Building and Maintaininga Data Warehouse answers. Based on a foundation of industry-accepted principles, this work provides an easy-to-follow approach that is cohesive and holistic. By offering the perspective of a successful data warehouse, as well as that of a failed one, this workdetails those factors that must be accomplished and those that are best avoided. Organized to logically progress from more general to specific information, this valuable guide: Presents areas of a data warehouse individually and in sequence, showing how each piece becomes a working part of the whole Examines the concepts and principles that are at the foundation of every successful data warehouse Explains how to recognize and attend to problematic gaps in an established data warehouse Provides the big picture perspective that planners and executives require Those considering the planning and creation of a data warehouse, as well as those who've already built one will profit greatly from the insights garnered by the author during his years of creating and gathering information on state-of-the-art data warehouses that are accessible, convenient, and reliable.
https://magrudy-assets.storage.googleapis.com/9780367387648.jpg
78.700000 USD
Paperback / softback
Book cover image
Creative companies are distinguished by their ability to adapt and thrive in a dynamic, changing economy. Their products and services stand out in the market, and these companies' ability to be agile and innovative is key to their success. Creative, Efficient, and Effective Project Management supplies an in-depth discussion of ...
Creative, Efficient, and Effective Project Management
Creative companies are distinguished by their ability to adapt and thrive in a dynamic, changing economy. Their products and services stand out in the market, and these companies' ability to be agile and innovative is key to their success. Creative, Efficient, and Effective Project Management supplies an in-depth discussion of creativity and its relationship to project management. Specifically, it explains how the tools and techniques of creativity can be used to enhance the five processes executed during a project: defining, planning, executing, monitoring and controlling, and closing. Establishing the groundwork for encouraging and sustaining creativity in your projects, the book details the benefits of integrating creativity in projects. It discusses common, and not so common, tools and techniques for developing project management deliverables and identifies the challenges that can arise when using creativity in a project. It also details ten little-known facts that can help you overcome the obstacles that often prevent organizations from tapping into the power of creativity in their projects. Each chapter includes a checklist and a case study on the application of the concepts presented. The book also indicates, where applicable, how the topics of discussion relate to the Project Management Institute's (PMI (R)) Project Management Body of Knowledge (PMBOK (R)). Creativity resides in everyone, but for the most part remains untapped. In this book, you will find thoughts, tools, and techniques that will enable you to tap into your team's creative energy and direct it towards achieving your project goals and objectives.
https://magrudy-assets.storage.googleapis.com/9780367379339.jpg
78.700000 USD
Paperback / softback
Book cover image
Here's an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously survived smallpox did not contract the disease a second time. In fact, these survivors were often called upon to attend to those afflicted with smallpox. Consider this book as ...
The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure
Here's an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously survived smallpox did not contract the disease a second time. In fact, these survivors were often called upon to attend to those afflicted with smallpox. Consider this book as the continuum of the Immunization legacy as applied to the digital world. The business of attack-as-a-service (AaaS) is real and is not going away any time soon. The Russians and Chinese have recently been suspected of providing AaaS to nefarious organizations. This book offers the most innovative solution to this critical issue. The Cognitive Early Warning Predictive System (CEWPS (TM)) described in the book replicates the human immune system and creates its counterpart, the digital immune system . A CEWPS inoculates critical systems with vaccination as a service (VaaS). This is achieved through its Smart Vaccine (TM), the holy grail of digital immunity. From the CEWPS arsenal, the early warning predictive component is the intelligent and self-trained AI reasoning engine that acquires knowledge from past attacks and predicts, probable incoming cyberattacks. The Cognitive Early Warning Predictive System Using the Smart Vaccine discusses asymmetric cyber warfare, the vulnerabilities of critical infrastructure, and the shortcomings of the anti-virus technologies. Next, it describes the enabling technologies required to build a Digital Immune System. CEWPS is the new paradigm that extends the continuum of cyber security. This book includes vivid attack scenarios on some major infrastructures and describes how CEWPS is used to deter and annihilate the attacks.
https://magrudy-assets.storage.googleapis.com/9780367377052.jpg
78.700000 USD
Paperback / softback
Book cover image
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so ...
Architecting Secure Software Systems
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase, continuing this sharp focus into security design, secured programming, security testing, and secured deployment. Outlines Protection Protocols for Numerous Applications Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers, engineers, and architects to approach security in a holistic fashion at the beginning of the software development li
https://magrudy-assets.storage.googleapis.com/9780367386184.jpg
78.700000 USD

Architecting Secure Software Systems

by Manish Chaitanya, Asoke K. Talukder
Paperback / softback
Book cover image
Software Designers in Action: A Human-Centric Look at Design Work examines how developers actually perform software design in their day-to-day work. The book offers a comprehensive look at early software design, exploring the work of professional designers from a range of different viewpoints. Divided into four sections, it discusses various ...
Software Designers in Action: A Human-Centric Look at Design Work
Software Designers in Action: A Human-Centric Look at Design Work examines how developers actually perform software design in their day-to-day work. The book offers a comprehensive look at early software design, exploring the work of professional designers from a range of different viewpoints. Divided into four sections, it discusses various theoretical examinations of the nature of software design and particular design problems, critically assesses the processes and practices that designers follow, presents in-depth accounts of key supporting elements of design, and explores the role of human interaction in software design. With highly interdisciplinary contributions that together provide a unique perspective on software development, this book helps readers understand how software design is performed today and encourages the current community of researchers to push the field forward.
https://magrudy-assets.storage.googleapis.com/9780367379469.jpg
78.700000 USD
Paperback / softback
Book cover image
Presenting cutting-edge insights from industry practitioners, .NET 4 for Enterprise Architects and Developers supplies in-depth coverage of the various server-side features of Microsoft .NET Framework 4 that can be leveraged in Enterprise Application development. It provides a fundamental understanding of the technical aspects of implementation and details a step-by-step approach ...
.NET 4 for Enterprise Architects and Developers
Presenting cutting-edge insights from industry practitioners, .NET 4 for Enterprise Architects and Developers supplies in-depth coverage of the various server-side features of Microsoft .NET Framework 4 that can be leveraged in Enterprise Application development. It provides a fundamental understanding of the technical aspects of implementation and details a step-by-step approach for real-life implementation using specific .NET 4 features. The book is useful to architects, developers, students, and technology enthusiasts who wish to learn more about .NET 4. It illustrates key scenarios and specific features with code snippets to help you understand the technical aspects of implementation. Praise for the book: ... presents broad and deep coverage of key technologies released as part of .NET Framework 4. -Kris Gopalakrishnan, Executive Co-Chairman, Chairperson, Executive Council of Infosys Ltd. ... the authors introduce us to new features of .NET, provide deep insights into it, and explain how it can be applied in enterprise application development scenarios. ... highly recommended ... . -Naveen Kumar, Principal Architect, Microsoft Technology Center, Infosys Ltd. ... excellent in-depth coverage of .NET Framework 4 ... . -Subu Goparaju, Senior Vice President, Head of Infosys Labs, Infosys Ltd.
https://magrudy-assets.storage.googleapis.com/9780367382018.jpg
78.700000 USD
Paperback / softback
Book cover image
Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic ...
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the volume describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, Northrop Grumman, and other market leaders. About the Editor Jay Liebowitz, D.Sc., is a full professor in the Graduate Division of Business and Management and program director for the Graduate Certificate in Competitive Intelligence at Johns Hopkins University. The first knowledge management officer at NASA Goddard Space Flight Center, he also served as the Robert W. Deutsch Distinguished Professor of Information Systems at the University of Maryland-Baltimore County, professor of Management Science at George Washington University, and Chaired Professor of Artificial Intelligence (AI) at the U.S. Army War College. A founder and chairperson of The World Congress on Expert Systems, he is a Fulbright Scholar, IEEE-USA Federal Communications Commission Executive Fellow, and Computer Educator of the Year (International Association for Computer Information Systems).
https://magrudy-assets.storage.googleapis.com/9780367391010.jpg
78.700000 USD
Paperback / softback
Book cover image
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in ...
Embedded Linux System Design and Development
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.
https://magrudy-assets.storage.googleapis.com/9780367391416.jpg
78.700000 USD

Embedded Linux System Design and Development

by Sriram Neelakandan, Amol Lad, P. Raghavan
Paperback / softback
Book cover image
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: A Process-Driven Approach discusses human resources, software engineering, and technology ...
Software Project Management: A Process-Driven Approach
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: A Process-Driven Approach discusses human resources, software engineering, and technology to a level that exceeds most university-level courses on the subject. The book is organized into five parts. Part I defines project management with information on project and process specifics and choices, the skills and experience needed, the tools available, and the human resources organization and management that brings it all together. Part II explores software life-cycle management. Part III tackles software engineering processes and the range of processing models devised by several domestic and international organizations. Part IV reveals the human side of project management with chapters on managing the team, the suppliers, and the customers themselves. Part V wraps up coverage with a look at the technology, techniques, templates, and checklists that can help your project teams meet and exceed their goals. A running case study provides authoritative insight and insider information on the tools and techniques required to ensure product quality, reduce costs, and meet project deadlines. Praise for the book: This book presents all aspects of modern project management practices ... includes a wealth of quality templates that practitioners can use to build their own tools. ... equally useful to students and professionals alike. -Maqbool Patel, PhD, SVP/CTO/Partner, Acuitec
https://magrudy-assets.storage.googleapis.com/9780367381981.jpg
78.700000 USD
Paperback / softback
Book cover image
To achieve consistent software project success under the pressures of today's software development environment, software organizations require achievable plans including viable estimates of schedule, resources, and risks. To estimate realistically, you must understand how to apply sound estimation processes, tools, and data. Software Sizing, Estimation, and Risk Management: When Performance ...
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
To achieve consistent software project success under the pressures of today's software development environment, software organizations require achievable plans including viable estimates of schedule, resources, and risks. To estimate realistically, you must understand how to apply sound estimation processes, tools, and data. Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and processes to identify and manage risk. The authors use their expertise in sizing, estimation, process engineering, and risk management to clearly demonstrate problems that make many estimates crumble and solutions that provide successful project plans. The book offers insight not available anywhere else, enabling you to recognize and avoid downstream impacts resulting from poor estimates.
https://magrudy-assets.storage.googleapis.com/9780367391041.jpg
78.700000 USD
Paperback / softback
Book cover image
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), ...
Process-Driven SOA: Patterns for Aligning Business and IT
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), and Event-Driven Architecture (EDA) are required. The book demonstrates that SOA is not limited to technical issues but instead, is a holistic challenge where aspects of SOA, EDA, and BPM must be addressed together. An ideal guide for SOA solution architects, designers, developers, managers, and students about to enter the field, the book: Provides an accessible introduction to basic and more advanced concepts in process-driven SOA Illustrates how to manage the complexities of business aligned IT architectures with detailed examples and industry cases Outlines a step-by-step design process using proven patterns to address complex business/ technical scenarios Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0 Describing how to synchronize parallel enterprise processes, the authors explain how to cope with the architectural and design decisions you are likely to encounter when designing and implementing process-driven SOA systems. The decisions are described in the form of software patterns to provide you with a practical guideline for addressing key problems using time-tested solutions.
https://magrudy-assets.storage.googleapis.com/9780367381929.jpg
78.700000 USD
Paperback / softback
Book cover image
When used together effectively, computer-aided design (CAD) and geospatial information systems (GIS) have a solid track record for streamlining decision making and reducing inefficiencies in the design, planning, and execution of critical operations and projects. And a growing number of engineering tasks in numerous fields-including design, architecture, construction, and asset ...
CAD and GIS Integration
When used together effectively, computer-aided design (CAD) and geospatial information systems (GIS) have a solid track record for streamlining decision making and reducing inefficiencies in the design, planning, and execution of critical operations and projects. And a growing number of engineering tasks in numerous fields-including design, architecture, construction, and asset management-now require the knowledge of many interrelated yet disconnected CAD/GIS tools and task-specific software. A multidisciplinary resource delineating existing and emerging solutions for CAD/GIS integration issues, CAD and GIS Integration provides a clear understanding of the state of the art in this area of growing importance. It brings together in-depth descriptions of existing and emerging techniques, methodologies, and technologies to examine approaches that enable data and operations interoperability between CAD/GIS. Starting with a review of fundamental concepts and theories, the book: Addresses contemporary issues and challenges Provides a collection of helpful methodologies, techniques, and technologies for integrating CAD and GIS Presents balanced coverage of CAD and GIS technologies and applications Highlights emerging trends in CAD/GIS integration Explores the state-of-the-art in the application of CAD and GIS technologies, data, and operations for decision making From early developments to current trends and future directions, this concise resource allows you to get up to speed quickly on what it takes to get the most of these two dynamic technologies. Numerous example applications of effective CAD/GIS integration provide the understanding needed to improve designs, make better decisions, and reduce or even eliminate costly errors in your next project.
https://magrudy-assets.storage.googleapis.com/9780367384746.jpg
78.700000 USD

CAD and GIS Integration

by Burcu Akinci, Hassan A. Karimi
Paperback / softback
Book cover image
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure ...
Public Key Infrastructure: Building Trusted Applications and Web Services
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.
https://magrudy-assets.storage.googleapis.com/9780367394325.jpg
78.700000 USD
Paperback / softback
Book cover image
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform ...
Android Security: Attacks and Defenses
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system, including import directories and files, so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www.androidinsecurity.com. It explains how to crack SecureApp.apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics, mobile device pen-testing methodology, malware analysis, secure coding, and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book's site includes a resource section where readers can access downloads for applications, tools created by users, and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text, wherever needed. Visit www.androidinsecurity.com for more information.
https://magrudy-assets.storage.googleapis.com/9780367380182.jpg
78.700000 USD

Android Security: Attacks and Defenses

by Abhishek Dubey, Anmol Misra
Paperback / softback
Book cover image
Extending beyond the technical architecture to the very philosophy of how a business should operate, the Service Orientation approach establishes fluidity across boundaries to provide agility, transparency, and fundamental competitive advantage. Service Oriented Enterprises brings the concept of service orientation from the IT department to the boardroom, applying the precepts ...
Service Oriented Enterprises
Extending beyond the technical architecture to the very philosophy of how a business should operate, the Service Orientation approach establishes fluidity across boundaries to provide agility, transparency, and fundamental competitive advantage. Service Oriented Enterprises brings the concept of service orientation from the IT department to the boardroom, applying the precepts of service oriented technology to the underlying dynamics of how a business operates. Implementing a technological concept as a cultural paradigm, the SOE succeeds by combining the best features from virtual, extended, real-time, and resilient enterprises to serve not just its customers, but also its trading partners, shareholders and employees. Building primarily on the success of the Internet and the automation of business policies and processes, the Service Oriented Enterprise (SOE) is defined by three essential layers: the enterprise performance layer, the business process management layer, and the underlying service oriented architecture. This book focuses primarily on layers two and three and how the fundamental dynamics of a business can be altered when these concepts are applied to both architecture and culture. Beginning with an overview of the emerging SOE culture, the text contrasts the new service-oriented methodologies with traditional waterfall and iterative methodologies. Emphasizing Web Service strategies for description, discovery, and deployment techniques, the author goes deeper into service-oriented concepts describing the business process management suite as the central core of the SOE, and introducing the Enterprise Service Bus as the backbone for integration. The text describe how modeling, executing, and continuously improving the business process and business policies lends to the development of a common language between business and IT. The book concludes by expanding on these concepts and delving into the societal and behavioral aspects of the Service
https://magrudy-assets.storage.googleapis.com/9780367390174.jpg
78.700000 USD
Paperback / softback
Book cover image
A developer's knowledge of a computing system's requirements is necessarily imperfect because organizations change. Many requirements lie in the future and are unknowable at the time the system is designed and built. To avoid burdensome maintenance costs developers must therefore rely on a system's ability to change gracefully-its flexibility. Flexible ...
Flexible Software Design: Systems Development for Changing Requirements
A developer's knowledge of a computing system's requirements is necessarily imperfect because organizations change. Many requirements lie in the future and are unknowable at the time the system is designed and built. To avoid burdensome maintenance costs developers must therefore rely on a system's ability to change gracefully-its flexibility. Flexible Software Design: Systems Development for Changing Requirements demonstrates the design principles and techniques that enable the design of software that empowers business staff to make functional changes to their systems with little or no professional IT intervention. The book concentrates on the design aspects of system development, the area with the most flexibility leverage. Divided into four parts, the text begins by introducing the fundamental concepts of flexibility, explaining the reality of imperfect knowledge and how development participants must change their thinking to implement flexible software. The second part covers design guidelines, stable identifiers, stable information structures, the Generic Entity Cloud concept, and regulatory mechanisms that give business staff control over system modifications. Part three relates strategic information systems planning to flexible systems. It examines the elicitation of requirements and the relevance of agile methods in a flexible systems environment. It also discusses practical aspects of stable identifier design and compares the testing of traditional and flexible software. In part four, the book concludes with details of the flexible UniverSIS system and an explanation of the applications and extensions of the Generic Entity Cloud tools. The combination of smart design and smart work offered in Flexible Software Design can materially benefit your organization by radically reducing the systems maintenance burden.
https://magrudy-assets.storage.googleapis.com/9780367392642.jpg
78.700000 USD

Flexible Software Design: Systems Development for Changing Requirements

by Cindy Johnson, Robert Miller, Walter W. Woolfolk, Bruce Johnson
Paperback / softback
Book cover image
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries. Detailing the various aspects of SPLE implementation in different domains, Applied Software Product Line Engineering documents best practices with regard to system development. Expert ...
Applied Software Product Line Engineering
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries. Detailing the various aspects of SPLE implementation in different domains, Applied Software Product Line Engineering documents best practices with regard to system development. Expert contributors from academia and industry come together and focus on core asset development, product development, and management, addressing the process, technical, and organizational issues needed to meet the growing demand for information. They detail the adoption and diffusion of SPLE as a primary software development paradigm and also address technical and managerial issues in software product line engineering. Providing an authoritative perspective of the latest research and practice in SLPE, the text: Presents in-depth discussions and many industry / case studies Covers applications in various domains including automotive, business process management, and defense Organized according to the organizational, process, and technical aspects of software product lines within an organization Provides the expertise of a distinguished panel of global contributors Ever-increasing global competition coupled with a fragile world economy means that the pressure is on for software engineers and software process improvement professionals to find ways to meet the needs of expanding markets-with greater efficiency and effectiveness. This book arms readers with the insight needed to harness the power of SPLE to increase productivity, reduce time to market, and to handle the growing diversity in the quickly evolving global marketplace.
https://magrudy-assets.storage.googleapis.com/9780367384661.jpg
78.700000 USD
Paperback / softback
Book cover image
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures ...
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.
https://magrudy-assets.storage.googleapis.com/9780367380038.jpg
78.700000 USD
Paperback / softback
Book cover image
Characterized by lightning quick innovation, abrupt shifts in technology, and shorter lifecycles, the marketing of IT products and services presents a unique set of challenges and often requires IT managers and developers to get involved in the marketing process. Marketing IT Products and Services is written to help busy IT ...
Marketing IT Products and Services
Characterized by lightning quick innovation, abrupt shifts in technology, and shorter lifecycles, the marketing of IT products and services presents a unique set of challenges and often requires IT managers and developers to get involved in the marketing process. Marketing IT Products and Services is written to help busy IT managers and marketing managers get up to speed quickly and easily on what's needed to develop effective marketing strategies and campaigns. Focusing on the unique issues involved, this one-stop resource provides everything needed to understand the roles, responsibilities, and management techniques essential for the development of successful strategies. It covers strategic market planning, targeting markets, researching markets, understanding the competition, integrating market and sales strategies, nuances of global markets, developing marketing budgets, pricing, and implementing marketing campaigns. A plethora of appendices included on the book's CD allows you to get up and running right away. Aside from a complete marketing glossary, two complete marketing plans-one for a hardware product; the other for a software product-enable you to bypass the scut work of developing a marketing plan so you can focus on the creative aspects of marketing. Because a marketing plan is closely aligned with an organization's business and strategic plans, this book provides you with templates for both of these, as well as a template for that all-important business plan executive summary. The CD also features loads of fill-in templates including customer and competitor analysis surveys, sample press releases, letters of agreement, demographic and target market worksheets, and cost benefit forms. If you have a marketing need, this book has an effective template to meet that need.
https://magrudy-assets.storage.googleapis.com/9780367385248.jpg
78.700000 USD
Paperback / softback
Book cover image
As the complexity of today's networked computer systems grows, they become increasingly difficult to understand, predict, and control. Addressing these challenges requires new approaches to building these systems. Adaptive, Dynamic, and Resilient Systems supplies readers with various perspectives of the critical infrastructure that systems of networked computers rely on. It ...
Adaptive, Dynamic, and Resilient Systems
As the complexity of today's networked computer systems grows, they become increasingly difficult to understand, predict, and control. Addressing these challenges requires new approaches to building these systems. Adaptive, Dynamic, and Resilient Systems supplies readers with various perspectives of the critical infrastructure that systems of networked computers rely on. It introduces the key issues, describes their interrelationships, and presents new research in support of these areas. The book presents the insights of a different group of international experts in each chapter. Reporting on recent developments in adaptive systems, it begins with a survey of application fields. It explains the requirements of such fields in terms of adaptation and resilience. It also provides some abstract relationship graphs that illustrate the key attributes of distributed systems to supply you with a better understanding of these factors and their dependencies. The text examines resilient adaptive systems from the perspectives of mobile, infrastructure, and enterprise systems and protecting critical infrastructure. It details various approaches for building adaptive, dynamic, and resilient systems-including agile, grid, and autonomic computing; multi-agent-based and biologically inspired approaches; and self-organizing systems. The book includes many stories of successful applications that illustrate a diversified range of cutting-edge approaches. It concludes by covering related topics and techniques that can help to boost adaptation and resilience in your systems.
https://magrudy-assets.storage.googleapis.com/9780367378608.jpg
78.700000 USD
Paperback / softback
Book cover image
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to ...
Secure Data Provenance and Inference Control with Semantic Web
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.
https://magrudy-assets.storage.googleapis.com/9780367378448.jpg
78.700000 USD

Secure Data Provenance and Inference Control with Semantic Web

by Vaibhav Khadilkar, Murat Kantarcioglu, Tyrone Cadenhead, Bhavani Thuraisingham
Paperback / softback
Book cover image
The managerial practices that successfully drove industry for decades have become insufficient to support the rapidly changing business landscape. Companies around the world are being challenged to improve performance, reshape operations, and adapt swiftly to new opportunities. With an abundance of improvement methodologies and frameworks like BPM, BPI, Six Sigma, ...
Improving Business Process Performance: Gain Agility, Create Value, and Achieve Success
The managerial practices that successfully drove industry for decades have become insufficient to support the rapidly changing business landscape. Companies around the world are being challenged to improve performance, reshape operations, and adapt swiftly to new opportunities. With an abundance of improvement methodologies and frameworks like BPM, BPI, Six Sigma, and Lean, many question where to begin. Improving Business Process Performance: Gain Agility, Create Value, and Achieve Success surveys and integrates the quantitative improvement approaches currently gaining momentum-including Goal Driven Measurements (GQM), Business Process Management (BPM), Lean Methodology, and the Balanced Score Card-to show you exactly where to begin. The author details a methodology for building a measurements framework that will help you monitor events, and also provides a feedback loop for analysis, goal, and strategy adjustments. This framework can be customized and linked to your company's overall strategy to supply critical feedback on your improvement efforts.
https://magrudy-assets.storage.googleapis.com/9780367382629.jpg
78.700000 USD
Paperback / softback
Page 1 of 5