Discovering Real Business Requirements for Software Project Success

Discovering Real Business Requirements for Software Project Success

Author: Robin F. Goldsmith

Publisher: Artech House

Published: 2004

Total Pages: 248

ISBN-13: 9781580537711

DOWNLOAD EBOOK

While a number of books on the market deal with software requirements, this is the first resource to offer you a methodology for discovering and testing the real business requirements that software products must meet in order to provide value. The book provides you with practical techniques that help prevent the main causes of requirements creep, which in turn enhances software development success and satisfaction among the organizations that apply these approaches. Complementing discovery methods, you also learn more than 21 ways to test business requirements from the perspectives of assessing suitability of form, identifying overlooked requirements, and evaluating substance and content. The powerful techniques and methods presented are applied to a real business case from a company recognized for world-class excellence. You are introduced to the innovative Problem Pyramidtm technique which helps you more reliably identify the real problem and requirements content. From an examination of key methods for gathering and understanding information about requirements, to seven guidelines for documenting and communicating requirements, while avoiding analysis paralysis, this book is a comprehensive, single source for uncovering the real business requirements for your software development projects.


Practical Insight Into CMMI

Practical Insight Into CMMI

Author: Tim Kasse

Publisher: Artech House

Published: 2004

Total Pages: 336

ISBN-13: 9781580536257

DOWNLOAD EBOOK

Taking you beyond the Capability Maturity Model° to the integrated world of systems and software, this comprehensive resource presents CMMI° in a manner that easy to comprehend by higher-level managers and practitioners alike. The book gives you a clear picture of the activities an organization would be engaged in if their systems and software engineering processes were based on CMMI°. You learn the roles and responsibilities of professionals at all levels, from senior and middle management to project leaders and quality assurance personnel.


Guide to the Software Engineering Body of Knowledge (Swebok(r))

Guide to the Software Engineering Body of Knowledge (Swebok(r))

Author: IEEE Computer Society

Publisher:

Published: 2014

Total Pages: 348

ISBN-13: 9780769551661

DOWNLOAD EBOOK

In the Guide to the Software Engineering Body of Knowledge (SWEBOK(R) Guide), the IEEE Computer Society establishes a baseline for the body of knowledge for the field of software engineering, and the work supports the Society's responsibility to promote the advancement of both theory and practice in this field. It should be noted that the Guide does not purport to define the body of knowledge but rather to serve as a compendium and guide to the knowledge that has been developing and evolving over the past four decades. Now in Version 3.0, the Guide's 15 knowledge areas summarize generally accepted topics and list references for detailed information. The editors for Version 3.0 of the SWEBOK(R) Guide are Pierre Bourque (Ecole de technologie superieure (ETS), Universite du Quebec) and Richard E. (Dick) Fairley (Software and Systems Engineering Associates (S2EA)).


Security Technologies for the World Wide Web

Security Technologies for the World Wide Web

Author: Rolf Oppliger

Publisher: Artech House

Published: 2003

Total Pages: 448

ISBN-13: 9781580535854

DOWNLOAD EBOOK

This newly revised edition of the Artech House bestseller brings you the most, up-to-date, comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. You also find coverage of entirely new topics such as Microsoft.NET Passport. From HTTP security, firewalls and proxy servers, cryptographic security protocols, electronic payment systemsOC to public key infrastructures, authentication and authorization infrastructures, and client-side security, the book offers an in-depth understanding of the key technologies and standards used to secure the World Wide Web, Web-based applications, and Web services."


Developing Secure Distributed Systems with CORBA

Developing Secure Distributed Systems with CORBA

Author: Ulrich Lang

Publisher: Artech House

Published: 2002

Total Pages: 336

ISBN-13: 9781580535618

DOWNLOAD EBOOK

This book is a clearly written, well structured hands-on guide for the professional software developer and engineer who needs to build secure applications with CORBA. It offers guidance securing CORBA applications, integrating security infastructure with COBRA applications, evaluating the security effectiveness of distributed applications, and MICOSec CORBA security implementation. Professionals get a comprehensive study of CORBA security architecture, providing a better understanding of its goals and limitations. It serves as a complete reference for understanding security in distributed systems. The book generously illustrates the usage of the MICOSec CORBA security services implementation, including important information on the installation and configuration of MICOSec, usage of two different kinds of application-facing interfaces, and the configuration of CORBA security not containing any security-related modifications.


Implementing Electronic Card Payment Systems

Implementing Electronic Card Payment Systems

Author: Cristian Radu

Publisher: Artech House

Published: 2003

Total Pages: 468

ISBN-13: 9781580538039

DOWNLOAD EBOOK

Radu, an electrical engineer who works as a consultant for payment systems and telecom operations in Belgium, has written a thorough description of EMV chip card technology. Following a description of chip migration with EMV and its use for debit and credit cards, Radu details the processing of such cards, including remote card payments, with attention to various formats. A lengthy section of appendices details the technology's security framework, threats, services, mechanisms, and risk management. Annotation copyrighted by Book News, Inc., Portland, OR


Bluetooth Security

Bluetooth Security

Author: Christian Gehrmann

Publisher: Artech House

Published: 2004

Total Pages: 222

ISBN-13: 1580535046

DOWNLOAD EBOOK

This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard's latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.


Multicast and Group Security

Multicast and Group Security

Author: Thomas Hardjono

Publisher: Artech House

Published: 2003

Total Pages: 344

ISBN-13: 9781580536592

DOWNLOAD EBOOK

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.


Design and Development of Web Information Systems

Design and Development of Web Information Systems

Author: Klaus-Dieter Schewe

Publisher: Springer

Published: 2019-04-01

Total Pages: 599

ISBN-13: 3662588242

DOWNLOAD EBOOK

This book describes the research of the authors over more than a decade on an end-to-end methodology for the design and development of Web Information Systems (WIS). It covers syntactics, semantics and pragmatics of WIS, introduces sophisticated concepts for conceptual modelling, provides integrated foundations for all these concepts and integrates them into the co-design method for systematic WIS development. WIS, i.e. data-intensive information systems that are realized in a way that arbitrary users can access them via web browsers, constitute a prominent class of information systems, for which acceptance by its a priori unknown users in varying contexts with respect to the presented content, the ease of functionality provided and the attraction of the layout adds novel challenges for modelling, design and development. This book is structured into four parts. Part I, Web Information Systems – General Aspects, gives a general introduction to WIS describing the challenges for their development, and provides a characterization by six decisive aspects: intention, usage, content, functionality, context and presentation. Part II, High-Level WIS Design – Strategic Analysis and Usage Modelling with Storyboarding, introduces methods for high-level design of WIS covering strategic aspects and the storyboarding method, which is discussed from syntactic, semantic and pragmatic perspectives. Part III, Conceptual WIS Design – Rigorous Modelling of Web Information Systems and their Layout with Web Interaction Types and Screenography, continues with conceptual design of WIS including layout and playout. This introduces the decisive web interaction types, the screenography method and adaptation aspects. The final Part IV, Rationale of the Co-Design Methodology and Systematic Development of Web Information Systems, describes the co-design method for WIS development and its application for the systematic engineering of systems. The book addresses the research community, and at the same time can be used for education of graduate students and as methodological support for professional WIS developers. For the WIS research community it provides methods for WIS modelling on all levels of abstraction including theoretical foundations and inference mechanisms as well as a sophisticated end-to-end methodology for systematic WIS engineering from requirements elicitation over conceptual modelling to aspects of implementation, layout and playout. For students and professional developers the book can be used as a whole for educational courses on WIS design and development, as well as for more specific courses on conceptual modelling of WIS, WIS foundations and reasoning, co-design and WIS engineering or WIS layout and playout development.


Implementing Security for ATM Networks

Implementing Security for ATM Networks

Author: Thomas D. Tarman

Publisher: Artech House

Published: 2002

Total Pages: 322

ISBN-13: 9781580532938

DOWNLOAD EBOOK

This book is a must read for professionals who have the responsibility of enforcing security policies within their ATM networks, ATM security devices, or simple need to better understand the mechanisms defined in the ATM Forum Security Specification 1.1 332 pp.