6 results (0,18320 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Quantifying Software Global and Industry Perspectives

Quantifying Software Global and Industry Perspectives

Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26 000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017 so interesting historical trends are available. Since current average software productivity and quality results are suboptimal this book focuses on best in class results and shows not only quantified quality and productivity data from best-in-class organizations but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules effort costs and quality for several industries and countries. Because productivity and quality vary by technology and size the book presents quantitative results for applications between 100 function points and 100 000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt but that metric is not standardized. Finally the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership. | Quantifying Software Global and Industry Perspectives

GBP 42.99
1

Software Engineering with UML

Android Security Attacks and Defenses

Android Security Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses

GBP 56.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

Software Development Patterns and Antipatterns

Software Development Patterns and Antipatterns

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10 000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies breach of contract lawsuits and the literature on major software failures. This section considers the factors involved with cost overruns schedule delays canceled projects poor quality and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section’s first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence as well as measures that can prove excellence to C-level executives and with continuing excellence through the maintenance cycle as well as for software development.

GBP 48.99
1

Risk Analytics Data-Driven Decisions under Uncertainty

Risk Analytics Data-Driven Decisions under Uncertainty

The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty

GBP 74.99
1