![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > Software engineering
Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject. A Comprehensive Guide to Enterprise Mobility fills this void. It supplies authoritative guidance on all aspects of enterprise mobility-from technical aspects and applications to implementation. The book introduces basic concepts such as enterprise mobility adoption strategy and user requirements in mobility. Illustrating the technical aspects of enterprise mobility, it analyzes the key features and challenges in developing mobility solutions for various domains. The text is organized into four sections: Mobility Concepts: supplies a solid foundation in enterprise mobility, from strategy definition to deployment of enterprise mobility solutions Mobile Solutions and Case Studies: introduces readers to the applications of enterprise mobility across a wide range of industry sectors Mobile Application Development: supplies an overview of popular mobile platforms and mobile programming languages Technology Considerations in Mobility: details hybrid and supporting technologies in enterprise mobility The book's case studies illustrate the complete lifecycle in the development of mobility solutions, including the high level requirements, architecture, and design principles for each use case. Demonstrating how to put the concepts covered into practice, the text details the application of mobility solutions across various domains, including the healthcare, retail, airline, and pharmaceutical industries.
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.
Business managers have long known the power of the Balanced Scorecard in executing corporate strategy. Implementing the Project Management Balanced Scorecard shows project managers how they too can use this framework to meet strategic objectives. It supplies valuable insight into the project management process as a whole and provides detailed explanations on how to effectively implement the balanced scorecard to measure and manage performance and projects. The book details a tactical approach for implementing the scorecard approach at the project level and investigates numerous sample scorecards, metrics, and techniques. It examines recent research on critical issues such as performance measurement and management, continuous process improvement, benchmarking, metrics selection, and people management. It also explains how to integrate these issues with the four perspectives of the balanced scorecard: customer, business processes, learning and innovation, and financial. Filled with examples and case histories, the book directly relates the scorecard concept to the major project management steps of determining scope, scheduling, estimation, risk management, procurement, and project termination. It includes a plethora of resources on the accompanying downloadable resources-including detailed instructions for developing a measurement program, a full metrics guide, a sample project plan, and a set of project management fill-in forms.
Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major gaps and omissions that need to be filled if data about software development is to be useful for comparisons or estimating future projects. Among the more serious gaps are leaks in reporting about software development efforts that, if not corrected, can distort data and make benchmarks almost useless and possibly even harmful. One of the most common leaks is that of unpaid overtime. Software is a very labor-intensive occupation, and many practitioners work very long hours. However, few companies actually record unpaid overtime. This means that software effort is underreported by around 15%, which is too large a value to ignore. Other sources of leaks include the work of part-time specialists who come and go as needed. There are dozens of these specialists, and their combined effort can top 45% of total software effort on large projects. The book helps software project managers and developers uncover errors in measurements so they can develop meaningful benchmarks to estimate software development efforts. It examines variations in a number of areas that include: Programming languages Development methodology Software reuse Functional and nonfunctional requirements Industry type Team size and experience Filled with tables and charts, this book is a starting point for making measurements that reflect current software development practices and realities to arrive at meaningful benchmarks to guide successful software projects.
This is the last in a four book series comprising a critical review of the Unified Process that includes a survey of the alternate software processes and the synthesis of a more robust process. The transition and production phases are the final phases of the Unified Process that provide for the deployment, operation and support of the system among the user groups. This volume includes a masters' collection of best practices that include practical advice for successfully launching the software, applying personal processes, developing and enhancing organizational software processes, achieving reuse, conducting project assessments, saving a troubled project, testing the system, avoiding a maintenance nightmare, and operating and supporting the software.
This book presents joint works of members of the software engineering and formal methods communities with representatives from industry, with the goal of establishing the foundations for a common understanding of the needs for more flexibility in model-driven engineering. It is based on the Dagstuhl Seminar 19481 "Composing Model-Based Analysis Tools", which was held November 24 to 29, 2019, at Schloss Dagstuhl, Germany, where current challenges, their background and concepts to address them were discussed. The book is structured in two parts, and organized around five fundamental core aspects of the subject: (1) the composition of languages, models and analyses; (2) the integration and orchestration of analysis tools; (3) the continual analysis of models; (4) the exploitation of results; and (5) the way to handle uncertainty in model-based developments. After a chapter on foundations and common terminology and a chapter on challenges in the field, one chapter is devoted to each of the above five core aspects in the first part of the book. These core chapters are accompanied by additional case studies in the second part of the book, in which specific tools and experiences are presented in more detail to illustrate the concepts and ideas previously introduced. The book mainly targets researchers in the fields of software engineering and formal methods as well as software engineers from industry with basic familiarity with quality properties, model-driven engineering and analysis tools. From reading the book, researchers will receive an overview of the state-of-the-art and current challenges, research directions, and recent concepts, while practitioners will be interested to learn about concrete tools and practical applications in the context of case studies.
Although the precepts of software engineering have been around for decades, the field has failed to keep pace with rapid advancements in computer hardware and software. Modern systems that integrate multiple platforms and architectures, along with the collaborative nature of users who expect an instantaneous global reach via the Internet, require updated software engineering methods. Social Software Engineering: Development and Collaboration with Social Networking examines the field through the spectrum of the social activities that now compose it. Supplying an up-to-date look at this ever-evolving field, it provides comprehensive coverage that includes security, legal, and privacy issues in addition to workflow and people issues. Jessica Keyes, former managing director of R&D for the New York Stock Exchange and noted columnist, correspondent, and author with more than 200 articles published, details the methodology needed to bring mission-critical software projects to successful conclusions. She provides readers with the understanding and tools required to fuse psychology, sociology, mathematics, and the principles of knowledge engineering to develop infrastructures capable of supporting the collaborative applications that today's users require.
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses. The book proposes a flexible online platform. This solution provides flexibility in distance learning processes including course enrollment, learning, evaluation, and outcome of degrees. The proposed system not only gives students freedom to choose their courses in accordance with their needs but also use earned credit towards online degrees of any university of their choice.
In business, driving value is a key strategy and typically starts at the top of an organization. In today's digital age, driving software value is also an important, and often overlooked, key strategy. Executives, and the corporate board, need to expect the highest level of business value from the software the organization is developing, buying, and selling. In today's digital transformation marketplace, it is imperative that organizations start driving business value from software development initiatives. For many years, the cost of software development challenged organizations with questions such as: How do we allocate software development costs? Should these costs be considered an overhead expense? Are we getting the most value possible for our investment? A fundamental problem has been built into these questions - the focus on cost. In almost every other part of the organization, maximizing profit or, in the case of a not-for-profit, maximizing the funds available, provides a clear focus with metrics to determine success or failure. In theory, simply aligning software spending with the maximizing profit goals should be sufficient to avoid any questions about value for money. Unfortunately, this alignment hasn't turned out to be so simple, and the questions persist, particularly at the strategic or application portfolio level. In this book, Michael D.S. Harris describes how a software business value culture-one where all stakeholders, including technology and business-have a clear understanding of the goals and expected business value from software development. The book shows readers how they can transform software development from a cost or profit center to a business value center. Only a culture of software as a value center enables an organization to constantly maximize business value flow through software development. If your organization is starting to ask how it can change software from a cost-center to a value-center, this book is for you.
Open Source Data Warehousing and Business Intelligence is an all-in-one reference for developing open source based data warehousing (DW) and business intelligence (BI) solutions that are business-centric, cross-customer viable, cross-functional, cross-technology based, and enterprise-wide. Considering the entire lifecycle of an open source DW & BI implementation, its comprehensive coverage spans from basic concepts all the way through to customization. Highlighting the key differences between open source and vendor DW and BI technologies, the book identifies end-to-end solutions that are scalable, high performance, and stable. It illustrates the practical aspects of implementing and using open source DW and BI technologies to supply you with valuable on-the-project experience that can help you improve implementation and productivity. Emphasizing analysis, design, and programming, the text explains best-fit solutions as well as how to maximize ROI. Coverage includes data warehouse design, real-time processing, data integration, presentation services, and real-time reporting. With a focus on real-world applications, the author devotes an entire section to powerful implementation best practices that can help you build customer confidence while saving valuable time, effort, and resources.
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review. This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.
1. Provides a toolkit of templates for common VR interactions, as well as practical advice on when to use them and how to tailor them for specific use cases; 2. Includes case studies detailing the practical application of interaction theory discussed in each chapter; 3. Presents tables of guidelines for practicing VR developers, for reference during software development; 4. Covers procedures for Interface Evaluation - formulas and testing methodologies to ensure that VR interfaces are effective, efficient, engaging, error-tolerant, and easy to learn; 5. Non-linear organisation - chapters of the book on different concepts can be read to gain knowledge on a single topic, without requiring other chapters to be read beforehand; 6. Includes ancillaries - PowerPoint slides, 3D models, videos, and a teacher's guide
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Mobile testing is the process of testing the functionality, usability and consistency of mobile software. While similar to standard software testing, efficient and effective mobile testing requires an additional set of skills on top of those usually required by software testers. With this essential guide, in line with the ASTQB Certified Mobile Tester syllabus, you will gain the understanding and skills you require to begin your journey to becoming a proficient mobile tester.
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Software analysis patterns play an important role in reducing the overall cost and compressing the time of software project lifecycles. However, building reusable and stable software analysis patterns is still considered a major and delicate challenge. This book proposes a novel concept for building analysis patterns based on software stability and is a modern approach for building stable, highly reusable, and widely applicable analysis patterns. The book also aims to promote better understanding of problem spaces and discusses how to focus requirements analysis accurately. It demonstrates a new approach to discovering and creating stable analysis patterns (SAPs). This book presents a pragmatic approach to understanding problem domains, utilizing SAPs for any field of knowledge, and modeling stable software systems, components, and frameworks. It helps readers attain the basic knowledge that is needed to analyze and extract analysis patterns from any domain of interest. Readers also learn to master methods to document patterns in an effective, easy, and comprehensible manner. Bringing significant contributions to the field of computing, this book is a unique and comprehensive reference manual on SAPs. It provides insight on handling the understanding of problem spaces and supplies methods and processes to analyze user requirements accurately as well as ways to use SAPs in building myriad cost-effective and highly maintainable systems. The book also shows how to link SAPs to the design phase thereby ensuring a smooth transition between analysis and design.
A commitment to usability in user interface design and
development offers enormous benefits, including greater user
productivity, more competitive products, lower support costs, and a
more efficient development process. But what does it mean to be
committed to usability? Inside, a twenty-year expert answers this
question in full, presenting the techniques of Usability
Engineering as a series of product lifecycle tasks that result
directly in easier-to-learn, easier-to-use software.
This book presents a coherent, novel vision of Smart Cities, built around a value-driven architecture. It describes the limitations of the contemporary notion of the Smart City and argues that the next developmental step must actively include not only the physical infrastructure, but information technology and human infrastructure as well, requiring the intensive integration of technical solutions from the Internet of Things (IoT) and social computing. The book is divided into five major parts, the first of which provides both a general introduction and a coherent vision that ties together all the components that are required to realize the vision for Smart Cities. Part II then discusses the provisioning and governance of Smart City systems and infrastructures. In turn, Part III addresses the core technologies and technological enablers for managing the social component of the Smart City platform. Both parts combine state-of-the-art research with cutting-edge industrial efforts in the respective fields. Lastly, Part IV details a road map to achieving Cyber-Human Smart Cities. Rounding out the coverage, it discusses the concrete technological advances needed to move beyond contemporary Smart Cities and toward the Smart Cities of the future. Overall, the book provides an essential overview of the latest developments in the areas of IoT and social computing research, and outlines a research roadmap for a closer integration of the two areas in the context of the Smart City. As such, it offers a valuable resource for researchers and graduate students alike.
As software RandD investment increases, the benefits from short feedback cycles using technologies such as continuous deployment, experimentation-based development, and multidisciplinary teams require a fundamentally different strategy and process. This book will cover the three overall challenges that companies are grappling with: speed, data and ecosystems. Speed deals with shortening the cycle time in RandD. Data deals with increasing the use of and benefit from the massive amounts of data that companies collect. Ecosystems address the transition of companies from being internally focused to being ecosystem oriented by analyzing what the company is uniquely good at and where it adds value.
Information systems for manufacturing often follow a three-layer architecture based on an enterprise resource planning (ERP) layer (for order planning), a manufacturing execution system (MES) layer (for factory control), and a shop floor layer (for machine control). Future requirements on flexibility and adaptability require a much closer integration of ERP systems with the manufacturing floor. To achieve this integration, an MES often pushes customer orders to the manufacturing floor in a flexible manner. Moreover, a large amount of shop floor data needs to be filtered and fed into business planning applications such as production planning or supply chain management. Radio Frequency Identification (RFID) chips can play an important role in the collection and management of such data. Gunther, Kletti, and Kubach explain the potential advantages of using RFID technology in a modern manufacturing and supply chain context. Areas of emphasis include integration of RFID data into legacy IT architectures, RFID-MES-ERP integration, and cost-benefit considerations. Their presentation is not restricted to intra-company production planning, but also emphasizes the benefits of inter-company collaboration. Six case studies based on SAP s ERP systems and MPDV s MES solution show how to successfully implement cross-company supply chain integration using RFID technology."
This book is perhaps the first attempt to give full treatment to the topic of Software Design. It will facilitate the academia as well as the industry. This book covers all the topics of software design including the ancillary ones.
Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.
This book describes the state-of-the-art of software ecosystems. It constitutes a fundamental step towards an empirically based, nuanced understanding of the implications for management, governance, and control of software ecosystems. This is the first book of its kind dedicated to this emerging field and offers guidelines on how to analyze software ecosystems; methods for managing and growing; methods on transitioning from a closed software organization to an open one; and instruments for dealing with open source, licensing issues, product management and app stores. It is unique in bringing together industry experiences, academic views and tackling challenges such as the definition of fundamental concepts of software ecosystems, describing those forces that influence its development and lifecycles, and the provision of methods for the governance of software ecosystems. This book is an essential starting point for software industry researchers, product managers, and entrepreneurs. Contributors: T. Aaltonen, T.A. Alspaugh, C. Alves, M. Anvaari, H.U. Asuncion, O. Barbosa, S. Biffl, S. Brinkkemper, M.A. Cusumano, E. den Hartigh, D. Dhungana, R.P. dos Santos, A. Finkelstein, M. Goeminne, I. Groher, I. Hammouda, S. Jansen, A. Jimenez Salas, J. Kabbedijk, M. Kauppinen, T. Kilamo, Y.-R. Li, L. Luinenburg, T. Mens, T. Mikkonen, K.M. Popp, W. Scacchi, E. Schludermann, J. Souer, M. Tol, J. van Angeren, G. van Capelleveen, M. Viljainen, W. Visscher, C. Werner
Database technology and entity-relationship (ER) modeling have meanwhile reached the level of an established technology. This book presents the achievements of research in this field in a comprehensive survey. It deals with the entity-relationship model and its extensions with regard to an integrated development and modeling of database applications and, consequently, the specification of structures, behavior and interaction. Apart from research on the ER model and the syntax, semantics, and pragmatics of database modeling the book also presents techniques for the translation of the ER model into classical database models and languages such as relational, hierarchical, and network models and languages, and also into object-oriented models. The book is of interest for all database theoreticians as well as practitioners who are provided with the relevant foundations of database modeling.
Scientific descriptions of the climate have traditionally been based on the study of average meteorological values taken from different positions around the world. In recent years however it has become apparent that these averages should be considered with other statistics that ultimately characterize spatial and temporal variability. This book is designed to meet that need. It is based on a course in computational statistics taught by the author that arose from a variety of projects on the design and development of software for the study of climate change, using statistics and methods of random functions. |
You may like...
Implementation of Machine Learning…
Veljko Milutinovi, Nenad Mitic, …
Hardcover
R6,648
Discovery Miles 66 480
Data Mining Techniques for the Life…
Oliviero Carugo, Frank Eisenhaber
Hardcover
R5,234
Discovery Miles 52 340
Computational Medicine in Data Mining…
Goran Rakocevic, Tijana Djukic, …
Hardcover
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
|