![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming > Software engineering
This textbook covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-disciplinary approach. The presentation is illustrated using the BPMN industry standard defined by the Object Management Group and widely endorsed by practitioners and vendors worldwide. In addition to explaining the relevant conceptual background, the book provides dozens of examples, more than 230 exercises - many with solutions - and numerous suggestions for further reading. This second edition includes extended and completely revised chapters on process identification, process discovery, qualitative process analysis, process redesign, process automation and process monitoring. A new chapter on BPM as an enterprise capability has been added, which expands the scope of the book to encompass topics such as the strategic alignment and governance of BPM initiatives. The textbook is the result of many years of combined teaching experience of the authors, both at the undergraduate and graduate levels as well as in the context of professional training. Students and professionals from both business management and computer science will benefit from the step-by-step style of the textbook and its focus on fundamental concepts and proven methods. Lecturers will appreciate the class-tested format and the additional teaching material available on the accompanying website.
For courses in Software Engineering, Software Development, or Object-Oriented Design and Analysis at the Junior/Senior or Graduate level. This text can also be utilized in short technical courses or in short, intensive management courses. Shows students how to use both the principles of software engineering and the practices of various object-oriented tools, processes, and products. Using a step-by-step case study to illustrate the concepts and topics in each chapter, Bruegge and Dutoit emphasize learning object-oriented software engineer through practical experience: students can apply the techniques learned in class by implementing a real-world software project. The third edition addresses new trends, in particular agile project management (Chapter 14 Project Management) and agile methodologies (Chapter 16 Methodologies).
Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the last minute. Presenting combinatorial approaches for improving test coverage, Testing Complex and Embedded Systems details techniques to help you streamline testing and identify problems before they occur -- including turbocharged testing using Six Sigma and exploratory testing methods. Rather than present the continuum of testing for particular products or design attributes, the text focuses on boundary conditions. Examining systems and software testing, it explains how to use simulation and emulation to complement testing. * Details how to manage multiple test hardware and software deliveries * Examines the contradictory perspectives of testing -- including ordered/ random, structured /unstructured, bench/field, and repeatable/non repeatable * Covers essential planning activities prior to testing, how to scope the work, and how to reach a successful conclusion * Explains how to determine when testing is complete Where you find organizations that are successful at product development, you are likely to find groups that practice disciplined, strategic, and thorough testing. Tapping into the authors' decades of experience managing test groups in the automotive industry, this book provides the understanding to help ensure your organization joins the likes of these groups.
An authoritative guide that explores in depth the cultural, technological and methodological concerns to practice three-timezone (3TZ) e-learning in educational contexts. It is important from a pedagogical and practical perspective to impart educational methods and tools that will enable students to be ready for the interconnected, cross-collaborative work environment advocated by modern business practice. The 'local is global' paradigm provides the platform on which students are able to effectively build their knowledge repertoire through the interaction and exchange of project tasks amongst local/global teams, where the traditional barriers of time and location are no longer applicable. The situational and social learning dimensions gained from the explored issues covered in the book will provide a greater awareness to the reader for the need for teaching practice for the '3TZ' enabled workforce. Contents * Teaching Practice-based Subjects in 3 Time Zones (3TZ) Virtual Student Exchange (VSX) Environment * Collaborative Team Project Management * Toward the 24-Hour Knowledge Factory in Software Development * 24/7 Application in Medical Research * Worldwide Teams in Software Development * Virtual Student Exchange: Developing New Educational Paradigms to Support 24-7 Engineering * Data and Knowledge-Transfer Model for the Development of Software Requirements analysis CASE Tools designed for Cross-Time-Zone Projects.
Expert advice on C programming is hard to find. While much help is available for object-oriented programming languages, there's surprisingly little for the C language. With this hands-on guide, beginners and experienced C programmers alike will find guidance about design decisions, including how to apply them bit by bit to running code examples when building large-scale programs. Christopher Preschern, a leading member of the design patterns community, answers questions such as how to structure C programs, cope with error handling, or design flexible interfaces. Whether you're looking for one particular pattern or an overview of design options for a specific topic, this book shows you how to implement hands-on design knowledge specifically for the C programming language. You'll find design patterns for: Error handling Returning error information Memory management Returning data from C functions Data lifetime and ownership Flexible APIs Flexible iterator interfaces Organizing files in modular programs Escaping #ifdef Hell
Making Sense of Design Effective design is at the heart of everything from software development to engineering to architecture. But what do we really know about the design process? What leads to effective, elegant designs? The Design of Design addresses these questions. These new essays by Fred Brooks contain extraordinary insights for designers in every discipline. Brooks pinpoints constants inherent in all design projects and uncovers processes and patterns likely to lead to excellence. Drawing on conversations with dozens of exceptional designers, as well as his own experiences in several design domains, Brooks observes that bold design decisions lead to better outcomes. The author tracks the evolution of the design process, treats collaborative and distributed design, and illuminates what makes a truly great designer. He examines the nuts and bolts of design processes, including budget constraints of many kinds, aesthetics, design empiricism, and tools, and grounds this discussion in his own real-world examples-case studies ranging from home construction to IBM's Operating System/360. Throughout, Brooks reveals keys to success that every designer, design project manager, and design researcher should know.
Colonialism and the Modernist Moment in the Early Novels of Jean Rhys explores the postcolonial significance of Rhys s modernist period work, which depicts an urban scene more varied than that found in other canonical representations of the period. Arguing against the view that Rhys comes into her own as a colonial thinker only in the post-WWII period of her career, this study examines the austere insights gained by Rhys s active cultivation of her fringe status vis-a-vis British social life and artistic circles, where her sharp study of the aporias of marginal lives and the violence of imperial ideology is distilled into an artistic statement positing the outcome of the imperial venture as a state of homelessness across the board, for colonized and metropolitans alike. Bringing to view heretofore overlooked emigre populations, or their children, alongside locals, Rhys s urbanites struggle to construct secure lives not simply as a consequence of commodification, alienation, or voluntary expatriation, but also as a consequence of marginalization and migration. This view of Rhys s early work asserts its vital importance to postcolonial studies, an importance that has been overlooked owing to an over hasty critical consensus that only one of her early novels contains significant colonial content. Yet, as this study demonstrates, proper consideration of colonial elements long considered only incidental illuminates a colonial continuum in Rhys s work from her earliest publications. "
This book introduces SpecDB, an intelligent database created to represent and host software specifications in a machine-readable format, based on the principles of artificial intelligence and unit testing database operations. SpecDB is demonstrated via two automated intelligent tools. The first automatically generates database constraints from a rule-base in SpecDB. The second is a reverse engineering tool that logs the actual execution of the program from the code.
An effective, quantitative approach for estimating and managing software projects How many people do I need? When will the quality be good enough
for commercial sale? Can this really be done in two weeks? Rather
than relying on instinct, the authors of Software Measurement and
Estimation offer a new, tested approach that includes the
quantitative tools, data, and knowledge needed to make sound
estimations.
Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you'll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It's the best book for all your Git needs.
Future requirements for computing speed, system reliability, and cost-effectiveness entail the development of alternative computers to replace the traditional von Neumann organization. As computing networks come into being, one of the latest dreams is now possible - distributed computing. Distributed computing brings transparent access to as much computer power and data as the user needs for accomplishing any given task - simultaneously achieving high performance and reliability. The subject of distributed computing is diverse, and many researchers are investigating various issues concerning the structure of hardware and the design of distributed software. Distributed System Design defines a distributed system as one that looks to its users like an ordinary system, but runs on a set of autonomous processing elements (PEs) where each PE has a separate physical memory space and the message transmission delay is not negligible. With close cooperation among these PEs, the system supports an arbitrary number of processes and dynamic extensions. Distributed System Design outlines the main motivations for building a distributed system, including: inherently distributed applications performance/cost resource sharing flexibility and extendibility availability and fault tolerance scalability Presenting basic concepts, problems, and possible solutions, this reference serves graduate students in distributed system design as well as computer professionals analyzing and designing distributed/open/parallel systems. Chapters discuss: the scope of distributed computing systems general distributed programming languages and a CSP-like distributed control description language (DCDL) expressing parallelism, interprocess communication and synchronization, and fault-tolerant design two approaches describing a distributed system: the time-space view and the interleaving view mutual exclusion and related issues, including election, bidding, and self-stabilization prevention and detection of deadlock reliability, safety, and security as well as various methods of handling node, communication, Byzantine, and software faults efficient interprocessor communication mechanisms as well as these mechanisms without specific constraints, such as adaptiveness, deadlock-freedom, and fault-tolerance virtual channels and virtual networks load distribution problems synchronization of access to shared data while supporting a high degree of concurrency
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn the principles of software development while implementing a real-world software product. This book provides instructors, students, clients, and professional software developers with detailed guidance for developing a new CO-FOSS product from conceptualization to completion. Features Provides instructors, students, clients, and professional software developers with a roadmap for the development of a new CO-FOSS product from conceptualization to completion Motivates students with real-world projects and community service experiences Teaches all elements of the software process, including requirements gathering, design, collaboration, coding, testing, client communication, refactoring, and writing developer and user documentation Uses source code that can be reused and refitted to suit the needs of future projects, since each CO-FOSS product is free and open source software Provides links to a rich variety of resources for instructors and students to freely use in their own courses that develop new CO-FOSS products for other non-profits.
Presents a novel metrics-based approach for detecting design problems in object-oriented software. Introduces an important suite of detection strategies for the identification of different well-known design flaws as well as some rarely mentioned ones.
Participating in the reframing of literary studies, Cosmopolitan
Fictions identifies, as cosmopolitan fiction, a genre of global
literature that investigates the ethics and politics of complex and
multiple belonging.
The fictions studied by Katherine Stanton represent and revise
the global histories of the past and present, including the
indigenous or native narratives that are, in Homi Bhabha's words,
internal to national identity itself.
The works take as their subjects:
* European unification And they test the infinite demands for justice against the
shifting borders of the nation, rethinking habits of feeling, modes
of belonging and practices of citizenship for the global
future.
Scholars, teachers and students of global literary and cultural studies, Cosmopolitan Fictions is a book to want on your reading list.
"Design for software-intensive systems requires adequate methodology and tool support in order for researchers and practitioners to make use of and develop very large and complex systems. Software engineering environments help reduce the design costs of very large and intricate software systems while improving the quality of the software produced. Designing Software-Intensive Systems: Methods and Principles addresses the complex issues associated with software engineering environment capabilities for designing real-time embedded software systems. This groundbreaking work provides relevant theoretical foundations, principles, methodologies, frameworks, and the latest research findings in the field to deliver a superior knowledge base for those in computer science, software engineering, and fields alike."
Private clouds allow for managing multiple databases under one roof, avoiding unnecessary resource management. Private cloud solutions can be applied in sectors such as healthcare, retail, and software. The Introduction to Private Cloud using Oracle Exadata and Oracle Database will explore the general architecture of private cloud databases with a focus on Oracle's Exadata database machine. The book describes the private cloud using fundamental-level Exadata and database. Exadata has been Oracle's pioneer product for almost a decade. In the last few years, Oracle has positioned Exadata for customers to consume as a cloud service. This book will provide a timely introduction to Exadata for current and potential Oracle customers and other IT professionals.
Software engineering has over the years been applied in many different fields, ranging from telecommunications to embedded systems in car and aircraft industry as well as in production engineering and computer networks. Foundations in software technology lie in models allowing to capture application domains, detailed requirements, but also to understand the structure and working of software systems like software architectures and programs. These models have to be expressed in techniques based on discrete mathematics, algebra and logics. However, according to the very specific needs in applications of software technology, formal methods have to serve the needs and the quality of advanced software engineering methods, especially taking into account security aspects in Information Technology. This book presents mathematical foundations of software engineering and state-of-the-art engineering methods in their theoretical substance in the step towards practical applications to examine software engineering techniques and foundations used for industrial tasks. The contributions in this volume emerged from lectures of the 25th International Summer School on Engineering Theories of Software Intensive Systems, held at Marktoberdorf, Germany from August 3 to August 15, 2004.
Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprise's objectives will be achieved, thereby enabling organizational success. This work methodically considers the risks and opportunities that an enterprise taking their applications or services onto the cloud must consider to obtain the cost reductions and service velocity improvements they desire without suffering the consequences of unacceptable user service quality.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.
"I highly recommend Mr. Hobbs' book." - Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com Safety-critical devices, whether medical, automotive, or industrial, are increasingly dependent on the correct operation of sophisticated software. Many standards have appeared in the last decade on how such systems should be designed and built. Developers, who previously only had to know how to program devices for their industry, must now understand remarkably esoteric development practices and be prepared to justify their work to external auditors. Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508; ISO 26262; EN 50128; and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification, through anomaly detection to the so-called "safety bag" systems. Reviewing the use of open-source components in safety-critical systems, this book has evolved from a course text used by QNX Software Systems for a training module on building embedded software for safety-critical devices, including medical devices, railway systems, industrial systems, and driver assistance devices in cars. Although the book describes open-source tools for the most part, it also provides enough information for you to seek out commercial vendors if that's the route you decide to pursue. All of the techniques described in this book may be further explored through hundreds of learned articles. In order to provide you with a way in, the author supplies references he has found helpful as a working software developer. Most of these references are available to download for free.
Imagine that you are the CEO of a software company. You know you compete in an environment that does not permit you to treat innovation as a secondary issue. But how should you manage your software innovation to get the most out of it? This book will provide you with the answer. Software innovation is multifaceted and the approaches used by companies can be very different. The team of authors that wrote this book took the assumption that there is no such thing as a universal software engineering process or innovation process. Some things work well for a certain company, others do not. The book is organized around what the authors call eight fundamental practice areas for innovation with software. Each practice area contains a number of activities that can help companies to master that practice area. It also contains industrial experience reports that illustrate the applicability of these practice areas in software companies and is structured in such a way that you can select and read only those practice areas that are relevant to your company. The book is written with an industrial target audience in mind. Its most important goal is to challenge companies by offering them a framework to become more innovation-driven, rather than engineering-driven. Intrigued? Here you will find details of what you and your company can do to understand, implement, and sustain continuous innovation.
Understanding BIM presents the story of Building Information Modelling, an ever evolving and disruptive technology that has transformed the methodologies of the global construction industry. Written by the 2016 Prince Philip Gold Medal winner, Jonathan Ingram, it provides an in-depth understanding of BIM technologies, the business and organizational issues associated with its implementation, and the profound advantages its effective use can provide to a project team. Ingram, who pioneered the system heralding the BIM revolution, provides unrivalled access to case material and relevance to the current generation of BIM masters. With hundreds of colour images and illustrations showing the breadth and power of BIM, the book covers: The history of BIM What BIM is in technical and practical terms How it changes the day to day working environment Why we need BIM and what problems it can solve Where BIM is headed, particularly with regards to AI, AR, VR and voice recognition International case studies from a range of disciplines including: architecture, construction management, and retail Professionals and students in any field where the inter-disciplinary aspects of BIM are in operation will benefit from Ingram's insights. This book is an authoritative account of and reference on BIM for anyone wanting to understand its history, theory, application and potential future developments.
Understanding BIM presents the story of Building Information Modelling, an ever evolving and disruptive technology that has transformed the methodologies of the global construction industry. Written by the 2016 Prince Philip Gold Medal winner, Jonathan Ingram, it provides an in-depth understanding of BIM technologies, the business and organizational issues associated with its implementation, and the profound advantages its effective use can provide to a project team. Ingram, who pioneered the system heralding the BIM revolution, provides unrivalled access to case material and relevance to the current generation of BIM masters. With hundreds of colour images and illustrations showing the breadth and power of BIM, the book covers: The history of BIM What BIM is in technical and practical terms How it changes the day to day working environment Why we need BIM and what problems it can solve Where BIM is headed, particularly with regards to AI, AR, VR and voice recognition International case studies from a range of disciplines including: architecture, construction management, and retail Professionals and students in any field where the inter-disciplinary aspects of BIM are in operation will benefit from Ingram's insights. This book is an authoritative account of and reference on BIM for anyone wanting to understand its history, theory, application and potential future developments. |
![]() ![]() You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,296
Discovery Miles 12 960
Data Prefetching Techniques in Computer…
Pejman Lotfi-Kamran, Hamid Sarbazi-Azad
Hardcover
R4,067
Discovery Miles 40 670
Working Effectively with Legacy Code
Michael C. Feathers
Paperback
|