![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > Software engineering
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
Power and Performance: Software Analysis and Optimization is a guide to solving performance problems in modern Linux systems. Power-efficient chips are no help if the software those chips run on is inefficient. Starting with the necessary architectural background as a foundation, the book demonstrates the proper usage of performance analysis tools in order to pinpoint the cause of performance problems, and includes best practices for handling common performance issues those tools identify.
Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. The book demonstrates the many benefits of SDN, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. Chapters in the volume address: Design considerations for security issues and detection methods State-of-the-art approaches for mitigating DDos attacks using SDN Big data using Apache Hadoop for processing and analyzing large amounts of data Different tools used for attack simulation Network policies and policy management approaches that are widely used in the context of SDN Dynamic flow tables, or static flow table management A new four-tiered architecture that includes cloud, SDN-controller, and fog computing Architecture for keeping computing resources available near the industrial IoT network through edge computing The impact of SDN as an innovative approach for smart city development More. The book will be a valuable resource for SDN researchers as well as academicians, research scholars, and students in the related areas.
Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.
Maintaining the advanced technical focus found in Developing Essbase Applications, this second volume is another collaborative effort by some of the best and most experienced Essbase practitioners from around the world. Developing Essbase Applications: Hybrid Techniques and Practices reviews technology areas that are much-discussed but still very new, including Exalytics and Hybrid Essbase. Covering recent improvements to the Essbase engine, the book illustrates the impact of new reporting and analysis tools and also introduces advanced Essbase best practices across a variety of features, functions, and theories. Some of this book's chapters are in the same vein as the previous volume: hardware, engines, and languages. Others cover new ground with Oracle Business Intelligence Enterprise Edition, design philosophy, benchmarking concepts, and multiple client tools. As before, these subjects are covered from both the technical and best practice perspectives. This updated volume continues in the tradition of its bestselling predecessor by defining, investigating, and explaining Essbase concepts like no other resource. It also includes use cases that transform abstract theory into practical examples you can easily relate to your own Essbase environment. Illustrating the recent expansion of Essbase functionality, this book provides the up-to-date understanding you need to explore the full depth of the Essbase technology stack. Although the book presents detailed tutorial chapters that can be read on their own, reading the entire book will provide you with a similar understanding as some of the most experienced Essbase practitioners from around the world.
Program understanding plays an important role in nearly all software related tasks. It is vital to the development, maintenance and reuse activities. Program understanding is indispensable for improving the quality of software development. Several development activities such as code reviews, debugging and some testing approaches require programmers to read and understand programs. Maintenance activities cannot be performed without a deep and correct understanding of the component to be maintained. Program understanding is vital to the reuse of code components because they cannot be utilized without a clear understanding of what they do. If a candidate reusable component needs to be modified, an understanding how it is designed is also required. of This monograph presents a. knowledge-based approach to the automation of program understanding. This approach generates rigorous program documentation mechanically by combining and building on strengths of a practical program decomposition method, the axiomatic correctness notation, and the knowledge based analysis approaches. More specifically, this approach documents programs by generating first order predicate logic annotations of their loops. In this approach, loops are classified according to their complexity levels. Based on this taxonomy, variations on the basic analysis approach that best fit each of the different classes are described. In general, mechanical annotation of loops is performed by first decomposing them using data flow analysis. This decomposition encapsulates interdependent statements in events, which can be analyzed individually."
This book is a collection of peer-reviewed best selected research papers presented at 22nd International Conference on Computational Mechanics and Modern Applied Software Systems (CMMASS 2021), held at the Alushta Health and Educational Center, The Republic of Crimea, during 4-13 September 2021. The proceedings is dedicated to solving the real-world problems of applied mechanics using smart computational technology. Physical and mathematical models, numerical methods, computational algorithms and software complexes are discussed, which allow to carry out high-precision mathematical modelling in fluid, gas and plasma mechanics, in general mechanics, deformable solid mechanics, in strength, destruction and safety of structures, etc. Smart technologies and software systems that provide effective solutions to the problems at various multi scale-levels are considered. Special attention is paid to the training of highly qualified specialists for the aviation and space industry.
Data Science for Software Engineering: Sharing Data and Models presents guidance and procedures for reusing data and models between projects to produce results that are useful and relevant. Starting with a background section of practical lessons and warnings for beginner data scientists for software engineering, this edited volume proceeds to identify critical questions of contemporary software engineering related to data and models. Learn how to adapt data from other organizations to local problems, mine privatized data, prune spurious information, simplify complex results, how to update models for new platforms, and more. Chapters share largely applicable experimental results discussed with the blend of practitioner focused domain expertise, with commentary that highlights the methods that are most useful, and applicable to the widest range of projects. Each chapter is written by a prominent expert and offers a state-of-the-art solution to an identified problem facing data scientists in software engineering. Throughout, the editors share best practices collected from their experience training software engineering students and practitioners to master data science, and highlight the methods that are most useful, and applicable to the widest range of projects.
This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chip-level, and cluster level. Offers a solution for different types of resources including processors, on-chip communication, off-chip communication, and I/O. Provides a cross-domain approach with examples for wind-power, health-care, and avionics. Introduces hierarchical adaptation strategies for mixed-criticality systems Provides modular verification and certification methods for the seamless integration of mixed-criticality systems. Covers platform technologies, along with a methodology for the development process. Presents an experimental evaluation of technological results in cooperation with industrial partners. The information in this book will be extremely useful to industry leaders who design and manufacture products with distributed embedded systems in mixed-criticality use-cases. It will also benefit suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architecture, dependability, real-time systems, and avionics, wind-power and health-care systems.
Provides guidance on performance enhancement and reliability of IC chips. Provides a detailed hybrid optimization strategy for the optimal arrangement of IC chips on a board. The MATLAB program for the hybrid optimization strategy along with its stability analysis is carried out in a detailed manner.
Understanding Interaction explores the interaction between people and technology in the broader context of the relations between the human-made and the natural environments. It is not just about digital technologies - our computers, smartphones, the Internet - but all our technologies, such as mechanical, electrical, and electronic. Our ancestors started creating mechanical tools and shaping their environments millions of years ago, developing cultures and languages, which in turn influenced our evolution. Volume 1 looks into this deep history, starting from the tool-creating period (the longest and most influential on our physical and mental capacities) to the settlement period (agriculture, domestication, villages and cities, written language), the industrial period (science, engineering, reformation, and renaissance), and finally the communication period (mass media, digital technologies, and global networks). Volume 2 looks into humans in interaction - our physiology, anatomy, neurology, psychology, how we experience and influence the world, and how we (think we) think. From this transdisciplinary understanding, design approaches and frameworks are presented to potentially guide future developments and innovations. The aim of the book is to be a guide and inspiration for designers, artists, engineers, psychologists, media producers, social scientists, etc., and, as such, be useful for both novices and more experienced practitioners. Image Credit: Still of interactive video pattern created with a range of motion sensors in the Facets kaleidoscopic algorithm (based underwater footage of seaweed movement) by the author on 4 February 2010, for a lecture at Hyperbody at the Faculty of Architecture, TU Delft, NL.
Solid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However, these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems, Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering, analyzing, modeling, validating, testing, and writing requirements for systems of all kinds, with an intentional focus on software-intensive systems. It brings into play a variety of formal methods, social models, and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers, systems engineers, and senior and graduate students of software or systems engineering. Since the first edition, there have been made many changes and improvements to this textbook. Feedback from instructors, students, and corporate users was used to correct, expand, and improve the materials. The fourth edition features two newly added chapters: "On Non-Functional Requirements" and "Requirements Engineering: Road Map to the Future." The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things, Cloud Computing, Blockchain, Artificial Intelligence, and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques, agile approaches (e.g., Kanpan, SAFe, and DEVOps), requirements tools, requirements representation, risk management approaches, and functional size measurement methods. The fourth edition also has significant additions of vignettes, exercises, and references. Another new feature is scannable QR codes linked to sites containing updates, tools, videos, and discussion forums to keep readers current with the dynamic field of requirements engineering.
Includes step-by-step screenshots for all the examples Shows the graphical user interface of COMSOL, which does not require any programming effort Provides chapter-end problems for extensive practice along with solutions Includes actual examples of chemical reactors, transport processes, fluid flow, and heat and mass transfer
The Unified Modeling Language, better known as UML, has become the de facto standard modeling language for analyzing and designing software applications and systems. Software analysis and design is just as much an art as it is a science. UML Diagramming: A Catalog of Cases shows the art and the science behind successful software analysis and design with more than 35 case studies of applications of a variety of industries, including: Transportation Healthcare Supply chain management Education Agriculture Manufacturing The book explains UML diagramming through case studies to help systems and software developers specify, visualize, construct, and document the artifacts of software systems. The cases demonstrate how UML embodies software engineering best practices for modeling large and complex systems. They show how UML is an intuitive diagramming language that can be easily understood by end-users and business professionals. These cases studies also demonstrate how UML is a powerful language for communicating software designs to help developers and end users validate application scope, requirements, and features. Case studies highlighted in the book included: WEBMED healthcare service system services Inventory management system Business process outsourcing (BPO) management system Weather monitoring system Product recommendation system Textile management system Smart traffic management system Online pharmacy management system Placement automation system Farm management system Art gallery management system Website development This catalog of UML case studies is an invaluable reference for students studying software engineering, programmers starting out their careers, and seasoned systems developers needing a reference guide.
The Unified Modeling Language, better known as UML, has become the de facto standard modeling language for analyzing and designing software applications and systems. Software analysis and design is just as much an art as it is a science. UML Diagramming: A Catalog of Cases shows the art and the science behind successful software analysis and design with more than 35 case studies of applications of a variety of industries, including: Transportation Healthcare Supply chain management Education Agriculture Manufacturing The book explains UML diagramming through case studies to help systems and software developers specify, visualize, construct, and document the artifacts of software systems. The cases demonstrate how UML embodies software engineering best practices for modeling large and complex systems. They show how UML is an intuitive diagramming language that can be easily understood by end-users and business professionals. These cases studies also demonstrate how UML is a powerful language for communicating software designs to help developers and end users validate application scope, requirements, and features. Case studies highlighted in the book included: WEBMED healthcare service system services Inventory management system Business process outsourcing (BPO) management system Weather monitoring system Product recommendation system Textile management system Smart traffic management system Online pharmacy management system Placement automation system Farm management system Art gallery management system Website development This catalog of UML case studies is an invaluable reference for students studying software engineering, programmers starting out their careers, and seasoned systems developers needing a reference guide.
This book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human factors that may result in a software production crisis. These factors are particularly important for the enterprise-scale applications, typically considered very complex in managerial and technological aspects and therefore, specifically addressed by the discipline of software engineering. Therefore, this book throws light on the crisis responsive, resilient methodologies and practices; therewith, it also focuses on their evolutionary changes and the resulting benefits.
Enterprises and organizations of any kind embedded in today's economic environment are deeply dependent on their ability to take part in collaborations. Consequently, it is strongly required for them to get actively involved for their own benefit in emerging, potentially opportunistic collaborative enterprise networks. The concept of "interoperability" has been defined by INTEROP-VLab as "The ability of an enterprise system or application to interact with others at a low cost in a flexible approach". Consequently, interoperability of organizations appears as a major issue to succeed in building on the fly emerging enterprise networks. The International Conference on Interoperability for Enterprise Systems and Applications (I-ESA 2014) was held under the motto "interoperability for agility, resilience and plasticity of collaborations" on March 26-28, 2014 and organized by the Ecole des Mines d'Albi-Carmaux, France on behalf of the European Laboratory for Enterprise Interoperability (INTEROP-VLab). On March 24-25, co-located with the conference eight workshops and one doctoral symposium were held in four tracks complementing the program of the I-ESA'14 conference. The workshops and the doctoral symposium address areas of greatest current activity focusing on active discussions among the leading researchers in the area of Enterprise Interoperability. This part of the conference helps the community to operate effectively, building co-operative and supportive international links as well as providing new knowledge of on-going research to practitioners. The workshops and doctoral symposium aimed at exploiting new issues, challenges and solutions for Enterprise Interoperability (EI) and associated domains of innovation such as Smart Industry, Internet-Of-Things, Factories of the Future, EI Applications and Standardisation. These proceedings include the short papers from the I-ESA'14 workshops and the doctoral symposium. The book is split up into 9 sections, one for each workshop and one for the doctoral symposium. All sections were organized following four tracks: (1) EI and Future Internet / Factory of the Future; (2) EI Application Domains and IT; (3) EI Standards; (4) EI Doctoral Symposium. For each section, a workshop report is provided summarizing the content and the issues discussed during the sessions. The goal of the first track was to offer a discussion opportunity on interoperability issues regarding the use of Internet of Things on manufacturing environment (Workshops 1 and 3) on one hand, and regarding the potential of innovation derived from the use of digital methods, architectures and services such as Smart Networks (Workshops 2 and 4) on the other hand. The second track focused on particular application domains that are looking for innovative solutions to support their strong collaborative needs. Thus, the track developed one workshop on the use of EI solution for Future City-Logistics (Workshop 5) and one on the use of EI solutions for Crisis / Disaster Management (Workshop 6). The third track studied the recent developments in EI standardization. Two workshops were dedicated to this issue. The first one has proposed to focus on the management of standardization (Workshop 8) and the second one has chosen to work on the new knowledge on standardization developments in the manufacturing service domain (Workshop 9). The last track, the doctoral symposium presented research results from selected dissertations. The session discussed EI knowledge issues, notably in terms of gathering through social networks or Internet of Things and of exploitation through innovative decision support systems.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.
Metaheuristic algorithms are considered as generic optimization tools that can solve very complex problems characterized by having very large search spaces. Metaheuristic methods reduce the effective size of the search space through the use of effective search strategies. Book Features: Provides a unified view of the most popular metaheuristic methods currently in use Includes the necessary concepts to enable readers to implement and modify already known metaheuristic methods to solve problems Covers design aspects and implementation in MATLAB (R) Contains numerous examples of problems and solutions that demonstrate the power of these methods of optimization The material has been written from a teaching perspective and, for this reason, this book is primarily intended for undergraduate and postgraduate students of artificial intelligence, metaheuristic methods, and/or evolutionary computation. The objective is to bridge the gap between metaheuristic techniques and complex optimization problems that profit from the convenient properties of metaheuristic approaches. Therefore, engineer practitioners who are not familiar with metaheuristic computation will appreciate that the techniques discussed are beyond simple theoretical tools, since they have been adapted to solve significant problems that commonly arise in such areas.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.
The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation.
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.
Design Your Organization for Maximum Agile Success at Scale "[A] unique view of organizational agility. Cesario and Ilia first describe the [foundational] tools and vocabulary to think about agile enterprise-level change. The second section is a practical approach to adoption. It marries the foundational elements into a people and customer centric approach to change. The book is epic in scope ... but it manages to present a cookbook for agile adoption and change." --From the Foreword by Dave West, CEO, Scrum.org "Cesario and Ilia ... understand that a key element of successful change to being adaptive at scale is Organizational Design (OD)--and that OD is something senior managers need to own, master, create, and lead, not delegate. ... [F]ast delivery and learning isn't enough at scale. Without other adaptive OD elements in place, there might not be any concrete change. ... [A] wonderful book from two passionate people with years in the trenches involved in large-scale adaptive development." --From the Foreword by Craig Larman, co-creator, Large-Scale Scrum (LeSS) For Agile to succeed at scale, strategy, structures, processes, reward systems, and people practices must align with and reinforce each other across the entire organization. Creating Agile Organizations is about making that happen. Whether you're a leader, Scrum Master, or trainer, this book will help you use effective Organizational Design (OD) to achieve successful Agile transformation at the enterprise level. Drawing on years of experience scaling Scrum, renowned Large-Scale Scrum (LeSS) experts Cesario Ramos and Ilia Pavlichenko present proven techniques for use with any technology, in any large environment. In the context of a true systems-thinking approach, they provide specific solutions for challenges such as preparing and facilitating large-scale Scrum meetings, honing newly relevant leadership skills, and addressing challenges that cut across the entire organization. This book includes a library of tested tools for effective Agile leadership, including Product Definition Guides for describing any new product and a Feature Heat Map for designing teams and entire organizations. Organizing for adaptability, making strategic optimization choices, and choosing informed tradeoffs Exploring and applying proven OD principles at the leadership level Taking a birds-eye view of the activities most crucial to large-scale adoption Coaching to make Agile transformation successful across your organization Planning, designing, and facilitating Agile workshops that work Preparing and launching highly effective, well-aligned Product Groups Coaching teams and guiding product ownership in large groups
Combining theory and practice, this updated new edition provides a complete overview of how to create deep and meaningful quests for games. It uses the Unity game engine in conjunction with Fungus and other free plugins to provide an accessible entry into quest design. The book begins with an introduction to the theory and history of quests in games, before covering four theoretical components of quests: their spaces, objects, actors, and challenges. Each chapter also includes a practical section, with accompanying exercises and suggestions for the use of specific technologies for four crucial aspects of quest design: * level design * quest item creation * NPC and dialogue construction * scripting This book will be of great interest to all game designers looking to create new, innovative quests in their games. It will also appeal to new media researchers, as well as humanities scholars in the fields of mythology and depth-psychology that want to bring computer-assisted instruction into their classroom in an innovative way. The companion website includes lecture and workshop slides, and can be accessed at: www.designingquests.com
Combining theory and practice, this updated new edition provides a complete overview of how to create deep and meaningful quests for games. It uses the Unity game engine in conjunction with Fungus and other free plugins to provide an accessible entry into quest design. The book begins with an introduction to the theory and history of quests in games, before covering four theoretical components of quests: their spaces, objects, actors, and challenges. Each chapter also includes a practical section, with accompanying exercises and suggestions for the use of specific technologies for four crucial aspects of quest design: * level design * quest item creation * NPC and dialogue construction * scripting This book will be of great interest to all game designers looking to create new, innovative quests in their games. It will also appeal to new media researchers, as well as humanities scholars in the fields of mythology and depth-psychology that want to bring computer-assisted instruction into their classroom in an innovative way. The companion website includes lecture and workshop slides, and can be accessed at: www.designingquests.com |
You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,266
Discovery Miles 12 660
Research Anthology on Architectures…
Information R Management Association
Hardcover
R12,620
Discovery Miles 126 200
Edge/Fog Computing Paradigm: The…
Pethuru Raj, Kavita Saini, …
Hardcover
R3,966
Discovery Miles 39 660
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka
Hardcover
R3,950
Discovery Miles 39 500
Principles of Security and Trust - 7th…
Lujo Bauer, Ralf Kusters
Hardcover
R1,547
Discovery Miles 15 470
Principles of Big Graph: In-depth…
Ripon Patgiri, Ganesh Chandra Deka, …
Hardcover
R3,925
Discovery Miles 39 250
|