0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (66)
  • R250 - R500 (239)
  • R500+ (7,512)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Software engineering

Conceptual Modeling of Information Systems (Hardcover, 2007 ed.): Antoni Olive Conceptual Modeling of Information Systems (Hardcover, 2007 ed.)
Antoni Olive
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This brilliant textbook explains in detail the principles of conceptual modeling independently from particular methods and languages and shows how to apply them in real-world projects. The author covers all aspects of the engineering process from structural modeling over behavioral modeling to meta-modeling, and completes the presentation with an extensive case study based on the osCommerce system. Written for computer science students in classes on information systems modeling as well as for professionals feeling the need to formalize their experiences or to update their knowledge, Olive delivers here a comprehensive treatment of all aspects of the modeling process. His book is complemented by lots of exercises and additional online teaching material."

Essential Software Architecture (Hardcover, 2nd ed. 2011): Ian Gorton Essential Software Architecture (Hardcover, 2nd ed. 2011)
Ian Gorton
R1,895 Discovery Miles 18 950 Ships in 10 - 15 working days

Job titles like Technical Architect and Chief Architect nowadays abound in software industry, yet many people suspect that architecture is one of the most overused and least understood terms in professional software development.

Gorton s book tries to resolve this dilemma. It concisely describes the essential elements of knowledge and key skills required to be a software architect. The explanations encompass the essentials of architecture thinking, practices, and supporting technologies. They range from a general understanding of structure and quality attributes through technical issues like middleware components and service-oriented architectures to recent technologies like model-driven architecture, software product lines, aspect-oriented design, and the Semantic Web, which will presumably influence future software systems. This second edition contains new material covering enterprise architecture, agile development, enterprise service bus technologies, RESTful Web services, and a case study on how to use the MeDICi integration framework.

All approaches are illustrated by an ongoing real-world example. So if you work as an architect or senior designer (or want to someday), or if you are a student in software engineering, here is a valuable and yet approachable knowledge source for you.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Partnering with HMS: A Guide for App Developers (Hardcover): Xihai Wang, Yue Wang, Hailiang Wu Partnering with HMS: A Guide for App Developers (Hardcover)
Xihai Wang, Yue Wang, Hailiang Wu; Contributions by Zhang Zhou
R3,366 Discovery Miles 33 660 Ships in 18 - 22 working days

Partnering with HMS: A Guide for App Developers is the first book to introduce readers to the Huawei Mobile Services (HMS) ecosystem. It gives developers a fundamental understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better. This book is also a quick start guide for kit integration and practical environment setup, detailing the functions and principles behind each kit. By demonstrating how to integrate kits, the authors teach these kits by action: Account Kit, IAP, Push Kit, Location Kit, Map Kit, Site Kit, Safety Detect, and FIDO. Readers are fully introduced to how they can use HMS open capabilities to develop quality apps, acquire users, and monetize their hard work. In addition, the ecosystem background - the business model and value chain that underpin the entire ecosystem as well as its privacy compliance framework - is crucial to operations and illustrated in this book.

Test Automation - A manager's guide (Paperback): Boby Jose Test Automation - A manager's guide (Paperback)
Boby Jose
R1,344 Discovery Miles 13 440 Ships in 18 - 22 working days

The practice of test automation is invaluable for modern software testers. This comprehensive guide for managers covers test automation in-depth for medium- to large-scale implementations, from the benefits of test automation to defining, building and implementing a test automation approach that is fit-for-purpose, to acquiring and executing test execution tools and frameworks.

Robust and Error-Free Geometric Computing (Paperback): Dave Eberly Robust and Error-Free Geometric Computing (Paperback)
Dave Eberly
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This is a how-to book for solving geometric problems robustly or error free in actual practice. The contents and accompanying source code are based on the feature requests and feedback received from industry professionals and academics who want both the descriptions and source code for implementations of geometric algorithms. The book provides a framework for geometric computing using several arithmetic systems and describes how to select the appropriate system for the problem at hand. Key Features: A framework of arithmetic systems that can be applied to many geometric algorithms to obtain robust or error-free implementations Detailed derivations for algorithms that lead to implementable code Teaching the readers how to use the book concepts in deriving algorithms in their fields of application The Geometric Tools Library, a repository of well-tested code at the Geometric Tools website, https://www.geometrictools.com, that implements the book concepts

Evolutionary Computation for Modeling and Optimization (Hardcover, 2006 ed.): Daniel Ashlock Evolutionary Computation for Modeling and Optimization (Hardcover, 2006 ed.)
Daniel Ashlock
R2,594 R1,694 Discovery Miles 16 940 Save R900 (35%) Ships in 10 - 15 working days

'Evolutionary Computation for Optimization and Modelling' is an introduction to evolutionary computation, selectionist algorithms that operate on populations of structures. It includes over 100 experiments and over 700 homework problems that introduce the topic with an application-oriented approach.

Software Engineering Techniques Applied to Agricultural Systems - An Object-Oriented and UML Approach (Hardcover, 2nd ed.... Software Engineering Techniques Applied to Agricultural Systems - An Object-Oriented and UML Approach (Hardcover, 2nd ed. 2014)
Petraq J Papajorgji, Panos M. Pardalos
R3,465 Discovery Miles 34 650 Ships in 10 - 15 working days

Software Engineering Techniques Applied to Agricultural Systems presents cutting-edge software engineering techniques for designing and implementing better agricultural software systems based on the object-oriented paradigm and the Unified Modeling Language (UML). The focus is on the presentation of rigorous step-by-step approaches for modeling flexible agricultural and environmental systems, starting with a conceptual diagram representing elements of the system and their relationships. Furthermore, diagrams such as sequential and collaboration diagrams are used to explain the dynamic and static aspects of the software system. This second edition includes: a new chapter on Object Constraint Language (OCL), a new section dedicated to the Model-VIEW-Controller (MVC) design pattern, new chapters presenting details of two MDA-based tools - the Virtual Enterprise and Olivia Nova and a new chapter with exercises on conceptual modeling. It may be highly useful to undergraduate and graduate students as the first edition has proven to be a useful supplementary textbook for courses in mathematical programming in agriculture, ecology, information technology, agricultural operations research methods, agronomy and soil science and applied mathematical modeling. The book has broad appeal for anyone involved in software development projects in agriculture and to researchers in general who are interested in modeling complex systems. From the reviews of the first edition: "The book will be useful for those interested in gaining a quick understanding of current software development techniques and how they are applied in practice... this is a good introductory text on the application of OOAD, UML and design patters to the creation of agricultural systems. It is technically sound and well written." -Computing Reviews, September 2006

Software Development Patterns and Antipatterns (Hardcover): Capers Jones Software Development Patterns and Antipatterns (Hardcover)
Capers Jones
R4,234 Discovery Miles 42 340 Ships in 10 - 15 working days

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10,000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives, software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns, software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies, breach of contract lawsuits, and the literature on major software failures. This section considers the factors involved with cost overruns, schedule delays, canceled projects, poor quality, and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section's first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence, as well as measures that can prove excellence to C-level executives, and with continuing excellence through the maintenance cycle as well as for software development.

Software Development Patterns and Antipatterns (Paperback): Capers Jones Software Development Patterns and Antipatterns (Paperback)
Capers Jones
R1,646 Discovery Miles 16 460 Ships in 10 - 15 working days

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10,000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives, software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns, software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies, breach of contract lawsuits, and the literature on major software failures. This section considers the factors involved with cost overruns, schedule delays, canceled projects, poor quality, and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section's first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence, as well as measures that can prove excellence to C-level executives, and with continuing excellence through the maintenance cycle as well as for software development.

Thriving Systems Theory and Metaphor-Driven Modeling (Hardcover, 2010 ed.): Leslie J. Waguespack Thriving Systems Theory and Metaphor-Driven Modeling (Hardcover, 2010 ed.)
Leslie J. Waguespack
R2,743 Discovery Miles 27 430 Ships in 18 - 22 working days

How is it that one system is more effective, appealing, satisfying and/or more beautiful than another to its stakeholder community? This question drove Christopher Alexander's fifty-year quest to explain great physical architecture and gave birth to pattern-languages for building that underpin much of modern systems engineering. How is it that so many individual stakeholders consistently recognize the same quality, the same beauty in a system? This question led George Lakoff to research the role of conceptual metaphor in human understanding. What is essential to stakeholders' satisfaction with systems? Fred Brooks, in his publications, addressed this question. This monograph fuses these diverse streams of thought in proposing Thriving Systems Theory by translating Alexander's properties of physical design quality into the abstract domain of information systems and modeling. Metaphor-Driven Modeling incorporates the theory while examining its impact throughout the system life cycle: modeling, design and deployment. The result is holistic and innovative, a perspective on system quality invaluable to students, practitioners and researchers of software and systems engineering.

Computational Design - Technology, Cognition and Environments (Hardcover): Rongrong Yu, Ning Gu, Michael J. Ostwald Computational Design - Technology, Cognition and Environments (Hardcover)
Rongrong Yu, Ning Gu, Michael J. Ostwald
R4,647 Discovery Miles 46 470 Ships in 10 - 15 working days

New computational design tools have evolved rapidly and been increasingly applied in the field of design in recent years, complimenting and even replacing the traditional design media and approaches. Design as both the process and product are changing due to the emergence and adoption of these new technologies. Understanding and assessing the impact of these new computational design environments on design and designers is important for advancing design in the contemporary context. Do these new computational environments support or hinder design creativity? How do those tools facilitate designers' thinking? Such knowledge is also important for the future development of design technologies. Research shows that design is never a mysterious non-understandable process, for example, one general view is that design process shares a common analysis-synthesis-evaluation model, during which designers interact between design problem and solution spaces. Understanding designers' thinking in different environments is the key to design research, education and practice. This book focuses on emerging computational design environments, whose impact on design and designers have not been comprehensively and systematically studied. It comprises three parts. The history and recent developments of computational design technologies are introduced in Part I. The main categories of technologies cover from computer-aided drafting and modelling tools, to visual programming and scripting tools for algorithmic design, to advanced interfaces and platforms for interactions between designers, between designers and computers, and between the virtual environment and the physical reality. To critically explore design thinking, especially in these new computational design environments, formal approaches to studying design thinking and design cognition are introduced and compared in Part II, drawing on literature and studies from the 70s to the current era. Part III concludes the book by exploring the impact of different computational design technologies on design and designers, using a series of case studies conducted by the author team building on their close collaboration over the past five years. The book offers new insights into designers' thinking in the rapidly evolving computational design environments, which have not been critically and systematically studied and reported in the current literature. The book is meant for design researchers, educators and students, professional practitioners and consultants, as well as people who are interested in computational design in general.

Research Software Engineering with Python - Building software that makes research possible (Paperback): Damien Irving, Kate... Research Software Engineering with Python - Building software that makes research possible (Paperback)
Damien Irving, Kate Hertweck, Luke Johnston, Joel Ostblom, Charlotte Wickham, …
R1,851 Discovery Miles 18 510 Ships in 10 - 15 working days

Based on the practical experiences of its authors, who collectively have spent several decades teaching software skills to scientists. Readers only need a basic understanding of Python includes over a hundred exercises to allow readers to practice their skills

Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback): Abu Sayed Mahfuz Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback)
Abu Sayed Mahfuz
R1,319 Discovery Miles 13 190 Ships in 10 - 15 working days

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.

Functional Reverse Engineering of Machine Tools (Paperback): Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain,... Functional Reverse Engineering of Machine Tools (Paperback)
Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain, Cedric Aimal Edwin
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical engineering, electrical engineering, control engineering, and computer hardware and software engineering, are covered. The book offers guidelines and covers design for machine tools, prototyping, augmented reality for machine tools, modern communication strategies, and enterprises of functional reverse engineering, along with case studies. Features Presents capacity building in machine tool development Discusses engineering design for machine tools Covers prototyping of strategic and non-strategic machine tools Illustrates augmented reality for machine tools Includes Internet of Things (IoT) for machine tools

Biometric Data in Smart Cities - Methods and Models of Collective Behavior (Hardcover): Stepan Bilan, Mykola Bilan, Ruslan... Biometric Data in Smart Cities - Methods and Models of Collective Behavior (Hardcover)
Stepan Bilan, Mykola Bilan, Ruslan Motornyuk, Serhii Yuzhakov
R3,093 Discovery Miles 30 930 Ships in 10 - 15 working days

In modern conditions of the development of intelligent systems to solve the problems of smart cities, more and more attention is paid to the construction of distributed intelligent systems, which, based on a network of sensors and specialized calculators, help residents and visitors of the city in real time to solve a whole range of complex problems that arise in an urban environment. In a smart city, much attention is paid to the processing of biometric information that comes from biometric sensors distributed throughout the city. Such biometric systems are multimodal and allow you to control the general condition of a person, and also help a person to move around the city and predict events within the city. This book describes methods for processing biometric information in a smart city environment. The theoretical foundations of building a biometric multisensor network, which allows you to create a unified urban biometric community, are considered. The theoretical foundations of the parallel shift technology and the Radon transformation on cellular automata with a hexagonal covering are presented. On the basis of these technologies, methods of biometric identification by gait parameters and the geometric shape of the auricle are described, which are effectively used in a smart city. A method for tracking dynamic changes in the state of a smart city in real time is considered. Models of behavior of colonies of living organisms, their formation, movement and interaction are described on the basis of the technology of cellular automata with active cells. Models of behavior of active cells in meeting with unwanted cells and models of combining and destruction of active cell colonies are also described. This book is intended for undergraduate, graduate students and specialists working and conducting research in the field of biometric information processing, as well as in the development and construction of distributed intelligent systems.

Software Engineering - A Methodical Approach, 2nd Edition (Hardcover, 2nd edition): Bradford Towle Jr., Elvis Foster Software Engineering - A Methodical Approach, 2nd Edition (Hardcover, 2nd edition)
Bradford Towle Jr., Elvis Foster
R4,116 Discovery Miles 41 160 Ships in 10 - 15 working days

Software Engineering: A Methodical Approach (Second Edition) provides a comprehensive, but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems, proven over several years of teaching, with outstanding results. The book covers concepts, principles, design, construction, implementation, and management issues of software engineering. Each chapter is organized systematically into brief, reader-friendly sections, with itemization of the important points to be remembered. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally, the book includes the author's original methodologies that add clarity and creativity to the software engineering experience. New in the Second Edition are chapters on software engineering projects, management support systems, software engineering frameworks and patterns as a significant building block for the design and construction of contemporary software systems, and emerging software engineering frontiers. The text starts with an introduction of software engineering and the role of the software engineer. The following chapters examine in-depth software analysis, design, development, implementation, and management. Covering object-oriented methodologies and the principles of object-oriented information engineering, the book reinforces an object-oriented approach to the early phases of the software development life cycle. It covers various diagramming techniques and emphasizes object classification and object behavior. The text features comprehensive treatments of: Project management aids that are commonly used in software engineering An overview of the software design phase, including a discussion of the software design process, design strategies, architectural design, interface design, database design, and design and development standards User interface design Operations design Design considerations including system catalog, product documentation, user message management, design for real-time software, design for reuse, system security, and the agile effect Human resource management from a software engineering perspective Software economics Software implementation issues that range from operating environments to the marketing of software Software maintenance, legacy systems, and re-engineering This textbook can be used as a one-semester or two-semester course in software engineering, augmented with an appropriate CASE or RAD tool. It emphasizes a practical, methodical approach to software engineering, avoiding an overkill of theoretical calculations where possible. The primary objective is to help students gain a solid grasp of the activities in the software development life cycle to be confident about taking on new software engineering projects.

Research Software Engineering with Python - Building software that makes research possible (Hardcover): Damien Irving, Kate... Research Software Engineering with Python - Building software that makes research possible (Hardcover)
Damien Irving, Kate Hertweck, Luke Johnston, Joel Ostblom, Charlotte Wickham, …
R4,397 Discovery Miles 43 970 Ships in 10 - 15 working days

Based on the practical experiences of its authors, who collectively have spent several decades teaching software skills to scientists. Readers only need a basic understanding of Python includes over a hundred exercises to allow readers to practice their skills

Introduction to Cryptography with Maple (Hardcover, 2013 ed.): Jose Luis Gomez-Pardo Introduction to Cryptography with Maple (Hardcover, 2013 ed.)
Jose Luis Gomez-Pardo
R1,542 Discovery Miles 15 420 Ships in 18 - 22 working days

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size.

A distinctive feature of the author's approach is the use of Maple as a programming environment in which not just the cryptographic primitives but also the most important cryptographic schemes are implemented following the recommendations of standards bodies such as NIST, with many of the known cryptanalytic attacks implemented as well. The purpose of the Maple implementations is to let the reader experiment and learn, and for this reason the author includes numerous examples. The book discusses important recent subjects such as homomorphic encryption, identity-based cryptography and elliptic curve cryptography. The algorithms and schemes which are treated in detail and implemented in Maple include AES and modes of operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin, Elgamal, Paillier, Cocks IBE, DSA and ECDSA. In addition, some recently introduced schemes enjoying strong security properties, such as RSA-OAEP, Rabin-SAEP, Cramer--Shoup, and PSS, are also discussed and implemented. On the cryptanalysis side, Maple implementations and examples are used to discuss many important algorithms, including birthday and man-in-the-middle attacks, integer factorization algorithms such as Pollard's rho and the quadratic sieve, and discrete log algorithms such as baby-step giant-step, Pollard's rho, Pohlig--Hellman and the index calculus method.

This textbook is suitable for advanced undergraduate and graduate students of computer science, engineering and mathematics, satisfying the requirements of various types of courses: a basic introductory course; a theoretically oriented course whose focus is on the precise definition of security concepts and on cryptographic schemes with reductionist security proofs; a practice-oriented course requiring little mathematical background and with an emphasis on applications; or a mathematically advanced course addressed to students with a stronger mathematical background. The main prerequisite is a basic knowledge of linear algebra and elementary calculus, and while some knowledge of probability and abstract algebra would be helpful, it is not essential because the book includes the necessary background from these subjects and, furthermore, explores the number-theoretic material in detail. The book is also a comprehensive reference and is suitable for self-study by practitioners and programmers."

Mathematical Foundations of Software Engineering - A Practical Guide to Essentials (Hardcover, 1st ed. 2023): Gerard... Mathematical Foundations of Software Engineering - A Practical Guide to Essentials (Hardcover, 1st ed. 2023)
Gerard O'Regan
R2,469 Discovery Miles 24 690 Ships in 18 - 22 working days

This textbook presents an introduction to the mathematical foundations of software engineering. It presents the rich applications of mathematics in areas such as error-correcting codes, cryptography, the safety and security critical fields, the banking and insurance fields, as well as traditional engineering applications. Topics and features: Addresses core mathematics for critical thinking and problem solving Discusses propositional and predicate logic and various proof techniques to demonstrate the correctness of a logical argument. Examines number theory and its applications to cryptography Considers the underlying mathematics of error-correcting codes Discusses graph theory and its applications to modelling networks Reviews tools to support software engineering mathematics, including automated and interactive theorem provers and model checking Discusses financial software engineering, including simple and compound interest, probability and statistics, and operations research Discusses software reliability and dependability and explains formal methods used to derive a program from its specification Discusses calculus, matrices, vectors, complex numbers, and quaternions, as well as applications to graphics and robotics Includes key learning topics, summaries, and review questions in each chapter, together with a useful glossary This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to learn how mathematics can assist them in building high-quality and reliable software on time and on budget. The text also serves as an excellent self-study primer for software engineers, quality professionals, and software managers.

Relating Software Requirements and Architectures (Hardcover, 2011 ed.): Paris Avgeriou, John Grundy, Jon G. Hall, Patricia... Relating Software Requirements and Architectures (Hardcover, 2011 ed.)
Paris Avgeriou, John Grundy, Jon G. Hall, Patricia Lago, Ivan Mistrik
R2,713 Discovery Miles 27 130 Ships in 18 - 22 working days

Why have a book about the relation between requirements and software architecture? Understanding the relation between requirements and architecture is important because the requirements, be they explicit or implicit, represent the function, whereas the architecture determines the form. While changes to a set of requirements may impact on the realization of the architecture, choices made for an architectural solution may impact on requirements, e.g., in terms of revising functional or non-functional requirements that cannot actually be met.

Although research in both requirements engineering and software architecture is quite active, it is in their combination that understanding is most needed and actively sought. Presenting the current state of the art is the purpose of this book. The editors have divided the contributions into four parts: Part 1 "Theoretical Underpinnings and Reviews" addresses the issue of requirements change management in architectural design through traceability and reasoning. Part 2 "Tools and Techniques" presents approaches, tools, and techniques for bridging the gap between software requirements and architecture. Part 3 "Industrial Case Studies" then reports industrial experiences, while part 4 on "Emerging Issues" details advanced topics such as synthesizing architecture from requirements or the role of middleware in architecting for non-functional requirements. The final chapter is a conclusions chapter identifying key contributions and outstanding areas for future research and improvement of practice.The book is targeted at academic and industrial researchers in requirements engineering or software architecture. Graduate students specializing in these areas as well as advanced professionals in software development will also benefit from the results and experiences presented in this volume.

Core Software Security - Security at the Source (Paperback): James Ransome, Anmol Misra Core Software Security - Security at the Source (Paperback)
James Ransome, Anmol Misra
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."-Dr. Dena Haritos Tsamitis. Carnegie Mellon University"... a must read for security specialists, software developers and software engineers. ... should be part of every security professional's library." -Dr. Larry Ponemon, Ponemon Institute"... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ..." -Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! "-Eric S. Yuan, Zoom Video CommunicationsThere is much publicity regarding network security, but the real cyber Achilles' heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software. Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people, process, and technology Highlights the key success factors, deliverables, and metrics for each phase of the SDL Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book's SDL framework View the authors' website at http://www.androidinsecurity.com/

Essentials of Microservices Architecture - Paradigms, Applications, and Techniques (Paperback): Chellammal Surianarayanan,... Essentials of Microservices Architecture - Paradigms, Applications, and Techniques (Paperback)
Chellammal Surianarayanan, Gopinath Ganapathy, Raj Pethuru
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner. Placing a software system into a production environment is elegantly simplified and sped up with the use of MSA development platforms, runtime environments, acceleration engines, design patterns, integrated frameworks, and related tools. The MSA ecosystem is expanding with third-party products that automate as many tasks as possible. MSA is being positioned as the enterprise-grade and agile-application design method. This book covers in-depth the features and facilities that make up the MSA ecosystem. Beginning with an overview of Service-Oriented Architecture (SOA) that covers the Common Object Request Broker Architecture (CORBA), Distributed Component Object Model (DCOM), and Remote Method Invocation (RMI), the book explains the basic essentials of MSA and the continuous delivery of applications to customers. The book gives software developers insight into: Current and emerging communication models Key architectural elements of MSA-based applications Designing efficient APIs for microservices MSA middleware platforms such as REST, SOAP, Apache Thrift, and gRPC Microservice discovery and the API gateway Service orchestration and choreography for composing individual services to achieve a useful business process Database transactions in MSA-centric applications Design, composition, security, and deployment patterns MSA security Modernizing legacy applications The book concludes with a chapter on composing and building powerful microservices. With the exponential growth of IoT devices, microservices are being developed and deployed on resource-constrained but resource-intensive devices in order to provide people-centric applications. The book discusses the challenges of these applications. Finally, the book looks at the role of microservices in smart environments and upcoming trends including ubiquitous yet disappearing microservices.

Software Engineering for Variability Intensive Systems - Foundations and Applications (Paperback): Ivan Mistrik, Matthias... Software Engineering for Variability Intensive Systems - Foundations and Applications (Paperback)
Ivan Mistrik, Matthias Galster, Bruce R. Maxim
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book addresses the challenges in the software engineering of variability-intensive systems. Variability-intensive systems can support different usage scenarios by accommodating different and unforeseen features and qualities. The book features academic and industrial contributions that discuss the challenges in developing, maintaining and evolving systems, cloud and mobile services for variability-intensive software systems and the scalability requirements they imply. The book explores software engineering approaches that can efficiently deal with variability-intensive systems as well as applications and use cases benefiting from variability-intensive systems.

Functional Reverse Engineering of Strategic and Non-Strategic Machine Tools (Hardcover): Wasim Ahmed Khan, Khalid Rahman,... Functional Reverse Engineering of Strategic and Non-Strategic Machine Tools (Hardcover)
Wasim Ahmed Khan, Khalid Rahman, Ghulam Hussain, Ghulam Abbas
R4,496 Discovery Miles 44 960 Ships in 10 - 15 working days

This book describes capacity building in strategic and non-strategic machine tool technology. It includes machine building in sectors such as machine tools, automobiles, home appliances, energy, and biomedical engineering, along with case studies. The book offers guidelines for capacity building in academia, covering how to promote enterprises of functional reverse engineering enterprises. It also discusses machine tool development, engineering design, prototyping of strategic, and non-strategies machine tools, as well as presenting communication strategies and IoT, along with case studies. Professionals from the CNC (Computer Numeric Control) machine tools industry, industrial and manufacturing engineers, and students and faculty in engineering disciplines will find interest in this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nonlinear MHD Waves and Turbulence…
Thierry Passot, Pierre-Louis Sulem Hardcover R1,622 Discovery Miles 16 220
Gesenius' Hebrew Grammar
Wilhelm. Gesenius Paperback R570 Discovery Miles 5 700
SMIL 3.0 - Flexible Multimedia for Web…
Dick C. a. Bulterman, Lloyd W. Rutledge Hardcover R1,493 Discovery Miles 14 930
DelphiMVCFramework - the official guide…
Daniele Teti Hardcover R1,363 Discovery Miles 13 630
Academic Podcasting And Mobile Assisted…
Betty Rose Facer, Mohammed Abdous Hardcover R4,538 Discovery Miles 45 380
Industrial Tomography - Systems and…
M. Wang Paperback R7,039 Discovery Miles 70 390
Arduino - The complete guide to Arduino…
James Arthur Hardcover R551 R505 Discovery Miles 5 050
Cloud Computing
Sam Revere Hardcover R3,029 R2,745 Discovery Miles 27 450
Geometric Continuum Mechanics and…
Simon R. Eugster Hardcover R3,225 Discovery Miles 32 250
The Mechanics and Thermodynamics of…
Miroslav Silhavy Hardcover R2,933 Discovery Miles 29 330

 

Partners