|
Showing 1 - 17 of
17 matches in All Departments
Practical Guidance on the Efficient Development of High-Quality
Software Introduction to Software Engineering, Second Edition
equips students with the fundamentals to prepare them for
satisfying careers as software engineers regardless of future
changes in the field, even if the changes are unpredictable or
disruptive in nature. Retaining the same organization as its
predecessor, this second edition adds considerable material on open
source and agile development models. The text helps students
understand software development techniques and processes at a
reasonably sophisticated level. Students acquire practical
experience through team software projects. Throughout much of the
book, a relatively large project is used to teach about the
requirements, design, and coding of software. In addition, a
continuing case study of an agile software development project
offers a complete picture of how a successful agile project can
work. The book covers each major phase of the software development
life cycle, from developing software requirements to software
maintenance. It also discusses project management and explains how
to read software engineering literature. Three appendices describe
software patents, command-line arguments, and flowcharts.
Practical Guidance on the Efficient Development of High-Quality
Software Introduction to Software Engineering, Second Edition
equips students with the fundamentals to prepare them for
satisfying careers as software engineers regardless of future
changes in the field, even if the changes are unpredictable or
disruptive in nature. Retaining the same organization as its
predecessor, this second edition adds considerable material on open
source and agile development models. The text helps students
understand software development techniques and processes at a
reasonably sophisticated level. Students acquire practical
experience through team software projects. Throughout much of the
book, a relatively large project is used to teach about the
requirements, design, and coding of software. In addition, a
continuing case study of an agile software development project
offers a complete picture of how a successful agile project can
work. The book covers each major phase of the software development
life cycle, from developing software requirements to software
maintenance. It also discusses project management and explains how
to read software engineering literature. Three appendices describe
software patents, command-line arguments, and flowcharts.
The first edition of this book was originally published in 1993 by
John Wiley under the same name, Advanced Topics in UNIX. It was
named an Alternate Main Selection of the Newbridge Book Club in the
same year. That book stayed in print for thirteen years, an
eternity in the computing literature. Due to changes in the
publishing industry, this edition of the book is only available
electronically. I was motivated to revise the book because of the
increased popularity of several variants of UNIX and on what I
learned from reviews of the previous published version of this
book. Linux has become increasingly popular, due in no little part
to it being so popular in the open source community and also
because it is serving as the basis of the operating system for the
Google Android phone. The Mach operating system, originally
developed at Carnegie Mellon University, is the basis for the
operating systems used to control Apple Macintosh computers.
Solaris, originally developed by Sun Microsystems, is now
considered by Oracle to be the top enterprise operating system and
also claimed to have been especially built for cloud computing. It
was clear to me that a revision of the book was necessary. I am
currently running versions of both Linux (Ubuntu) and Solaris on my
Windows PC. Of course, the operating system on my Macintosh is
based on Mach. My experience with multiple versions of UNIX-like
operating systems showed me that end users, application
programmers, system programmers, and system administrators often
had difficulties in making programs and utilities work well across
different UNIX variants, due to differences in file system
organization, different locations of critical configuration files,
and important, yet subtle, differences in how system calls operate.
There are also issues with different utilities, many of which are
either not available on all UNIX versions, or else require a
substantial effort to even get them to install properly. One of the
most interesting problems required detailed analysis of several
Linux variants in order to get a single public domain application
to work - the different Linux variants from Fedora (formerly Red
Hat), SUSE, and Ubuntu were examined before the application would
install and work properly. Many second editions dump material from
older technologies. I have chosen a different approach, guided by
my own research and experience in the efficient development of
large, high-quality, software systems in both UNIX and non-UNIX
environments over much of the last twenty-five years. Much of my
research in this area is based on the application of systematic
approaches to software reuse as part of the software development
process. In fact, I chose to produce a second edition of my book
Software Reuse: Methods, Models, Costs before I began revising this
book, Advanced Topics in UNIX. What is the relevance of software
reuse to a book on UNIX? A huge percentage of current software
applications for UNIX and other operating systems are built using
existing software components that are either partially or entirely
reused. Older software components necessarily have been built using
older technology and are likely to use some of the older system
calls as well as newly created calls. You need to understand the
differences in different generations of system calls and their
behavior if you are redeploying existing software components. That
is, after all, the reason for learning system calls if you are an
applications programmer. The same holds true for systems-level
programming, especially kernel-level programming, since operating
systems are rarely written from scratch. There are 11 chapters:
Introduction to UNIX, The User Interface, Input and Output, UNIX
File Systems, Introduction to Processes, Memory and Process
Management, Introduction to Interprocess Communication, The System
V IPC Package, Signals, Sockets, and RPC, IPC Comparison, and
Fault-Tolerant UNIX Software.
The motivation for this book is that while writing two books on
identity theft, I was struck by how some of the modern-day scams
had counterparts in the Bible. A re-reading of the Bible reinforced
this impression. The original intention was to write three, or
perhaps four, books, examining cases of identity theft in the Old
testament, New Testament, the Apocrypha, and, eventually, the
Qu'ran. After finishing the analysis of the King James Bible (the
primary biblical text used herein), and seeing how much of the
material that was necessary to include in this book required, it
was decided to combine the first three books into one and to leave
the analysis of the Qu'ran to an author more versed in its content.
Several public domain online versions of bibles were used in this
work. All can be found at either gutenberg.org or archive.org. The
primary versions used were The King James Bible, The Douay Rheims
Catholic Bible, and The Deuterocanonical Books of the Bible. The
biblical text has not been changed from the versions found, but has
been reformatted to meet the requirements of modern eBook readers.
In this book we will present the stories in the Bible that, at
least in my opinion, can be considered by a modern reader to
involve some form of the crime of identity theft. I invite you, the
readers, to comment on my selections in their reviews of this book.
No allegorical stories have been included in this book.
he headline was dreadful from a consumer's perspective. Data from
all Target stores had been criminally hacked, and essential
information on forty million credit and debit cards was stolen in
November and December of 2013. There are reports of angry consumers
calling Target's customer service and demanding help. The merchant
is the wrong place to call, just as it was pointless to call T. J.
Maxx when the data contained on sixty million of their customer's
cards were illegally obtained by criminal hackers. This
easy-to-understand, 79-page book is the fourth in the Identity
Theft series. It is intended for the general, non-specialist
reader, provides a set of overall strategies and specific actions
you should take if you are the victim of identity theft. There are
three appendices. The first appendix contains contact information
for the Federal Trade Commission, the three major credit reporting
agencies, many US banks, many consumer protection organizations,
and a few of the more established companies that specialize in
identity theft protection and recovery. The second appendix
contains a checklist for protecting yourself from identity theft.
Appendix three also contains a checklist; this one is used to aid
you in recovering from identity theft if you are a victim. Ron
Leach's lectures on identity theft have been attended by more than
3,500 people. Many more have heard him on closed-circuit
television. This experience, and his long experience as a professor
of computer science make him uniquely qualified to write this book,
the fourth in AfterMath's Identity Theft Series.
This book is an updated edition of the previous McGraw-Hill
edition, which was an essential guide to successful reuse across
the entire software life cycle. It explains in depth the
fundamentals, economics, and metrics of software reuse. The bottom
line is good news for designers of complex systems: Systematic
software reuse can succeed, even if the underlying technology is
changing rapidly. Software reuse has been called the central
technical concept of object-oriented design. This book covers reuse
in object-oriented systems, but goes far beyond in its coverage of
complex systems - the type that may evolve into "systems of
systems." Important new material has been added to this edition on
the changed state-of-the-art and state-of-the-practice of software
reuse, on product-line architectures, on the economics of reuse, on
the maintenance of COTS-based systems. A case study using DoDAF
(The Department of Defense Architectural Framework) in system
design has been included to show some new thinking about reuse and
some attributes of large-scale components of very large systems.
After an introduction to basics, the book shows you how to: 1.
Access reuse and disadvantages for your systems. 2.Understand and
use domain analysis. 3.Estimate total costs, including maintenance,
using life-cycle-based models. 4.Organize and manage reuse
libraries. 5.Certify software components that have been created at
any phase of the software life cycle your organization uses.
6.Implement systematic reuse using COTS (commercial, off-the-shelf)
components and other existing software. The book includes several
models and reengineering checklists, as well as important case
studies. These models and checklists help anyone faced with the
problem of whether to build, buy, reuse, or reengineer any software
component, system, or subsystem of reasonable complexity. Such
components, subsystems, and systems often fit into the new
paradigms of service-oriented architectures (SOA) and
software-as-a-service (SaAS). Software Reuse: Methods, Models,
Costs emphasizes the cost efficient development of high-quality
software systems in changing technology environments. Our primary
example of domain analysis, which is the analysis of software into
potentially reusable artifacts, often at a higher level than simply
source code modules, is the assessment of possibilities for reuse
in the Linux kernel. There are eight chapters in Software Reuse:
Methods, Models, Costs: What is Software Reuse?, Techniques (which
included domain analysis), Reuse Libraries, Certification of
Reusable Software Components, The Economics of Software Reuse,
Reengineering, Case Studies, and Tools For Software Reuse.
Written by a prominent computer scientist, this volume contains two
complete works of critical importance to even the most casual
computer user in the modern world. This volume contains two
complete works: "Data Recovery" and "Identity Theft in the Cyber
Age." Data Recovery: One of the greatest fears of anyone using a
computer, smartphone, or tablet is the loss of their data. But
there is hope, even in the worst situations. This book, written by
a long-time computer science professor, department chair, and
author, shows how the very complexity of modern computing devices
helps make data recovery possible. Most "lost" data can be
recovered easily by the average user. The book contains numerous
simple examples that illustrate the step-by-step data recovery
process for the most popular computer operating systems and
software. We'll also show you how to help recover your lost data
from smartphones and tablets, as well as any data you may have
stored in "the cloud." In some cases, the problems are more complex
than can reasonably be resolved by the typical user. The book also
provides information on how to tell if you need expert help to
solve your data recovery problems - and you'll have enough
technical background information how to judge the capability of
that supposedly expert help to make sure that the data is recovered
as much as humanly possible. Identity Theft in the Cyber Age: Do
you know how to protect your vital identity information when you
use computers for your banking, credit card transactions, and
everyday purchases? What about when you are using email, web
surfing, texting, or social networking? If you don't, then Identity
Theft in the Cyber Age is the book for you. This easy-to-understand
book will tell you what to do and what to avoid when preparing your
taxes; going to a bank, pharmacy, or doctor; shopping in person;
traveling; or using any kind of electronic commerce. You'll learn
about the most common security weaknesses of modern banking and
e-commerce software and when to avoid using certain software
systems, the tell-tale signs of potentially insecure transmission
of your data, and how to avoid the dangerous practice of "Pameiob."
You'll learn how you have to protect yourself from the kinds of
identity theft that can occur even if YOU never shop online. This
book is a comprehensive, easy-to-understand guide that is dedicated
to keeping your assets and identity safe while navigating this
dangerous world. It is based on the author's experiences as a
long-term identity theft consultant and lecturer and computer
scientist. Major topics in this complex subject are illustrated by
case studies describing the personal experiences of some of the
author's friends and acquaintances, and by experiences of some
prominent public figures. You'll learn about the potential profit
margins that make cybercrime so appealing to criminals - and why
such crime is so hard to prosecute. You will learn just how
pervasive the crime of identity theft is, and how you are at risk
even if you don't do any online banking or make any online
purchases using a credit card. We'll discuss some simple strategies
that can help you cope with the side effects of the increase in
digital information that is already available to potential identity
thieves. There are four main chapters. Chapter 1 is entitled
"Identity Theft: How Bad Is It?" and provides an overview of this
all too common problem. Chapter two, entitled "Identity Theft: How
Vulnerable are You?," provides examples of actual cases of the most
common types of identity. The third chapter is entitled "Protect
Yourself From Identity Theft" and contains a set of strategies that
can be used to greatly reduce the chances of you suffering identity
theft. The fourth chapter is entitled "What To Do If You Are An
Identity Victim." It provides a set of overall strategies and
specific actions you should take if you are the victim of identity
theft. There are three appendices.
This book provides essential information about the fastest ways to
get jobs in the computer industry, even without a four-year degree
or extensive computer programming experience. Jobs described
include: Technician Help Desk Cable Installer Assembler Hardware
Tester Computer Repair Expert Router Configuration Specialist
Free-lance special-purpose service provider Word Processor Data
Entry Clerk Certified Expert in a particular technology (Microsoft
MCSE, Novell, Cisco, 3Com, etc.) Obsolete Programming Languages
Expert Web Designer Computer Artist Desktop publisher Computer
Salesperson Computer Trainer ABOUT THE AUTHOR: Ronald J. Leach,
Ph.D., was a long-term professor of Computer Science and former
department chair before he recently retired from Howard University.
During the 2004-2005 academic year, while he was department chair,
Howard University sent more students to Microsoft than any other
school in the United States.
This experience, and his long experience as a professor of computer
science make him uniquely qualified to write this book. Do you know
how to protect your vital identity information when you use
computers for your banking, credit card transactions, and everyday
purchases? What about when you are using email, web surfing,
texting, or social networking? You'll learn about these in Twelve
and a Half Steps to Avoid Identity Theft. What do all these
companies, organizations, and people have in common? Heartland RBS
Worldpay Citizens Financial Group Inc Hannaford Brothers Co TJX
Companies Inc Marshalls TJ Maxx CardSystems Solutions The U.S.
Internal Revenue Service Ben Bernanke, Chairman of the Federal
Reserve Wyndam Worldwide Corporation (Wyndam hotels) Zappos Sony's
online accounts for Play Station users Verisign LinkedIn The sad
answer is that all of them have suffered well-publicized recent
successful attacks from identity thieves. Many of these attacks
involved thieves obtaining access to confidential financial
information from thousands, and in some cases, millions, of
customers. How can you protect yourselves from this crime? In this
book we describe 12 1/2 suggestions that can strongly reduce, or
even eliminate, the likelihood of you being an identity theft
victim. Why 12 1/2 steps? Because twelve of the steps are ones that
you can begin to take right away, and the other will require you to
do some additional work reading up on this vital topic. Here are
the twelve and a half simple steps to help avoid identity theft:
1.Strip to a bare minimum 2.Don't Pameiob 3.Be strong 4.Watch for
zombies 5.Watch for vampires 6.Free is too costly 7.Don't give too
much credit 8.Surf safely 9.Gullible's travels 10.Don't give it up
if you don't have to 11.Just the FAX, please 12.Be shrewd and shred
12 1/2. Get more information This short, easy-to-understand book,
intended for the general, non-specialist reader, will tell you what
to do and what to avoid when going to a bank, pharmacy, or doctor;
shopping in person; traveling; or using any kind of electronic
commerce. You'll learn about the most common security weaknesses of
modern banking and e-commerce software and when to avoid using
certain software systems, the tell-tale signs of potentially
insecure transmission of your data, and how to avoid the dangerous
practice of "Pameiob." You'll learn how you have to protect
yourself from the kinds of identity theft that can occur even if
YOU never do any online shopping. This book is a brief,
easy-to-understand guide that is dedicated to keeping your assets
and identity safe while navigating this dangerous world. The book
is based on the author's experiences as a long-term identity theft
consultant and lecturer and computer scientist. Want more detailed
information on identity theft? Then "Identity Theft in the Cyber
Age" is the book for yo
Overview This book delivers what the title states: It describes the
101 most important UNIX and Linux commands and system calls. The
book bridges the gap between on-line tutorials and manual pages on
one hand, and books of 1,000 pages or more that explore the nuances
of many shell commands in exhaustive detail. While most of these
sources provide excellent information, they do not really solve the
plight of the novice user, nor do they fully answer the questions
that more experienced, and even expert, users often have. Much of
the complexity of UNIX and Linux, and much of the difficulty faced
by users is caused by the extremely large and rich set of shell
commands, many of which have a very large set of allowable options
that, while useful in certain circumstances, often provide more
frustration than help because of their complexity. Many UNIX and
Linux system calls are also complex, and have interactions that can
be rather difficult for many programmers.
Ronald J. Leach's lectures on identity theft have been attended by
more than 1,200 people. Many more have heard him on closed-circuit
television. This book is based on his experiences as an identity
theft professional and as a long-term professor of computer
science. Do you know how to protect your vital identity information
when you use computers for your banking, credit card transactions,
and everyday purchases? What about email, web surfing, texting, and
social networking? This book, intended for the general,
non-specialist reader, will tell you what to avoid in using
electronic commerce. You'll learn about the most common security
weaknesses of modern banking and e-commerce software and when to
avoid using certain systems, the tell-tale signs of potentially
insecure transmission of your data, and how to avoid the dangerous
practice of "Pameiob." This book is a comprehensive,
easy-to-understand guide, based on the author's experiences as a
long-term identity theft lecturer and computer scientist, and is
dedicated to keeping your assets and identity safe while navigating
this dangerous world. Major topics in this complex subject are
illustrated by case studies describing the personal experiences of
some of the author's friends and acquaintances, and by experiences
of some prominent public figures. You'll learn about the potential
profit margins that make cybercrime so appealing to criminals - and
why such crime is so hard to prosecute. In this book you will learn
just how pervasive the crime of identity theft is, and how you are
at risk even if you don't do any online banking or make any online
purchases using a credit card. We'll discuss some simple strategies
that can help you cope with the side effects of the increase in
digital information that is already available to potential identity
thieves. There are four main chapters. Chapter 1 is entitled
Identity Theft: How Bad Is It? and provides an overview of this all
too common problem. Chapter two, entitled Identity Theft: How
Vulnerable are You?, provides examples of actual cases of the most
common types of identity theft that occur today. The third chapter
is entitled Protect Yourself From Identity Theft and contains a set
of strategies that can be used to greatly reduce the chances of you
suffering identity theft. The fourth chapter is entitled What To Do
If You Are An Identity Victim. It provides a set of overall
strategies and specific actions you should take if you are the
victim of identity theft. There are three appendices. The first
appendix contains contact information for the Federal Trade
Commission, the three major credit reporting agencies, many US
banks, many consumer protection organizations, and a few of the
more established companies that specialize in identity theft
protection and recovery. The second appendix contains a checklist
for protecting yourself from identity theft. Appendix three also
contains a checklist; this one is used to aid you in recovering
from identity theft if you are a victim.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|