CART

(0) items

Software Engineering and How to Break Software,9780321171986
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Software Engineering and How to Break Software

by ;
Edition:
6th
ISBN13:

9780321171986

ISBN10:
0321171985
Format:
Package
Pub. Date:
1/1/2003
Publisher(s):
Addison Wesley
List Price: $117.20
More New and Used
from Private Sellers
Starting at $29.24
See Prices

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Software Engineering
    Software Engineering
  • Software Engineering
    Software Engineering




Table of Contents

Preface v
Part 1 Overview
1(94)
Introduction
3(17)
FAQs about software engineering
5(9)
Professional and ethical responsibility
14(6)
Key points
17(1)
Further reading
18(1)
Exercises
18(2)
Computer-based system engineering
20(22)
Emergent system properties
22(2)
Systems and their environment
24(2)
System modelling
26(3)
The system engineering process
29(8)
System procurement
37(5)
Key points
39(1)
Further reading
40(1)
Exercises
40(2)
Software processes
42(29)
Software process models
44(7)
Process iteration
51(4)
Software specification
55(1)
Software design and implementation
56(4)
Software validation
60(3)
Software evolution
63(1)
Automated process support
63(8)
Key points
68(1)
Further reading
68(1)
Exercises
69(2)
Project management
71(24)
Management activities
73(2)
Project planning
75(3)
Project scheduling
78(6)
Risk management
84(11)
Key points
90(1)
Further reading
91(1)
Exercises
92(3)
Part 2 Requirements
95(118)
Software requirements
97(24)
Functional and non-functional requirements
100(6)
User requirements
106(3)
System requirements
109(6)
The software requirements document
115(6)
Key points
119(1)
Further reading
119(1)
Exercises
120(1)
Requirements engineering processes
121(27)
Feasibility studies
123(1)
Requirements elicitation and analysis
124(13)
Requirements validation
137(2)
Requirements management
139(9)
Key points
145(1)
Further reading
145(1)
Exercises
146(2)
System models
148(23)
Context models
150(3)
Behavioural models
153(5)
Data models
158(2)
Object models
160(6)
CASE workbenches
166(5)
Key points
168(1)
Further reading
169(1)
Exercises
169(2)
Software prototyping
171(21)
Prototyping in the software process
174(6)
Rapid prototyping techniques
180(8)
User interface prototyping
188(4)
Key points
189(1)
Further reading
190(1)
Exercises
190(2)
Formal specification
192(21)
Formal specification in the software process
194(3)
Interface specification
197(7)
Behavioural specification
204(9)
Key points
209(1)
Further reading
210(1)
Exercises
210(3)
Part 3 Design
213(138)
Architectural design
215(24)
System structuring
219(5)
Control models
224(5)
Modular decomposition
229(4)
Domain-specific architectures
233(6)
Key points
236(1)
Further reading
237(1)
Exercises
237(2)
Distributed systems architectures
239(21)
Multiprocessor architectures
243(1)
Client-server architectures
244(5)
Distributed object architectures
249(3)
CORBA
252(8)
Key points
257(1)
Further reading
258(1)
Exercises
258(2)
Object-oriented design
260(25)
Objects and object classes
262(5)
An object-oriented design process
267(13)
Design evolution
280(5)
Key points
282(1)
Further reading
282(1)
Exercises
283(2)
Real-time software design
285(21)
System design
287(4)
Real-time executives
291(4)
Monitoring and control systems
295(5)
Data acquisition systems
300(6)
Key points
303(1)
Further reading
303(1)
Exercises
304(2)
Design with reuse
306(21)
Component-based development
310(8)
Application families
318(4)
Design patterns
322(5)
Key points
325(1)
Further reading
325(1)
Exercises
326(1)
User interface design
327(24)
User interface design principles
330(2)
User interaction
332(2)
Information presentation
334(6)
User support
340(5)
Interface evaluation
345(6)
Key points
347(1)
Further reading
348(1)
Exercises
348(3)
Part 4 Critical Systems
351(66)
Dependability
353(18)
Critical systems
356(3)
Availability and reliability
359(5)
Safety
364(3)
Security
367(4)
Key points
369(1)
Further reading
369(1)
Exercises
370(1)
Critical systems specification
371(21)
Software reliability specification
373(6)
Safety specification
379(8)
Security specification
387(5)
Key points
389(1)
Further reading
389(1)
Exercises
390(2)
Critical systems development
392(25)
Fault minimisation
393(7)
Fault tolerance
400(10)
Fault-tolerant architectures
410(3)
Safe system design
413(4)
Key points
414(1)
Further reading
415(1)
Exercises
415(2)
Part 5 Verification and Validation
417(70)
Verification and validation
419(21)
Verification and validation planning
423(2)
Software inspections
425(6)
Automated static analysis
431(3)
Cleanroom software development
434(6)
Key points
437(1)
Further reading
438(1)
Exercises
438(2)
Software testing
440(27)
Defect testing
442(10)
Integration testing
452(6)
Object-oriented testing
458(4)
Testing workbenches
462(5)
Key points
464(1)
Further reading
465(1)
Exercises
466(1)
Critical systems validation
467(20)
Formal methods and critical systems
469(1)
Reliability validation
470(6)
Safety assurance
476(7)
Security assessment
483(4)
Key points
484(1)
Further reading
484(1)
Exercises
485(2)
Part 6 Management
487(92)
Managing people
489(22)
Limits to thinking
490(7)
Group working
497(6)
Choosing and keeping people
503(3)
The People Capability Maturity Model
506(5)
Key points
508(1)
Further reading
509(1)
Exercises
509(2)
Software cost estimation
511(24)
Productivity
513(5)
Estimation techniques
518(2)
Algorithmic cost modelling
520(11)
Project duration and staffing
531(4)
Key points
533(1)
Further reading
533(1)
Exercises
534(1)
Quality management
535(22)
Quality assurance and standards
539(5)
Quality planning
544(2)
Quality control
546(1)
Software measurement and metrics
547(10)
Key points
555(1)
Further reading
555(1)
Exercises
556(1)
Process improvement
557(22)
Process and product quality
560(2)
Process analysis and modelling
562(4)
Process measurement
566(2)
The SEI Process Capability Maturity Model
568(5)
Process classification
573(6)
Key points
576(1)
Further reading
576(1)
Exercises
577(2)
Part 7 Evolution
579(84)
Legacy systems
581(20)
Legacy system structures
583(4)
Legacy system design
587(5)
Legacy system assessment
592(9)
Key points
598(1)
Further reading
599(1)
Exercises
599(2)
Software change
601(21)
Program evolution dynamics
603(2)
Software maintenance
605(9)
Architectural evolution
614(8)
Key points
620(1)
Further reading
620(1)
Exercises
621(1)
Software re-engineering
622(19)
Source code translation
626(2)
Reverse engineering
628(1)
Program structure improvement
629(3)
Program modularisation
632(2)
Data re-engineering
634(7)
Key points
638(1)
Further reading
639(1)
Exercises
639(2)
Configuration management
641(22)
Configuration management planning
644(3)
Change management
647(3)
Version and release management
650(5)
System building
655(1)
CASE tools for configuration management
656(7)
Key points
660(1)
Further reading
661(1)
Exercises
661(2)
References 663(16)
Index 679


Please wait while the item is added to your cart...