did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470597170

The Dark Side of Software Engineering Evil on Computing Projects

by ;
  • ISBN13:

    9780470597170

  • ISBN10:

    0470597178

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2011-02-22
  • Publisher: Wiley-IEEE Computer Society Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $53.28 Save up to $0.27
  • Buy New
    $53.01
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Scandal! Corruption! Software engineering?Industry experts Johann Rost and Robert L. Glass explore the seamy underbelly of software engineering in this timely report on and analysis of the prevalance of subversion, lying, hacking, and espionage on every level of software project management. Based on the authors' original research and augmented by frank discussion and insights from other well-respected figures, The Dark Side of Software Engineering goes where other management studies fear to tread -- a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.

Author Biography

Johann Rost has worked in the software industry for twenty years. He has taught at the University of Applied Science at Bingen, Germany, and at Politehnica University at Bucharest, Romania. Robert L. Glass is the author of twenty-eight books on computing subjects, including the bestselling Facts and Fallacies of Software Engineering. He has written nearly one hundred articles on computing subjects and has served as a columnist for three leading publications-Communications of the ACM (The Practical Programmer), IEEE Software (The Loyal Opposition), and Information Systems Management (Through a Glass, Darkly).

Table of Contents

Forewordp. ix
Introductionp. 1
What's the Dark Side?p. 1
Why the Dark Side?p. 2
Who Cares About the Dark Side?p. 3
How Dark is the Dark Side?p. 5
What Else is on the Dark Side?p. 7
Ethics and the Dark Sidep. 8
Personal Anecdotes About the Dark Sidep. 11
Referencep. 14
Dark Side Issuesp. 15
Subversionp. 17
Introductory Case Studies and Anecdotesp. 17
A Faculty Feedback Systemp. 18
An Unusual Cooperative Effortp. 21
Lack of Cooperation due to Self Interestp. 22
An Evil Teammatep. 22
Thwarting the Evil Unionp. 24
The Survey: Impact of Subversive Stakeholders On Software Projectsp. 24
Introductionp. 25
The Surveyp. 26
The Survey Findingsp. 27
Conclusionsp. 34
Impact on Practicep. 35
Impact on Researchp. 35
Limitationsp. 35
Challengesp. 36
Acknowledgmentsp. 37
Selected Responsesp. 37
Sample Answers to the Question: ôWhat Were the Motivations and Goals of the Subversive Stakeholders?öp. 37
Sample Answers to the Question ôHow Were the Subversive Attacks Discovered?öp. 45
Sample Answers to the Question ôHow Can Projects be Defended Against Subversive Stakeholders?öp. 49
A Follow-Up to the Survey: Some Hypotheses and Related Survey Findingsp. 56
Referencesp. 80
Lyingp. 81
Introductory Case Studies and Anecdotesp. 81
Incidents of Lying: The Surveyp. 86
The Survey Resultsp. 87
General Scopep. 87
An Overview of the Problemp. 88
Clarification of Termsp. 89
Discussionp. 93
Conclusionsp. 93
Limitationsp. 94
Qualitative Survey Responses on Lyingp. 95
What Can Be Done About Lying?p. 96
The Questionnaire Used in the Surveyp. 107
Referencesp. 112
Hackingp. 113
Case Studies of Attacks and Biographies of Hackersp. 113
Cyber Terrorism and Government-Sponsored Hackingp. 118
The Hacker Subculturep. 121
Why They Are Called ôHackersöp. 121
Motivation of Hackersp. 121
Hacker Slangp. 122
Hacker Ethicsp. 123
Public Opinion about Hackersp. 130
How a Hacker Is Identifiedp. 132
Time Line of a Typical Malware Attackp. 135
Hacker Economy: How Does a Hacker Make Money?p. 136
Social Engineeringp. 142
Social Engineering Examples and Case Studiesp. 143
Tactics of Social Engineeringp. 151
A Lingering Questionp. 153
Late-Breaking Newsp. 154
Theft of Informationp. 157
Introductionp. 157
Case Studiesp. 158
Data Theftp. 158
Source Code Theftp. 161
How Do the Victims Find Out That Their Secrets Are Stolen?p. 164
Intellectual Property Protectionp. 166
Trade Secret Protectionp. 167
Copyright Protectionp. 169
Patent Protectionp. 169
Steganographyp. 170
Open Versus Closed Sourcep. 170
Espionagep. 175
Introductionp. 175
What Is Espionage?p. 176
Case Studiesp. 177
Sweden Versus Russiap. 178
Shekhar Vermap. 178
Lineage IIIp. 179
GM versus VW: Jose Ignacio Lopezp. 179
British Midland Toolsp. 179
Solid Oak Softwarep. 180
Proctor & Gamble versus Unileverp. 181
News Corp Versus Vivendip. 181
Spying: Was A TI Chip Really Stolen by a French Spy?p. 181
Confickerp. 183
Cyber Warfarep. 185
Referencep. 187
Disgruntled Employees and Sabotagep. 189
Introduction and Backgroundp. 189
Disgruntled Employee Data Issuesp. 192
Data Tamperingp. 192
Data Destructionp. 194
Data Made Publicp. 196
Theft Via Datap. 199
Disgruntled Employee Software Issuesp. 199
Software Destructionp. 199
Disgruntled Employee System Issuesp. 200
What to Do About Disgruntled Employee Actsp. 203
Sabotagep. 206
Referencesp. 212
Whistle-Blowingp. 213
A Hypothetical Scenariop. 215
Whistle-Blowing and Software Engineeringp. 217
More Case Studies and Anecdotesp. 220
Jeffrey Wigand and Brown and Williamson Tobaccop. 220
A Longitudinal Study of Whistle-Blowingp. 221
An Even More Pessimistic Viewp. 222
Academic Whistle-Blowingp. 223
The Sum Total of Whistle-Blowingp. 224
Referencesp. 225
Appendix to Chapter 7 Practical Implications of the Research into whistle-Blowingp. 227
Referencesp. 240
Viewpoints on Dark Side Issuesp. 243
Introductionp. 243
Opinions, Predictions, and Beliefsp. 245
Automated Crimep. 246
Information Sourcesp. 237
Let's Play Make Believep. 258
Referencep. 260
Dark, Light, or Just Another Shade of Grey?p. 261
Rational Software Developers as Pathological Code Hackersp. 264
Personal Anecdotesp. 269
An Officer and a Gentleman Confronts the Dark Sidep. 270
Less Carrot and More Stickp. 273
Referencesp. 275
ôThem and Usö: Dispatches from the Virtual Software Team Trenchesp. 276
What is it to Lie on a Software Project?p. 281
ôMerciless Control Instrumentö and the Mysterious Missing Faxp. 284
Forest of Ardenp. 289
Hard-Headed Hardware Hit Manp. 292
A Lighthearted Anecdotep. 294
Conclusionsp. 299
Indexp. 303
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program