The Dark Side of Software Engineering

The Dark Side of Software Engineering
-0 %
Evil on Computing Projects
Besorgungstitel - wird vorgemerkt | Lieferzeit: Besorgungstitel - Lieferbar innerhalb von 10 Werktagen I

Unser bisheriger Preis:ORGPRICE: 47,90 €

Jetzt 43,50 €*

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9780470597170
Veröffentl:
2011
Erscheinungsdatum:
22.02.2011
Seiten:
316
Autor:
Johann Rost
Gewicht:
498 g
Format:
236x159x22 mm
Sprache:
Englisch
Beschreibung:

Johann Rost has worked in the software industry for twenty years. He has taught at the University of Applied Science at Bingen, Germany, and at Politehnica University at Bucharest, Romania.
 
Robert L. Glass is the author of twenty-eight books on computing subjects, including the bestselling Facts and Fallacies of Software Engineering. He has written nearly one hundred articles on computing subjects and has served as a columnist for three leading publications--Communications of the ACM ("The Practical Programmer"), IEEE Software ("The Loyal Opposition"), and Information Systems Management ("Through a Glass, Darkly").
Betrayal! Corruption! Software engineering?
 
Industry experts Johann Rost and Robert L. Glass explore the seamy underbelly of software engineering in this timely report on and analysis of the prevalance of subversion, lying, hacking, and espionage on every level of software project management. Based on the authors' original research and augmented by frank discussion and insights from other well-respected figures, The Dark Side of Software Engineering goes where other management studies fear to tread -- a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.
FOREWORD (Linda Rising).
 
INTRODUCTION.
 
I.1 What's the Dark Side?
 
I.1.1 Why the Dark Side?
 
I.1.2 Who Cares About the Dark Side?
 
I.1.3 How Dark is the Dark Side?
 
I.1.4 What Else is on the Dark Side?
 
I.1.5 Ethics and the Dark Side.
 
I.1.6 Personal Anecdotes About the Dark Side.
 
Reference.
 
PART 1: DARK SIDE ISSUES.
 
CHAPTER 1 SUBVERSION.
 
1.1 Introductory Case Studies and Anecdotes.
 
1.1.1 A Faculty Feedback System.
 
1.1.2 An Unusual Cooperative Effort.
 
1.1.3 Lack of Cooperation due to Self Interest.
 
1.1.4 An Evil Teammate.
 
1.1.5 Thwarting the Evil Union.
 
1.2 The Survey: Impact of Subversive Stakeholders On Software Projects.
 
1.2.1 Introduction.
 
1.2.2 The Survey.
 
1.2.3 The Survey Findings.
 
1.2.4 Conclusions.
 
1.2.5 Impact on Practice.
 
1.2.6 Impact on Research.
 
1.2.7 Limitations.
 
1.2.8 Challenges.
 
1.2.9 Acknowledgments.
 
1.3 Selected Responses.
 
1.3.1 Sample Answers to the Question: "What Were the Motivations and Goals of the Subversive Stakeholders?"
 
1.3.2 Sample Answers to the Question "How Were the Subversive Attacks Discovered?"
 
1.3.3 Sample Answers to the Question "How Can Projects be Defended Against Subversive Stakeholders?"
 
1.4 A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings.
 
References.
 
CHAPTER 2 LYING.
 
2.1 Introductory Case Studies and Anecdotes.
 
2.2 Incidents of Lying: The Survey.
 
2.2.1 The Survey Results.
 
2.2.2 General Scope.
 
2.2.3 An Overview of the Problem.
 
2.2.4 Clarifi cation of Terms.
 
2.2.5 Discussion.
 
2.2.6 Conclusions.
 
2.2.7 Limitations.
 
2.3 Qualitative Survey Responses on Lying.
 
2.4 What Can Be Done About Lying?
 
2.5 The Questionnaire Used in the Survey.
 
References.
 
CHAPTER 3 HACKING.
 
3.1 Case Studies of Attacks and Biographies of Hackers.
 
3.2 Cyber Terrorism and Government-Sponsored Hacking.
 
3.3 The Hacker Subculture.
 
3.3.1 Why They Are Called "Hackers".
 
3.3.2 Motivation of Hackers.
 
3.3.3 Hacker Slang.
 
3.3.4 Hacker Ethics.
 
3.3.5 Public Opinion about Hackers.
 
3.4 How a Hacker Is Identified.
 
3.5 Time Line of a Typical Malware Attack.
 
3.6 Hacker Economy: How Does a Hacker Make Money?
 
3.7 Social Engineering.
 
3.7.1 Social Engineering Examples and Case Studies.
 
3.7.2 Tactics of Social Engineering.
 
3.8 A Lingering Question.
 
3.9 Late-Breaking News.
 
CHAPTER 4 THEFT OF INFORMATION.
 
4.1 Introduction.
 
4.2 Case Studies.
 
4.2.1 Data Theft.
 
4.2.2 Source Code Theft.
 
4.3 How Do the Victims Find Out That Their Secrets Are Stolen?
 
4.4 Intellectual Property Protection.
 
4.4.1 Trade Secret Protection.
 
4.4.2 Copyright Protection.
 
4.4.3 Patent Protection.
 
4.4.4 Steganography.
 
4.5 Open Versus Closed Source.
 
CHAPTER 5 ESPIONAGE.
 
5.1 Introduction.
 
5.2 What Is Espionage?
 
5.3 Case Studies.
 
5.3.1 Sweden Versus Russia.
 
5.3.2 Shekhar Verma.
 
5.3.3 Lineage III.
 
5.3.4 GM versus VW: Jose Ignacio Lopez.
 
5.3.5 British Midland Tools.
 
5.3.6 Solid Oak Software.
 
5.3.7 Proctor & Gamble versus Unilever.
 
5.3.8 News Corp
Lieferung vom Verlag mit leichten Qualitätsmängeln möglich

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.