Saturday, October 31, 2009

Quality of Software Architectures: Second International Conference on Quality of Software Architectures, QoSA 2006, Västeras, Schweden, June 27-29, ... / Programming and Software Engineering)

Quality of Software Architectures: Second International Conference on Quality of Software Architectures, QoSA 2006, Västeras, Schweden, June 27-29, ... / Programming and Software Engineering) Review


See more picture


Quality of Software Architectures: Second International Conference on Quality of Software Architectures, QoSA 2006, Västeras, Schweden, June 27-29, ... / Programming and Software Engineering) Feature

This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on the Quality of Software Architectures, QoSA 2006, held in Västerås, Sweden in June 2006, co-located with the 9th International Symposium on Component-Based Software Engineering, CBSE 2006. Coverage includes architecture evaluation, managing and applying architectural knowledge, and processes for supporting architecture quality.


Check price now


Rerate Products


Customer Review

Friday, October 30, 2009

Just Enough Software Architecture: A Risk-Driven Approach

Just Enough Software Architecture: A Risk-Driven Approach Review


See more picture


Just Enough Software Architecture: A Risk-Driven Approach Feature

This is a practical guide for software developers, and different than other software architecture books. Here's why:

It teaches risk-driven architecting. There is no need for meticulous designs when risks are small, nor any excuse for sloppy designs when risks threaten your success. This book describes a way to do just enough architecture. It avoids the one-size-fits-all process tar pit with advice on how to tune your design effort based on the risks you face.

It democratizes architecture. This book seeks to make architecture relevant to all software developers. Developers need to understand how to use constraints as guiderails that ensure desired outcomes, and how seemingly small changes can affect a system's properties.

It cultivates declarative knowledge. There is a difference between being able to hit a ball and knowing why you are able to hit it, what psychologists refer to as procedural knowledge versus declarative knowledge. This book will make you more aware of what you have been doing and provide names for the concepts.

It emphasizes the engineering. This book focuses on the technical parts of software development and what developers do to ensure the system works not job titles or processes. It shows you how to build models and analyze architectures so that you can make principled design tradeoffs. It describes the techniques software designers use to reason about medium to large sized problems and points out where you can learn specialized techniques in more detail.

It provides practical advice. Software design decisions influence the architecture and vice versa. The approach in this book embraces drill-down/pop-up behavior by describing models that have various levels of abstraction, from architecture to data structure design.


Check price now


Rerate Products


Customer Review

Wednesday, October 28, 2009

Memory Dump Analysis Anthology, Volume 2 (Vol 2)

Memory Dump Analysis Anthology, Volume 2 (Vol 2) Review


See more picture


Memory Dump Analysis Anthology, Volume 2 (Vol 2) Feature

This is a revised, edited, cross-referenced and thematically organized volume of selected DumpAnalysis.org blog posts about crash dump analysis and debugging written in January - September 2008 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software on Windows platforms and technical support and escalation engineers dealing with complex software issues. The second volume features: - 45 new crash dump analysis patterns - Pattern interaction and case studies - Updated checklist - Fully cross-referenced with Volume 1 - New appendixes


Check price now


Rerate Products


Customer Review

Tuesday, October 27, 2009

Software Architectures, Components, and Applications: Third International Conference on Quality of Software Architectures, QoSA 2007, Medford, MA, ... / Programming and Software Engineering)

Software Architectures, Components, and Applications: Third International Conference on Quality of Software Architectures, QoSA 2007, Medford, MA, ... / Programming and Software Engineering) Review


See more picture


Software Architectures, Components, and Applications: Third International Conference on Quality of Software Architectures, QoSA 2007, Medford, MA, ... / Programming and Software Engineering) Feature

This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on the Quality of Software Architectures, QoSA 2007, held in Medford, MA, USA, in July 2007, in conjunction with the 10th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2007, and the ROSATEA 2007 event, investigating the Role of Software Architecture for Testing and Analysis, forming the federated events on Component-Based Software Engineering and Software Architecture, CompArch 2007.

The 13 revised full papers presented together with 1 keynote lecture were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on architectural design and architectural decisions, tracing architectural decisions, architecture evaluation, architecture evolution, architecting process and architectural knowledge.


Check price now


Rerate Products


Customer Review

Monday, October 26, 2009

Secure Programming with Static Analysis

Secure Programming with Static Analysis Review


See more picture


Secure Programming with Static Analysis Feature

The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there’s a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers.

 

Coverage includes:

 

  Why conventional bug-catching often misses security problems

  How static analysis can help programmers get security right

  The critical attributes and algorithms that make or break a static analysis tool

  36 techniques for making static analysis more effective on your code

  More than 70 types of serious security vulnerabilities, with specific solutions

  Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more

  Techniques for handling untrusted input

  Eliminating buffer overflows: tactical and strategic approaches

  Avoiding errors specific to Web applications, Web services, and Ajax

  Security-aware logging, debugging, and error/exception handling

  Creating, maintaining, and sharing secrets and confidential information

  Detailed tutorials that walk you through the static analysis process

 

“We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software.”

Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language

 

“'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know.”

David Wagner, Associate Professor, University of California Berkeley

 

“Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited.”

Howard A. Schmidt, Former White House Cyber Security Advisor

 

BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects.

 

JACOB WEST manages Fortify Software’s Security Research Group, which is responsible for building security knowledge into Fortify’s products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail.

 

CD contains a working demonstration version of Fortify Software’s Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format.

 

 

Part I: Software Security and Static Analysis        1

1          The Software Security Problem          3

2          Introduction to Static Analysis 21

3          Static Analysis as Part of the Code Review Process    47

4          Static Analysis Internals          71

Part II: Pervasive Problems            115

5          Handling Input 117

6          Buffer Overflow           175

7          Bride of Buffer Overflow         235

8          Errors and Exceptions  265

Part III: Features and Flavors         295

9          Web Applications        297

10         XML and Web Services           349

11         Privacy and Secrets     379

12         Privileged Programs    421

Part IV: Static Analysis in Practice  457

13         Source Code Analysis Exercises for Java        459

14         Source Code Analysis Exercises for C 503

Epilogue          541

References      545

Index   559

 

 


Check price now


Rerate Products


Customer Review

Sunday, October 25, 2009

Quality of Software Architectures and Software Quality: First International Conference on the Quality of Software Architectures, QoSA 2005 and Second ... / Programming and Software Engineering)

Quality of Software Architectures and Software Quality: First International Conference on the Quality of Software Architectures, QoSA 2005 and Second ... / Programming and Software Engineering) Review


See more picture


Quality of Software Architectures and Software Quality: First International Conference on the Quality of Software Architectures, QoSA 2005 and Second ... / Programming and Software Engineering) Feature

This book constitutes the joint refereed proceedings of two colocated events: the First International Conference on the Quality of Software Architectures (QoSA 2005) and the Second International Workshop on Software Quality (SOQUA 2005) held in Erfurt, Germany, in September 2005. The 18 revised full papers presented were carefully reviewed and selected from 48 submissions. For QoSA 2005 only 12 papers - of the 31 submitted - were accepted for presentation; they are concerned with research and experiences that investigate the influence a specific software architecture has on software quality aspects. The papers are organized in topical sections on software architecture evaluation, formal approaches to model-driven QoS-handling, modelling QoS in software architectures, software architectures applied, architectural design for QoS, and model-driven software reliability estimation. The 6 papers accepted for SOQUA 2005 - from 17 submissions - mainly focus on quality assurance and on software testing. They are organized in topical sections on test case selection, model-based testing, unit testing, and performance testing.


Check price now


Rerate Products


Customer Review

Friday, October 23, 2009

Software Quality Control, Error, Analysis (Advanced Computing and Telecommunications Series)

Software Quality Control, Error, Analysis (Advanced Computing and Telecommunications Series) Review


See more picture


Software Quality Control, Error, Analysis (Advanced Computing and Telecommunications Series) Feature

Software Quality Control, Error, Analysis


Check price now


Rerate Products


Customer Review

Thursday, October 22, 2009

Software Change Impact Analysis (Practitioners)

Software Change Impact Analysis (Practitioners) Review


See more picture


Software Change Impact Analysis (Practitioners) Feature

As software systems become increasingly large and complex, the need increases to predict and control the effects of software changes. This book captures the latest information on the science and art of determining what software parts affect each other. It is a handy one-volume source of useful information about software change impact analysis techniques and technical results. The book frames the field, focuses attention, and tempers expectations.

The book provides a battery of ideas for doing impact analysis better. The reader will gain a healthy respect for the strengths and limitations of impact analysis technology and a solid background that will provide valuable for years to come. The book identifies key impact analysis definitions and themes and illustrates those themes through a collection of representative papers. It includes reports on software source code dependency analysis and software traceability analysis and proposes how results from both areas can more effectively support impact analysis in software engineering repositories. It also describes why impact representation and determination techniques are at the heart of both source dependency analysis and traceability analysis. The papers provide fundamental information of enduring value and were selected by how well they illustrate the important themes and how well they equip the reader with a solid understanding for tackling impact analysis problems.


Check price now


Rerate Products


Customer Review

Wednesday, October 21, 2009

Project Plan Tasks for Business and Quality Analysts

Project Plan Tasks for Business and Quality Analysts Review


See more picture


Project Plan Tasks for Business and Quality Analysts Feature

Are you finding that you never seem to have enough time ona project to compete all of your tasks in the time frame allowed? Are you a new business or quality analyst and you’re not sure what tasks you should be completing for your projects?

This book has a list and descriptions of over 35 tasks that should be included in project plans for business and quality analysts. It also includes some added details about what information goes into some of the documents being created as part of these tasks.


Check price now


Rerate Products


Customer Review

Tuesday, October 20, 2009

Applied Software Measurement: Global Analysis of Productivity and Quality

Applied Software Measurement: Global Analysis of Productivity and Quality Review


See more picture


Applied Software Measurement: Global Analysis of Productivity and Quality Feature

Effectively forecast, manage, and control software across the entire project lifecycle

Accurately size, estimate, and administer software projects with real-world guidance from an industry expert. Fully updated to cover the latest tools and techniques, Applied Software Measurement, Third Edition details how to deploy a cost-effective and pragmatic analysis strategy. You will learn how to use function points and baselines, implement benchmarks and tracking systems, and perform efficiency tests. Full coverage of the latest regulations, metrics, and standards is included.