The dark side of software engineering : (Record no. 42447)

000 -LEADER
fixed length control field 10803nam a2201441 i 4500
001 - CONTROL NUMBER
control field 6381796
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191218152123.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151222s2010 nju ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470909959
Qualifying information oBook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780470597170
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0470597178
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780470909942
Qualifying information ePDF
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0470909943
Qualifying information ePDF
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0470909951
Qualifying information oBook
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9780470909959
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat06381796
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b00006481be9ff9
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.758
Item number .R67 2011eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 174.90051
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Rost, Johann,
Relator term author.
245 14 - TITLE STATEMENT
Title The dark side of software engineering :
Remainder of title evil on computing projects /
Statement of responsibility, etc. Johann Rost and Robert L. Glass.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Washington, DC] :
Name of producer, publisher, distributor, manufacturer IEEE Computer Society,
Date of production, publication, distribution, manufacture, or copyright notice c2011.
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2010]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (x, 305 pages).
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note FOREWORD (Linda Rising) -- INTRODUCTION -- I.1 What's the Dark Side? -- I.1.1 Why the Dark Side? -- I.1.2 Who Cares About the Dark Side? -- I.1.3 How Dark is the Dark Side? -- I.1.4 What Else is on the Dark Side? -- I.1.5 Ethics and the Dark Side -- I.1.6 Personal Anecdotes About the Dark Side -- Reference -- PART 1: DARK SIDE ISSUES -- CHAPTER 1 SUBVERSION -- 1.1 Introductory Case Studies and Anecdotes -- 1.1.1 A Faculty Feedback System -- 1.1.2 An Unusual Cooperative Effort -- 1.1.3 Lack of Cooperation due to Self Interest -- 1.1.4 An Evil Teammate -- 1.1.5 Thwarting the Evil Union -- 1.2 The Survey: Impact of Subversive Stakeholders On Software Projects -- 1.2.1 Introduction -- 1.2.2 The Survey -- 1.2.3 The Survey Findings -- 1.2.4 Conclusions -- 1.2.5 Impact on Practice -- 1.2.6 Impact on Research -- 1.2.7 Limitations -- 1.2.8 Challenges -- 1.2.9 Acknowledgments -- 1.3 Selected Responses -- 1.3.1 Sample Answers to the Question: "What Were the Motivations and Goals of the Subversive Stakeholders?" -- 1.3.2 Sample Answers to the Question "How Were the Subversive Attacks Discovered?" -- 1.3.3 Sample Answers to the Question "How Can Projects be Defended Against Subversive Stakeholders?" -- 1.4 A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings -- References -- CHAPTER 2 LYING -- 2.1 Introductory Case Studies and Anecdotes -- 2.2 Incidents of Lying: The Survey -- 2.2.1 The Survey Results -- 2.2.2 General Scope -- 2.2.3 An Overview of the Problem -- 2.2.4 Clarifi cation of Terms -- 2.2.5 Discussion -- 2.2.6 Conclusions -- 2.2.7 Limitations -- 2.3 Qualitative Survey Responses on Lying -- 2.4 What Can Be Done About Lying? -- 2.5 The Questionnaire Used in the Survey -- References -- CHAPTER 3 HACKING -- 3.1 Case Studies of Attacks and Biographies of Hackers -- 3.2 Cyber Terrorism and Government-Sponsored Hacking -- 3.3 The Hacker Subculture -- 3.3.1 Why They Are Called "Hackers" -- 3.3.2 Motivation of Hackers -- 3.3.3 Hacker Slang -- 3.3.4 Hacker Ethics.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.3.5 Public Opinion about Hackers -- 3.4 How a Hacker Is Identified -- 3.5 Time Line of a Typical Malware Attack -- 3.6 Hacker Economy: How Does a Hacker Make Money? -- 3.7 Social Engineering -- 3.7.1 Social Engineering Examples and Case Studies -- 3.7.2 Tactics of Social Engineering -- 3.8 A Lingering Question -- 3.9 Late-Breaking News -- CHAPTER 4 THEFT OF INFORMATION -- 4.1 Introduction -- 4.2 Case Studies -- 4.2.1 Data Theft -- 4.2.2 Source Code Theft -- 4.3 How Do the Victims Find Out That Their Secrets Are Stolen? -- 4.4 Intellectual Property Protection -- 4.4.1 Trade Secret Protection -- 4.4.2 Copyright Protection -- 4.4.3 Patent Protection -- 4.4.4 Steganography -- 4.5 Open Versus Closed Source -- CHAPTER 5 ESPIONAGE -- 5.1 Introduction -- 5.2 What Is Espionage? -- 5.3 Case Studies -- 5.3.1 Sweden Versus Russia -- 5.3.2 Shekhar Verma -- 5.3.3 Lineage III -- 5.3.4 GM versus VW: Jose Ignacio Lopez -- 5.3.5 British Midland Tools -- 5.3.6 Solid Oak Software -- 5.3.7 Proctor & Gamble versus Unilever -- 5.3.8 News Corp Versus Vivendi -- 5.3.9 Spying: Was A TI Chip Really Stolen by a French Spy? -- 5.3.10 Confi cker -- 5.4 Cyber Warfare -- Reference -- CHAPTER 6 DISGRUNTLED EMPLOYEES AND SABOTAGE -- 6.1 Introduction and Background -- 6.2 Disgruntled Employee Data Issues -- 6.2.1 Data Tampering -- 6.2.2 Data Destruction -- 6.2.3 Data Made Public -- 6.2.4 Theft Via Data -- 6.3 Disgruntled Employee Software Issues -- 6.3.1 Software Destruction -- 6.4 Disgruntled Employee System Issues -- 6.5 What to Do About Disgruntled Employee Acts -- 6.6 Sabotage -- References -- CHAPTER 7 WHISTLE-BLOWING -- 7.1 A Hypothetical Scenario -- 7.2 Whistle-Blowing and Software Engineering -- 7.3 More Case Studies and Anecdotes -- 7.3.1 Jeffrey Wigand and Brown and Williamson Tobacco -- 7.3.2 A Longitudinal Study of Whistle-Blowing -- 7.3.3 An Even More Pessimistic View -- 7.3.4 Academic Whistle-Blowing -- 7.3.5 The Sum Total of Whistle-Blowing -- References -- APPENDIX TO CHAPTER 7 PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note References -- PART 2: VIEWPOINTS ON DARK SIDE ISSUES -- Introduction -- CHAPTER 8 OPINIONS, PREDICTIONS, AND BELIEFS -- 8.1 Automated Crime (Donn B. Parker) -- Information Sources -- 8.2 Let's Play Make Believe (Karl E. Wiegers) -- Reference -- 8.3 Dark, Light, or Just Another Shade of Grey? (Les Hatton) -- 8.4 Rational Software Developers as Pathological Code Hackers (Norman Fenton) -- CHAPTER 9 PERSONAL ANECDOTES -- 9.1 An Offi cer and a Gentleman Confronts the Dark Side (Grady Booch) -- 9.2 Less Carrot and More Stick (June Verner) -- References -- 9.3 "Them and Us": Dispatches from the Virtual Software Team Trenches (Valentine Casey) -- 9.4 What is it to Lie on a Software Project? (Robert N. Britcher) -- 9.5 "Merciless Control Instrument" and the Mysterious Missing Fax (A. H. (anonymous)) -- 9.6 Forest of Arden (David Alan Grier) -- 9.7 Hard-Headed Hardware Hit Man (Will Tracz) -- 9.8 A Lighthearted Anecdote (Eugene Farmer) -- CONCLUSIONS -- INDEX.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. Betrayal! Corruption! Software Engineering?This is not a book about software project failure, or about prescriptive thinking about how to build software better. This is a book about the evil things that happen on computing and software projects-what the kinds of evil are, how they manifest themselves, and what the good guys can do about them.In this timely report on vice at every level of software project management, industry experts Johann Rost and Robert Glass explore the seamy underbelly of software engineering. Based on the authors' original research and augmented by frank insights from other well-respected figures, The Dark Side of Software Engineering consists of anecdotes about occurrences of the practices, an analysis of research findings in the context of the anecdotes, and some suggestions on what to do about the dark side. Discussions draw from the software and information technology literature and from the management literature specific to these topics.This is a book full of surprises-to be read by both software and computing practitioners and academics. It addresses seven "dark side matters" of software project work that involve dubious management and technologist practices, including:. Subversion. Espionage. Lying. Disgruntled employees and sabotage. Hacking. Whistleblowing. Theft of informationWritten in a quick-reading journalistic style, The Dark Side of Software Engineering goes where other management studies fear to tread-a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/22/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software engineering
General subdivision Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software industry
General subdivision Moral and ethical aspects.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- History
695 ## -
-- Hospitals
695 ## -
-- Humans
695 ## -
-- IEEE Computer Society
695 ## -
-- Information systems
695 ## -
-- Instruments
695 ## -
-- Internet
695 ## -
-- Magnetic heads
695 ## -
-- Maintenance engineering
695 ## -
-- Materials
695 ## -
-- Media
695 ## -
-- Mobile handsets
695 ## -
-- Modems
695 ## -
-- Monitoring
695 ## -
-- Monopoly
695 ## -
-- Natural languages
695 ## -
-- Negative feedback
695 ## -
-- Operating systems
695 ## -
-- Organizations
695 ## -
-- Outsourcing
695 ## -
-- Pathology
695 ## -
-- Project management
695 ## -
-- Psychology
695 ## -
-- Rabbits
695 ## -
-- Safety
695 ## -
-- Schedules
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Servers
695 ## -
-- Software
695 ## -
-- Software engineering
695 ## -
-- Standards
695 ## -
-- Stock markets
695 ## -
-- Switches
695 ## -
-- Time sharing computer systems
695 ## -
-- Unified modeling language
695 ## -
-- Vegetation
695 ## -
-- Virtual groups
695 ## -
-- Wiring
695 ## -
-- Books
695 ## -
-- Business
695 ## -
-- Calendars
695 ## -
-- Chapters
695 ## -
-- Companies
695 ## -
-- Computer aided software engineering
695 ## -
-- Computer crime
695 ## -
-- Computer hacking
695 ## -
-- Computers
695 ## -
-- Context
695 ## -
-- Contracts
695 ## -
-- Credit cards
695 ## -
-- Dictionaries
695 ## -
-- Distance measurement
695 ## -
-- Education
695 ## -
-- Educational institutions
695 ## -
-- Electronic mail
695 ## -
-- Electronic publishing
695 ## -
-- Encoding
695 ## -
-- Encyclopedias
695 ## -
-- Engineering profession
695 ## -
-- Ethics
695 ## -
-- Facsimile
695 ## -
-- Forensics
695 ## -
-- Fuels
695 ## -
-- Geophysics
695 ## -
-- Glass
695 ## -
-- Government
695 ## -
-- Grammar
695 ## -
-- Graphical user interfaces
695 ## -
-- Green products
695 ## -
-- Grippers
695 ## -
-- Hardware
695 ## -
-- Head
695 ## -
-- Helium
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Glass, Robert L.,
Dates associated with a name 1932-
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online Service),
Relator term distributor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element John Wiley & Sons,
Relator term publisher.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version
International Standard Book Number 9780470597170
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6381796

No items available.


International Institute of Information Technology, Bangalore
26/C, Electronics City, Hosur Road,Bengaluru-560100 Contact Us
Koha & OPAC at IIITB deployed by Bhargav Sridhar & Team.

Powered by Koha