Software Engineering

Page 1

New and Noteworthy Books on

Software Engineering

e Se

’re

ou

y at

wh

mi

g.

in

ss

rs W ffe NO ail o com UP E em ess. GN IV pr SI CLUS .crc X ww rE w fo at


Contents Software Engineering ..............................................3 Programming ........................................................23 Web-Based Software Engineering ........................29

Page 4

Page 24

Page 5

Page 26

Join the CRC Press online community! Sign up for email alerts at CRCPress.com and be the first to know about new books in your area of interest. You will also be eligible for: • • • • •

Page 29

Page 30

Exclusive discounts Content Event announcements New book alerts FREE shipping

only available in our email and print promotions. Take full advantage of your insider savings and free shipping when you buy directly from CRCPress.com http://www.crcpress.com

To view more information and complete tables of contents for these and many other related books, Visit us at

www.crcpress.com e-mail: orders@crcpress.com 1-800-634-7064 • 1-859-727-5000 +44 (0) 1235 400 524 EVN02


Software Engineering Software Essentials Design and Construction

Adaptive, Dynamic, and Resilient Systems Edited by

Adair Dingle

Niranjan Suri

Seattle University, Washington, USA

Florida Institute for Human & Machine Cognition, Pensacola, USA

Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

This book goes beyond syntax to explicitly define and illustrate high-level design concepts. It provides a solid understanding of control flow, ADTs (objects), memory, type relationships, and dynamic behavior, while promoting modern software design options independent of a particular programming language or tool. It compares and contrasts C# and C++ design solutions, explains how to evaluate the short- and long-term costs and benefits of various design choices, and offers extensive code examples, supportive appendices, and a glossary of over 200 common terms. • Offers a structured but hands-on approach to software design • Compares and contrasts design solutions, as illustrated in C# and C++ • Goes beyond syntax to explicitly define and illustrate high-level design concepts • Provides a solid understanding of control flow, ADTs (objects), memory, type relationships, and dynamic behavior • Explains how to evaluate the short- and longterm costs and benefits of various design choices • Includes extensive code examples, supportive appendices, and a glossary of over 200 common terms

Giacomo Cabri University of Modena and Reggio Emilia, Italy

Examining cutting-edge adaptive systems research, this book addresses the challenges of understanding, predicting, and controlling systems of networked computers, particularly important when considering the intersection of critical infrastructure, complex systems, and resilience. The authors unveil novel approaches to building adaptive, dynamic, and resilient systems—including agile, grid, and autonomic computing; multi-agent-based and biologically inspired approaches; and self-organizing systems. • Examines resilient adaptive systems from the perspectives of mobile systems, infrastructure systems, enterprise systems, and protecting critical infrastructure • Illustrates cutting-edge developments in adaptive systems that address the need for resilient and dynamic environments • Details various approaches for building adaptive, dynamic, and resilient systems—including agile, grid, and autonomic computing; multi-agentbased and biologically inspired approaches; and self-organizing systems

Selected Contents:

Section I: Software Construction. Software Complexity and Modeling. Software Development. Section II: Software Fundamentals. Functionality. Memory. Design and Documentation. Section III: Software Design. Structural Design. Behavioral Design. Design Alternatives and Perspectives. Section IV: Software Durability. Software Correctness. Software Longevity.

Introduction. Modeling Adaptive Software Systems. Service-Oriented Software Engineering Lifecycles. On Measuring Resilience in Command and Control Architectures. Resiliency and Robustness of Complex Systems and Networks. Resilient and Adaptive Networked Systems. Bringing Adaptiveness and Resilience to e-Health. Agile Computing. A PatternBased Architectural Style for Self-Organizing Software Systems. Adaptation and Resilience of SelfOrganizing Electronic Institutions. Assessing the Resilience of Self-Organizing Systems. Leveraging ICT to Enable e-Maintenance for Automated Machines. Using Planning to Adapt to Dynamic Environments. Policy-Based Governance of Complex Distributed Systems. Adaptive and Resilient Computational Resource Allocation Inspired by Economics. Instrumentation-Based Resource Control.

Catalog no. K11914, July 2014, 440 pp. ISBN: 978-1-4398-4120-4, $79.95 / £49.99 Also available as an eBook

Catalog no. K13118, June 2014, c. 378 pp. ISBN: 978-1-4398-6848-5, $99.95 / £63.99 Also available as an eBook

• Covers key topics such as inheritance, composition, polymorphism, overloading, and more

Selected Contents:

For more information and complete contents, visit www.crcpress.com

3


Software Engineering Secure Data Provenance and Inference Control with Semantic Web

Large Scale and Big Data

Bhavani Thuraisingham Tyrone Cadenhead Murat Kantarcioglu Vaibhav Khadilkar

Sherif Sakr

Processing and Management Edited by National ICT Australia, Alexandria

Mohamed Gaber University of Portsmouth, UK

University of Texas at Dallas, Richardson, USA

This book supplies step-by-step instruction on how to secure the provenance of data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, the methods presented in the book are applicable to a range of other domains. The book also illustrates the use of Semantic Web technologies and cloud computing technologies for enhancing the scalability of solutions. • Describes a detailed step-by-step approach to securing the provenance of data • Illustrates solutions with case studies from the health care domain that can be easily applied to a range of other domains • Details how to design and implement a policy engine for provenance of data • Covers Semantic Web technologies for the representation and reasoning of the provenance of the data • Considers cloud computing technologies that can enhance the scalability of the solutions presented • Focuses on concepts as well as practical techniques, and provides experimental results

Selected Contents: Introduction. Supporting Technologies. Secure Data Provenance. Inference Control. Architecture for an Inference Controller. Unifying Framework. Appendices: Data Management Systems, Developments, and Trends. Database Management and Security.

This book provides a central source of reference on the various data management techniques of largescale data processing and its technology application. It covers the latest research discoveries and applications. Coverage includes cloud data management architectures, Big Data analytics visualization, data management, analytics for vast amounts of unstructured data, clustering, classification, link analysis of big data, scalable data mining, and machine learning techniques.

Selected Contents: Distributed Programming for the Cloud. MapReduce Family of Large-Scale Data-Processing Systems. Extending MapReduce for Iterative Processing. Incremental MapReduce Computations. Large-Scale RDF Processing with MapReduce. Algebraic Optimization of RDF Graph Pattern Queries on MapReduce. Network Performance Aware Graph Partitioning for Large Graph Processing Systems in the Cloud. PEGASUS. An Overview of the NoSQL World. Consistency Management in Cloud Storage Systems. CloudDB AutoAdmin. Overview of LargeScale Stream Processing Engines. Advanced Algorithms for Efficient Approximate Duplicate Detection in Data Streams Using Bloom Filters. Large-Scale Network Traffic Analysis for Estimating the Size of IP Addresses and Detecting Traffic Anomalies. Recommending Environmental Big Data Using Semantically Guided Machine Learning. Virtualizing Resources for the Cloud. Toward Optimal Resource Provisioning for Economical and Green MapReduce. Computing in the Cloud. Performance Analysis for Large IaaS Clouds. Security in Big Data and Cloud Computing. Catalog no. K18876, June 2014, c. 636 pp. ISBN: 978-1-4665-8150-0, $119.95 / £76.99 Also available as an eBook

Catalog no. K16438, July 2014, 462 pp. ISBN: 978-1-4665-6943-0, $89.95 / £57.99 Also available as an eBook

4

Save when you order online at www.crcpress.com


Software Engineering Security for Service Oriented Architectures

Linked Data Management

Walter Williams

Andreas Harth

This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the design of distributed and resilient applications, it provides an overview of the various standards that service oriented and distributed applications leverage to provide the understanding required to make intelligent decisions regarding their design. The book reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.

Karlsruhe Institute of Technology, Germany

• Details recent standards that address web service security, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation • Reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows • Explains what web services and SOA implementation mean for identification, authentication, and authorization with respect to security aspects such as integrity, confidentiality, availability, utility, control, authenticity, and privacy • Examines emerging issues of privacy and discusses how to design applications within a secure context so that existing and emerging privacy regulations can be met

Edited by

Katja Hose Max Planck Institute of Informatics, Saarbrücken, Germany

Ralf Schenkel Saarland University, Saarbrücken, Germany

Linked Data Management presents techniques for querying and managing Linked Data that is available on today’s web. Despite the publication of many papers since Tim Berners-Lee developed the Linked Data principles in 2006, the field lacks a comprehensive, unified overview of the state of the art. Suitable for both researchers and practitioners, this book provides a thorough, consolidated account of the new data publishing and data integration paradigm. While the book covers query processing extensively, the Linked Data abstraction furnishes more than a mechanism for collecting, integrating, and querying data from the open web—the Linked Data technology stack also allows for controlled, sophisticated applications deployed in an enterprise environment. • Provides a comprehensive treatment on how to manage the vast amount of Linked Data attainable through the web • Covers relevant Semantic Web standards, such as RDF, SPARQL, and the Linked Data Platform • Describes numerous applications of centralized, parallel, and distributed query processing in databases, data streams, and the cloud • Explains how to derive additional knowledge from given data

• Discusses the use of the malicious user story in application and security design, specifically in the context of service oriented applications

• Illustrates the opportunities and challenges involved in using Linked Data for the integration applications

Selected Contents:

Selected Contents:

Introduction. Four Kinds of Architectures. Implementing and Securing SOA. Web 2.0. Other SOA Platforms. Auditing Service-Oriented Architectures. Defending and Detecting Attacks. Architecture. Bibliography. Index.

Introduction. Centralized Query Processing. Parallel Query Processing. Distributed Query Processing. Reasoning over RDF Data. Linked Data Interfaces. Bibliography.

Catalog no. K19019, April 2014, 341 pp., Soft Cover ISBN: 978-1-4665-8402-0, $69.95 / £44.99 Also available as an eBook

Catalog no. K18933, May 2014, 576 pp. ISBN: 978-1-4665-8240-8, $99.95 / £63.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

5


Software Engineering Computing Handbook

Introduction to Software Project Management

Third Edition Two-Volume Set

Adolfo Villafiorita

Edited by

Bruno Kessler Foundation

Allen Tucker

Providing the know-how to manage software projects effectively, this book supplies an accessible introduction to software project management. It begins with an overview of the fundamental techniques of project management and the technical aspects of software development. The second part of the book illustrates the technical activities of software development in a coherent process—describing how to customize this process to fit a wide range of software development scenarios. The book examines open source development practices and tools so readers can adopt best practices and get started with tools that are available for free.

Bowdoin College, Brunswick, Maine, USA

Teofilo Gonzalez University of California, Santa Barbara, USA

Heikki Topi Bentley University, Waltham, Massachusetts, USA

Jorge Diaz-Herrera Keuka College, Keuka Park, New York, USA

Renamed and expanded to two volumes, the Computing Handbook, Third Edition provides upto-date information on a wide range of topics in computer science, information systems (IS), information technology (IT), and software engineering. The third edition of this popular handbook addresses not only the dramatic growth of computing as a discipline but also the relatively new delineation of computing as a family of separate disciplines as described by the Association for Computing Machinery (ACM), the IEEE Computer Society (IEEE-CS), and the Association for Information Systems (AIS).

Selected Contents: Volume 1: Overview of Computer Science. Algorithms and Complexity. Architecture and Organization. Computational Science, Graphics, and Visual Computing. Intelligent Systems. Networking and Communication. Operating Systems. Programming Languages. The Discipline of Software Engineering. Software Quality and Measurement. Software Development Process, Paradigms, and Management. Software Modeling, Analysis, and Design. Software Construction. Index. Volume 2: Disciplinary Foundations and Global Impact. Technical Foundations of Data and Database Management. Data, Information, and Knowledge Management. Analysis, Design, and Development of Organizational Systems. Human–Computer Interaction and User Experience. Using Information Systems and Technology to Support Individual and Group Tasks. Managing and Securing the IT Infrastructure and Systems. Managing Organizational Information Systems and Technology Capabilities. Information Systems and the Domain of Business Intertwined. Index.

• Presents content dedicated to management frameworks—including ESA and NASA guidelines, PRINCE2®, and PMBOK®—allowing you to "standardize" their software development practices • Addresses open source development practices and tools, allowing you to adopt some best practices from the open source domain and get started with a set of tools that are available for free • Discusses the customization of the software process, enabling you to tailor the development process to different kinds of products and formalities

Selected Contents: Introduction. The Basics: Software Development Activities and Their Organization. Making IT Right: Managing Goals, Time, and Costs. Making IT Better: Managing Changes, Risks, and Quality. Making IT Perfect: Managing People and Organizing Communication. Software Project Pricing. Managing Software Development Projects. Development and Management Standards. Open Source Tools for Managing Projects. Catalog no. K15541, February 2014, 296 pp. ISBN: 978-1-4665-5953-0, $89.95 / £57.99 Also available as an eBook

Catalog no. K14305, May 2014, 3816 pp. ISBN: 978-1-4398-9844-4, $399.95 / £255.00

6

Save when you order online at www.crcpress.com


Software Engineering Core Software Security Security at the Source James Ransome Senior Director, Product Security, McAfee - An Intel Company, Santa Clara, California, USA

Anmol Misra Cisco Systems, Inc., San Jose, California, USA

“... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products …” —Dr. Dena Haritos Tsamitis. Carnegie Mellon University

“... a must read for security specialists, software developers and software engineers. ...should be part of every security professional’s library.” —Dr. Larry Ponemon, Ponemon Institute

“... the definitive how-to guide for software security professionals. ...A must-have for anyone on the front lines of the Cyber War ...” —Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates

“Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source!” —Eric S. Yuan, Zoom Video Communications

ComponentOriented Development and Assembly Paradigm, Principles, and Practice using Java Piram Manickam, S. Sangeetha, and S. V. Subrahmanya Infosys Technologies, LTD, Bangalore, India Series: Infosys Press

“The authors provide a carefully thought-out treatment of software components and component-oriented development. They do so in a manner that is, at the same time, rigorous and accessible to a spectrum of readers: from those who are generally knowledgeable in software engineering but do not have a background in component-oriented development, to those who have significant prior exposure but are looking to shore up their knowledge and develop expertise in the state of the art. ... a valuable addition to any software engineer’s bookshelf!” —Professor Nenad Medvidović, Computer Science Department, University of Southern California

• Provides comprehensive coverage of the principles, practice, and paradigm of component-oriented development and assembly • Supplies an understanding of the conceptual foundation for component-oriented software • Focuses on the various standard Java component models and describes how to develop a component-oriented system using these component models • Covers the various aspects of the componentoriented development paradigm

Selected Contents:

Selected Contents:

Introduction. The Secure Development Lifecycle. Security Assessment (A1): SDL Activities and Best Practices. Architecture (A2): SDL Activities and Best Practices. Design and Development (A3): SDL Activities and Best Practices. Design and Development (A4): SDL Activities and Best Practices. Ship (A5): SDL Activities and Best Practices. PostRelease Support (PRSA1–5). Applying the SDL Framework to the Real World. Pulling It All Together: Using the SDL to Prevent Real-World Threats.

Component Paradigm. Software Paradigms. Component Oriented Software Paradigm. Component Principles. Theory of Software Components. Software Component Models and Frameworks. Principles of Component Based Software Engineering. Component Practices. Component Oriented Development and Assembly using OSGi. Component Oriented Development and Assembly using SCA. Architecting Component Based Systems. Component Design Principles & Patterns. Developing Components. Assembling Components. Testing Components and Component-Based Systems. Appendices.

Catalog no. K15922, December 2013, 416 pp. ISBN: 978-1-4665-6095-6, $79.95 / £49.99 Also available as an eBook

Catalog no. K18864, December 2013, 298 pp. ISBN: 978-1-4665-8099-2, $69.95 / £44.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

7


Software Engineering Developing and Securing the Cloud Bhavani Thuraisingham The University of Texas at Dallas, USA

Presenting a framework for secure cloud computing development, this book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it’s best to build their own clouds or contract them out. • Examines the importance of good communication • Defines the four types of poor-quality communication • Covers how to create a climate of communication • Explains how to establish a climate of communication that encourages the development of quality relationships

Selected Contents: Introduction. Supporting Technologies. Secure Services Technologies. Cloud Computing Concepts. Experimental Cloud Computing Systems. Secure Cloud Computing Concepts. Experimental Secure Cloud Computing Systems. Experimental Cloud Systems for Security Applications. Toward a Trustworthy Cloud. Building an Infrastructure, an Education Initiative, and a Research Program for a Secure Cloud. Catalog no. K12920, October 2013, 730 pp. ISBN: 978-1-4398-6291-9, $79.95 / £49.99 Also available as an eBook

8

Software Testing A Craftsman’s Approach, Fourth Edition Paul C. Jorgensen Grand Valley State University, Allendale, Michigan, USA

The fourth edition of the widely adopted text and reference book is completely revised and updated and features a new section on Life Cycle-Based Testing. New chapters cover Software Complexity and Mutation Testing and Error Seeding. The text continues to provide a solid mathematical background in discrete mathematics and linear graph theory that is fundamental to understating software testing. The book describes specification-based (functional) and codebased (structural) test development techniques, while extending this theoretical approach to less understood levels of integration and system testing. • Includes downloadable programs that demonstrate white-box, black-box, and other fundamental testing types • Introduces model-based development and provides an explanation of how to conduct testing within model-based development environments • Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing

Selected Contents: A Mathematical Context: A Perspective on Testing. Examples. Discrete Math for Testers. Graph Theory for Testers. Unit Testing: Boundary Value Testing. Equivalence Class Testing. Decision Table–Based Testing. Path Testing. Data Flow Testing. Retrospective on Unit Testing. Beyond Unit Testing: Life Cycle–Based Testing. Model-Based Testing. Integration Testing. System Testing. Object-Oriented Testing. Software Complexity. Model-Based Testing for Systems of Systems. Exploratory Testing. TestDriven Development. A Closer Look at All Pairs Testing. Evaluating Test Cases. Software Technical Reviews. Epilogue: Software Testing Excellence. Appendix: Complete Technical Inspection Packet. Catalog no. K15906, October 2013, 494 pp. ISBN: 978-1-4665-6068-0, $99.95 / £63.99 Also available as an eBook

Save when you order online at www.crcpress.com


Software Engineering Requirements Engineering for Software and Systems Second Edition

Software Test Attacks to Break Mobile and Embedded Devices

Phillip A. Laplante

Jon Duncan Hagar

The Pennsylvania State University, Malvern, USA

Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

Series: Applied Software Engineering Series

Praise for the Bestselling First Edition: “… this text provides a review of the theoretical and practical aspects of discovering, analyzing, modeling, validating, testing, and writing requirements for systems of all kinds, particularly software-intensive systems.” —Book News Inc.

This second edition presents updates all chapters with the latest applied research and industry practices. It illustrates key ideas associated with requirements engineering using case studies and example systems, including an airline baggage handling system, a point of sale system for a large pet store chain, a control system for a smart home, and a wet well pumping system. • Assesses practical and theoretical aspects of discovering, analyzing, modeling, validating, testing, and writing requirements for various systems • Offers formal methods, social models, and representation tools useful in the classroom and in the field • Illustrates all theory with real-world examples • Considers four example systems that demonstrate how to engineer requirements and how to practice requirements engineering

Selected Contents: Introduction to Requirements Engineering. Preparing for Requirements Elicitation. Requirements Elicitation. Writing the Requirements Document. Requirements Risk Management. Formal Methods. Requirements Specification and Agile Methodologies. Tool Support for Requirements Engineering. Requirements Management. Value Engineering of Requirements. Appendices: Software Requirements Specification for a Smart Home. Software Requirements for a Wastewater Pumping Station Wet Well Control System.

“Jon’s extensive experience (much of it in the embedded world), his thorough research, and his deep knowledge give this book a solid foundation and provide helpful guidance and steps to take in applying testing attacks to mobile and embedded devices.” —From the Foreword by Dorothy Graham, Software Testing Consultant

“Every tester who wants to keep current needs to read this book, and you can read with confidence knowing you are being guided by the best in this business. … Learn by doing, with this book as your guide.” —From the Foreword by Lisa Crispin, Agile Testing Coach and Practitioner

• Provides over 30 specific software test attacks needed to find bugs/errors in mobile and smart devices • Addresses white and black box test approaches as well as risk-based testing, model-driven tests, agile testing, and mathematical approaches • Presents checklists for user interface and game evaluations

Selected Contents: Setting the Mobile and Embedded Framework. Developer Attacks: Taking the Code Head On. Control System Attacks. Hardware Software Attacks. Mobile and Embedded Software Attacks. Time Attacks: "It’s about Time." Human User Interface Attacks: "The Limited (and Unlimited) User Interface." Smart and/or Mobile Phone Attacks. Mobile/Embedded Security. Generic Attacks. Mobile and Embedded System Labs. Some Parting Advice. Appendices. References. Glossary. Index. Catalog no. K16700, September 2013, 377 pp. Soft Cover ISBN: 978-1-4665-7530-1, $59.95 / £38.99 Also available as an eBook

Catalog no. K15914, October 2013, 324 pp. ISBN: 978-1-4665-6081-9, $99.95 / £63.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

9


Software Engineering Software Designers in Action

Cloud Database Development and Management

A Human-Centric Look at Design Work

Lee Chao University of Houston-Victoria, Sugar Land, Texas, USA

Edited by

Marian Petre The Open University, Milton Keynes, UK

Andre Van Der Hoek University of California, Irvine, USA Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

“… an important book for anyone wishing to research or improve the process of collaboratively designing software or other artifacts. It makes it clear how complex the process can be, even for fairly well-posed design problems. … it provides detailed case studies that can be used as test cases. And it brings together references on a wide variety of the major studies of software design and design in general.” —Barry Boehm, TRW Professor of Software Engineering and Director Emeritus, Center for Software Engineering, University of Southern California

“This book brilliantly attends to the landscape of how we may best design such systems.” —Grady Booch, Fellow, IBM Research

• Presents an in-depth, human-focused perspective on software design • Explores what software designers actually do (rather than what they should do) through video analyses of them working on a design problem • Highlights positive and negative patterns and practices • Identifies a research agenda for the future to support existing designers in their work and train newcomers to become effective designers • Includes contributions from expert practitioners in human–computer interaction, psychology, software design, and product design

Selected Contents:

Detailing how to design, implement, and manage database systems in the cloud, the book provides you with tools that can make your cloud database development much more efficient and flexible. Its’ easy-tofollow instructions will help you develop the hands-on skills needed to store and manage critical business information and to make that data available anytime through the Internet. • Focuses on the cloud environment for database system development using Microsoft technologies including hands-on activities for readers to develop their own cloud-based database systems • Deals with all three aspects of database design: conceptual design, logical design, and physical design • Introduces the SQL language and demonstrates how to use SQL to create database objects • Discusses the management tasks that keep both SQL Azure and Windows Azure running smoothly

Selected Contents: Introduction to Database Systems and Cloud Computing. Database Design and Windows Azure Data Storage. Table Normalization and Windows Azure SQL Database. Database Development and Management with SQL. Importing and Exporting Database Objects. Querying Information in Windows Azure SQL Database. Windows Azure SQL Database Procedures and Functions. Windows Azure SQL Database Views, Indexes, and Federations. Database Application Development. Windows Azure and Deployment of Applications to Cloud. Windows Azure Storage. Windows Azure Management. Catalog no. K16078, July 2013, 487 pp. ISBN: 978-1-4665-6505-0, $79.95 / £49.99 Also available as an eBook

Design in Theory. The Process of Design. Elements of Design. Human Interaction in Design. Appendices. Index. Catalog no. K14386, September 2013, 452 pp. ISBN: 978-1-4665-0109-6, $69.95 / £44.99 Also available as an eBook

10

Save when you order online at www.crcpress.com


Software Engineering Introduction to Combinatorial Testing

Android Security

D. Richard Kuhn and Raghu N. Kacker

Anmol Misra

National Institute of Standards and Technology, Gaithersburg, Maryland, USA

Yu Lei University of Texas at Arlington, USA Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

“I was prepared at the outset to dislike this book. I expected a different subject. It was written by researchers who may or may not have been able to relate to practitioners. It was about a subject that seemed virtually impossible to make practical. But in the end, it turned out to be on a quite different subject, and the authors overcame all my concerns. I thoroughly recommend it to anyone involved in the practice of software testing.” —Computing Reviews, March 2014

• Provides the first in-depth book on practical combinatorial testing • Focuses on real-world software testing, including cost considerations • Presents step-by-step procedures for applying advanced combinatorial test methods • Requires no detailed knowledge of the underlying mathematics • Includes review questions and exercises in most chapters

Attacks and Defenses Cisco Systems, Inc., San Jose, California, USA

Abhishek Dubey Webroot Software, San Mateo, California, USA

“... a must-have for security architects and consultants as well as enterprise security managers who are working with mobile devices and applications.” —Dr. Dena Haritos Tsamitis, Director of the Information Networking Institute; and Director of Education, CyLab, Carnegie Mellon University

“... Dubey and Misra have filled a critical gap in software security literature by providing a unique and holistic approach to addressing this critical and often misunderstood topic. They have captured the essential threats and countermeasures that are necessary to understand and effectively implement secure Android-driven mobile environments.” —James Ransome, Senior Director of Product Security, McAfee, An Intel Company

• Covers all aspects of Android Platform security from Android App Security and Android Forensics to Android malware, Penetration Testing, and Reverse Engineering • Includes proof-of-concept code for readers to analyze, debug, and modify • Details security best practices on how to use Android within a corporate infrastructure

• Contains an extensive set of references that offer more detail on each topic

• Demonstrates how to write secure applications and prevent them from malicious use and reverse engineering by hackers

• Offers data and additional training materials on a supplementary website

Selected Contents:

Selected Contents: Combinatorial Methods in Testing. Combinatorial Testing Applied. Configuration Testing. Input Testing. Test Parameter Analysis. Managing System State. Measuring Combinatorial Coverage. Test Suite Prioritization by Combinatorial Coverage. Combinatorial Testing and Random Test Generation. Sequence-Covering Arrays. Assertion-Based Testing. Model-Based Testing. Fault Localization. Evolution from Design of Experiments. Algorithms for Covering Array Construction. Appendices. References. Index.

Introduction. Android Architecture. Android Application Architecture. Android (in)Security. Pen Testing Android. Reverse Engineering Android Applications. Modifying the Behavior of Android Applications without Source Code. Hacking Android. Securing Android for the Enterprise Environment. Browser Security and Future Threat Landscape. Catalog no. K14268, April 2013, 280 pp. ISBN: 978-1-4398-9646-4, $59.95 / £38.99 Also available as an eBook

Catalog no. K15208, June 2013, 341 pp. ISBN: 978-1-4665-5229-6, $69.95 / £44.99

For more information and complete contents, visit www.crcpress.com

11


Software Engineering Return On Process (ROP) Getting Real Performance Results from Process Improvement Michael West Natural SPI Inc., Salt Lake City, Utah, USA

“This book tells you not just how to improve, but more importantly where to improve. This is the key to maximizing your return on your process. Every process professional must read this book.” —Stephen Shapiro, Author, Best Practices Are Stupid

“I thoroughly recommend reading the book from cover to cover, but once you have, you'll want to keep it close by because you will find yourself referring to it again and again. Nobody contemplating a process improvement program should proceed without first reading this book; but if you're already well on the way, I can only say 'watch out!', you might not like finding out what you've already missed!” —Rob Wyatt, IT Director, Product and Supply Chain, Dell

Details a comprehensive and coherent end-to-end process for integrating organizational performance objectives and measures to process improvement activities • Provides "how to" information based on three role categories: executive, manager, and practitioner • Includes many examples and case studies that illustrate the major concepts • Describes non-traditional and innovative ways to achieve process and performance improvement • Includes action plan guides at the end of each chapter

Selected Contents: Introduction. Real Performance. Real Process Improvement. Building a Performance Culture. What Could Be. Catalog no. K14019, March 2013, 390 pp. ISBN: 978-1-4398-8639-7, $69.95 / £44.99 Also available as an eBook

12

Enterprise Dynamics Sourcebook Edited by

Kenneth C. Hoffman The MITRE Corporation, McLean, Virginia, USA

Christopher G. Glazner William J. Bunting Leonard A. Wojcik Anne Cady This sourcebook is the product of MITRE-sponsored research on enterprise dynamics and the range of applications pertaining to enterprise transformation programs. Filled with examples, it provides the understanding of the qualitative and quantitative data-analytic methods required to reduce risk and failure rates and enable an organization to operate effectively in today’s complex and ever-changing environment.

Selected Contents: FOUNDATIONS AND CONCEPTUAL FRAMEWORKS. Defining Enterprise and Transformation Challenges. From Systems Engineering to Enterprise Systems Engineering. Foundations of Enterprise Systems Engineering and Architecting. Enterprise Dynamics Methods and Models. Managing Enterprise Transformation Using ESE/A. ENTERPRISE MODELING APPROACHES AND APPLICATIONS. Simulation of Enterprise Architecture for a Business Strategy. Reasoning on Technology Uncertainties for Enterprise Transformation. Optimal Control and Differential Game Modeling of a Systems Engineering Process for Transformation. Hybrid Systems Dynamic, Petri Net, and Agent-Based Modeling of the Air and Space Operations Center. Nuclear Waste Management Strategic Framework for a Large-Scale Government Program. International Trade and Commerce: Enterprise Systems Engineering and Architecture in a Multiagency Environment. Energy and Materials Systems as an Enterprise Systems Engineering Application: Planning and Analysis for the Economy’s Infrastructure. Modeling the Nation’s Healthcare System as a Dynamic Enterprise. Epilogue: Enterprise Systems Engineering and Architecting—Lessons Learned and the Road Ahead. Acronyms. Bibliography. Catalog no. AU8256, February 2013, 379 pp. ISBN: 978-1-4200-8256-2, $89.95 / £57.99 Also available as an eBook

Save when you order online at www.crcpress.com


Software Engineering The Art of Agile Practice A Composite Approach for Projects and Organizations Bhuvan Unhelkar Consultant, New South Wales, Australia Series: Advanced & Emerging Communications Technologies

“… the book gives a balanced view of Agile in the practical world. … I am sure you will enjoy reading this book and find it relevant to your work.” —Steve Blais, PMP, Solutions Architect, Sarasota, Florida

Addressing the growing popularity of Agile software development, this book begins by identifying the challenges currently facing organizations in terms of their development and maintenance approaches. It presents a comprehensive Composite Agile Method and Strategy (CAMS) as a carefully constructed combination of process elements. The book creates and applies relevant metrics and measurements to the entire CAMS lifecycle—opening up the possibility of improving estimations by project managers. • Presents a consistent, integrated, and strategic approach to achieving Agility in your business • Explains how to embed Agile practices within formal process-maps in projects • Includes figures, case studies, and tables that illustrate key concepts

Selected Contents: Art of Agile practice. Agile methods overview and challenge. Practical Agile as a method. Practical Agile and development. Business management in practical Agile. Business analysis in practical Agile. Project management and practical Agile. IT infrastructure standards and Agile. Agile testing. Agile metrics. Case Study - Package Implementation Financial. Case Study - Outsourced Project. Catalog no. K12339, November 2012, 527 pp. ISBN: 978-1-4398-5118-0, $83.95 / £51.99 Also available as an eBook

The Internet of Things in the Cloud A Middleware Perspective Honbo Zhou “This book brings together timely, mind-provoking, and comprehensive materials to give you a better understanding of the IoT/M2M technological and business landscape on top of cloud computing …” —George (Aiping) Guo, Ph.D., CEO of TCL Communication Technology Holdings Ltd.

This book provides a panoramic view of the IoT landscape, focusing on the overall technological architecture and design of a tentatively unified IoT system underpinned by different cloud computing paradigms from a middleware perspective. The first part of the book describes IoT, related concepts, and a number of key vertical IoT applications. The second part focuses on middleware. The third part covers cloud computing and IoT as well as their synergy based on the common background of distributed processing. • Describes and categorizes the many facets of the Internet of Things • Proposes a number of paradigms and classifications about Internet of Things' mass and niche markets and technologies • Reflects the author’s extensive search of relevant materials worldwide

Selected Contents: THE INTERNET OF THINGS. The Third ICT Wave. Ubiquitous IoT Applications. Four Pillars of IoT. The DNA of IoT. MIDDLEWARE FOR IoT. Middleware and IoT. Protocol Standards for IoT. Architecture Standardization for WoT. THE CLOUD OF THINGS. Cloud Computing. The Cloud of Things. Catalog no. K14173, October 2012, 391 pp. ISBN: 978-1-4398-9299-2, $104.95 / £62.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

13


Software Engineering Cloud Enterprise Architecture Pethuru Raj

Software Application Development

Enterprise Architecture Consultant, Wipro Consulting Services, Bangalore, India

A Visual C++, MFC, and STL Tutorial

“… a welcome addition to the body of existing knowledge in these fields and emerging new technologies.” —Zaigham Mahmood, School of Computing and Mathematics, University of Derby, UK

This book examines enterprise architecture (EA) in the context of the surging popularity of cloud computing. It explains the transformation of EA resulting from the strategically significant convergence that cloud computing can achieve. Chapters cover each of the contributing architectures of EA, illustrating the current and impending implications of the cloud on each of them. The author ties together these topics with chapters on cloud integration and composition architecture. He also examines the Enterprise Cloud, federated Clouds, and the vision to establish the InterCloud. • Outlines a comprehensive strategy for enterprise architects and business executives to ponder and plan cloud-inspired transformations • Considers how cloud changes and affects enterprise architecture design, governance, strategy, management, and sustenance • Covers cloud integration and composition architecture • Examines the different architectural building blocks—business, information, application, integration, security, and technology—in the context of EA and the cloud

Selected Contents: Cloud-Enabled Smart Enterprises! Cloud-Inspired Enterprise Transformations! Cloud-Instigated IT Transformations! Cloud EA: Frameworks and Platforms. Cloud Application Architecture. Cloud Data Architecture. Cloud Technology Architecture. Cloud Integration Architecture. Cloud Management Architecture. Cloud Security Architecture (CSA). Cloud Governance Architecture. Cloud Onboarding Best Practices. Catalog no. K14431, October 2012, 528 pp. ISBN: 978-1-4665-0232-1, $83.95 / £51.99 Also available as an eBook

14

Bud Fox, Ph.D., Zhang Wenzu, Ph.D., and Tan May Ling, M.Sc. Institute of High Performance Computing, Singapore Series: Chapman & Hall/CRC Computer and Information Science Series

This book provides a detailed account of the software development process using Visual C++, MFC, and STL. It covers everything from the design to the implementation of all software modules, resulting in a demonstration application prototype which may be used to efficiently represent mathematical equations, perform interactive and intuitive model-building, and conduct control engineering experiments. All computer code is included, so developers can extend and reuse the software modules for their own project work. The book’s tutorial-like approach empowers students and practitioners with the knowledge and skills required to perform quality, real-world software engineering. • Presents a comprehensive tutorial on the design and implementation of a block diagram-based software application that may be used for engineering modeling and simulation • Teaches how to build a demonstration software application, and all of the chapters in the book build upon each other to result in a large, real-world project • Ties many facets of C, C++, and Visual C++, together to work as a whole • Provides the tools and knowledge needed for developers to implement and extend the application in the book for their own purposes • Includes open source computer code, available on the author's website

Selected Contents: User Interaction. Model Computation and Data. Refinement. Appendices. Catalog no. K14813, August 2012, 1216 pp. Soft Cover ISBN: 978-1-4665-1100-2, $83.95 / £51.99

Save when you order online at www.crcpress.com


Software Engineering Drupal Web Profiles Timi Ogunjobi

Software Engineering Design

Web Sesame, Ibadan, Nigeria

Theory and Practice

This book demystifies Drupal, one of the most popular content management systems in use today. With step-by-step instruction and worked examples, this is a crucial guide to the next level in content management. This project-based guide offers a complete introduction to installation, configuration, and administration; web analytics; optimization through automatic throttling, bandwidth optimization, and page caching; as well as customization to facilitate the creation, installation, and debugging of modules.

Carlos Otero

• Offers a complete introduction to the installation, configuration, and administration of a Drupal core application • Provides in-depth treatment of web analytics including Google analytics, parsing web logs, and node tagging • Discusses the optimization of Drupal performance with automatic throttling, bandwidth optimization, and page caching • Includes worked examples to aid users in achieving maximum productivity within a short time • Explains how to customize Drupal themes and create, install, and debug modules

Selected Contents: Introduction to Drupal. Adding, Classifying and Viewing Content. Administering Drupal. Creating Drupal Themes. Creating Drupal Modules. Building a Community Site with Drupal Commons. Building a Conference Site with COD. Creating a News Publishing Site with OpenPublish. Creating an Intranet with Open Atrium. Creating a Learning Management System with ELMS. Monitoring, Optimizing, and Analyzing a Drupal Site. Catalog no. K14493, July 2012, 259 pp. ISBN: 978-1-4665-0381-6, $62.95 / £40.99 Also available as an eBook

Series: Applied Software Engineering Series

This text uses examples, review questions, lab exercises, and case study assignments to explain the concepts that are immediately relevant to software designers. Providing students and practitioners with the understanding needed to design complex software systems, it starts with a review of software design fundamentals. It presents a formal top-down design process that consists of several design activities with varied levels of detail. For each topic discussed, it includes a step-by-step breakdown of the execution of the design solution, along with an evaluation, discussion, and justification for using that solution. • Covers applied architectural, creational, structural, and behavioral design patterns • Presents a collection of standards and guidelines for structuring high-quality code • Includes a section on engineering leadership for software designers • Contains real-world examples and exercises

Selected Contents: Introduction to Software Engineering Design. Software Design with Unified Modeling Language. Principles of Software Architecture. Patterns and Styles in Software Architecture. Principles of Detailed Design. Creational Design Patterns in Detailed Design. Structural and Behavioral Patterns in Detailed Design. Principles of Construction Design. Human–Computer Interface Design. Software Design Management, Leadership, and Ethics. Catalog no. K12371, June 2012, 368 pp. ISBN: 978-1-4398-5168-5, $99.95 / £60.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

15


Software Engineering Effective Methods for Software and Systems Integration

The 7 Qualities of Highly Secure Software Mano Paul SecuRisk Solutions, Pflugerville, Texas, USA

Boyd L. Summers The Boeing Company, Seattle, Washington, USA

This book supplies the understanding needed to achieve continuous improvements in quality throughout the software life cycle. It defines time-tested methods for systems engineering, software design, software engineering informal/formal builds, software engineering installations, software and systems integration, delivery activities, and product evaluations. The text includes helpful forms—such as an audit checklist, a software/systems integration plan, and a software checklist PCA. Providing you with the understanding to achieve continuous improvements in quality throughout the software life cycle, it will help you deliver projects that are on time and within budget constraints in developmental military and aerospace programs as well as the software industry. • Discusses all development lifecycle disciplines • Presents methods for planning, coordination, software loading, and testing • Addresses scheduling issues and stresses how to plan to coordinate with customers • Defines methods for systems engineering, software design, software engineering informal/formal builds, software engineering installations, software and systems integration, delivery activities, and product evaluations • Explains how to apply a life cycle that promotes effective software and systems integration

Selected Contents: Introduction. Program and Project Planning. Systems Design. Software Requirements. Software Design. Software Implementation. Software Integration. Software and Systems Integration. Software Subcontractor. Software and System Delivery. Product Evaluation. Appendices. Catalog no. K13560, June 2012, 183 pp. ISBN: 978-1-4398-7662-6, $104.95 / £66.99 Also available as an eBook

16

“… required reading for my executives, security team, software architects and lead developers.” —David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service

“Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.” —Troy Leach, CTO, PCI Security Standards Council

“This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.” —Michael Howard, Principal Cyber Security Program Manager, Microsoft

“As a penetration tester, my job will be a lot harder as people read this book!“ —Kevin Johnson, Security Consultant, Secure Ideas

• Presents the practical application of security concepts in building software assurance or hack-resilient software • Highlights parallels between habits and qualities in terms of software security • Includes seven specific qualities required for highly secure software

Selected Contents: Quality 1 - Security is Built In V s. Bolted On (Be Proactive). Quality 2 - Maps to a Plan (Begin with the End in Mind). Quality 3 - Includes Fundamental Necessities (Put First Things First). Quality 4- Is Balanced! (Think Win/Win). Quality 5 - Addresses Requirements (Seek First to Understand, Then to be Understood). Quality 6 - Collaborative Developed (Synergize). Quality 7 - Continuously Improves (Sharpen the Saw). Catalog no. K10743, May 2012, 160 pp. ISBN: 978-1-4398-1446-8, $52.95 / £33.99 Also available as an eBook

Save when you order online at www.crcpress.com


Software Engineering Media Networks Architectures, Applications, and Standards

Handbook of Mobile Systems Applications and Services

Edited by

Edited by

Hassnaa Moustafa

Anup Kumar

France Telecom Research and Development

Sherali Zeadally University of the District of Columbia, Washington, USA

A rapidly growing number of services and applications along with a dramatic shift in users’ consumption models have made media networks an area of increasing importance. Do you know all that you need to know? With a focus on video and audio-visual services, this book considers different media network architectures along with related protocols and standards. It presents different digital TV technologies along with their deployment architectures, discussing promising media content delivery architectures, including Future Internet, Content Delivery Networks, and Content Centric Networks. The author addresses related technical challenges and standardization efforts. Chapters cover the management of media information and immersive technologies that account for advanced services personalization, immersive technologies architectures and applications, e-health, and e-learning. • Provides comprehensive coverage of media networks • Covers a range of architectures, protocols, standards, and advanced audio-visual and multimedia services • Explores future directions • Facilitates a clear understanding of the media networks domain The book investigates the different network architectures along with their related protocols and standards. It examines the different digital TV technologies as well as their deployment architectures. Illustrating the role of network operators, service providers, content providers, and manufacturers, this timely reference is divided into three parts: Digital TV Media Content Delivery and Quality of Experience User- Centricity and Immersive Technologies Index Catalog no. K13577, May 2012, 555 pp. ISBN: 978-1-4398-7728-9, $93.95 / £59.99 Also available as an eBook

University of Louisville, Kentucky, USA

Bin Xie University of Cincinnati, Ohio, USA Series: Mobile Services and Systems

An investigation of the evolution of mobile services technologies, this book provides a complete understanding of these technologies, from fundamentals and theories to implementation protocols and applications. It contains chapters written by internationally recognized researchers who discuss concepts, theory, algorithms, implementations, and new applications. The book provides a comprehensive reference for students, instructors, researchers, engineers, and other professionals, building their understanding of mobile service computing.

Selected Contents: BUILDING BLOCKS FOR MOBILE SERVICES ARCHITECTURE. Service-Oriented Architecture for Mobile Services. Service Discovery for Mobile Computing: Classifications, Considerations, and Challenges. Interactive Context-Aware Services for Mobile Devices. Mobile Data Services with Location Awareness and Event Detection in Hybrid Wireless Sensor Networks. Service Collaboration Protocols in Mobile Systems. Mobile Agents for Mobile Services. MIDDLEWARE FOR MOBILE SERVICES. Middleware for Mobile and Pervasive Services. Context-Aware Middleware for Supporting Mobile Applications and Services. Interoperability across Technologies for Mobile Services. Mobility and Middleware: Enabling Ubiquitous Quality of Service for Mobile Services. Middleware Systems Architecture for Distributed Web Service Workflow Coordination. Development and Implementation of Mobile Services in Mobile Platforms. Security and Applications of Mobile Services Security, Privacy, and Authorization for Mobile Services. GEO-PRIVACY: Enforcing Privacy Policies Considering User Location. Mobile Access to Printed Texts for People Who are Blind or Visually Impaired. Catalog no. K10094, April 2012, 612 pp. ISBN: 978-1-4398-0152-9, $125.95 / £81.00 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

17


Software Engineering The IFPUG Guide to IT and Software Measurement Edited by

Fundamentals of Dependable Computing for Software Engineers

IFPUG

John Knight

“Although the themes running through the chapters in this book are measurement and metrics, the application of these themes is to the practical issues faced by project managers, CIOs, sales people, testers, QA personnel, outsourcers, bid evaluators, and IT managers. This volume should be a close-at-hand reference for all these people.”

University of Virginia, Charlottesville, USA

—Peter R. Hill, CEO of the International Software Benchmarking Standards Group Limited

Edited by IFPUG's Management and Reporting Committee, the text is useful for IT project managers, process improvement specialists, measurement professionals, and business professionals who need to interact with IT professionals and participate in IT decision-making. It includes coverage of cloud computing, agile development, quantitative project management, process improvement, measurement as a tool in accountability, project ROI measurement, metrics for the CIO, value stream mapping, and benchmarking. • Illustrates software measurement's role in new technologies, including cloud computing

Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

“… is an important addition to one’s bookshelf. … it is insightful, close to faultless, and a wonderful reference. Read it from front to back and cite it in your proposals and professional and scholarly papers. …” —Larry Bernstein, Computing Reviews, June 2012

This book helps software and computer engineers construct software systems that are dependable and within budget and time constraints. Covering the conceptual and definitional structure of the subject, the author describes the computing platforms upon which critical applications operate and how these platforms affect software. He discusses the difficulties in software engineering that lead to software failures and presents rigorous techniques that can greatly improve the quality of software and are becoming available for even large software systems.

• Addresses the impact of agile development on software measurement

• Describes the computing platforms upon which critical applications operate and how these platforms affect software

• Presents measurement as a powerful tool for auditing and accountability

• Discusses the difficulties in software engineering that lead to software failures

• Covers project ROI and value stream mapping • Includes metrics for the CIO

• Presents rigorous techniques that can greatly improve the quality of software and are becoming available for even large software systems

Selected Contents:

Selected Contents:

Insights from the Experts. Benchmarking. Estimation. Function Points. Measurement Programs. Metrics for the CIO—Business Value. New Technologies and Environments. Non-Functional and Agile. Outsourcing. Process Improvement. Productivity. Project Management.

Introduction. Dependability Requirements. Errors, Faults, and Hazards. Dependability Analysis. Dealing with Faults. Degradation Faults and Software. Software Dependability. Software Fault Avoidance in Specification. Software Fault Avoidance in Implementation. Software Fault Elimination. Software Fault Tolerance. Dependability Assessment. Bibliography.

Catalog no. K13177, April 2012, 848 pp. ISBN: 978-1-4398-6930-7, $83.95 / £51.99 Also available as an eBook

18

Catalog no. K12901, January 2012, 433 pp. Soft Cover ISBN: 978-1-4398-6255-1, $52.95 / £33.99

Save when you order online at www.crcpress.com


Software Engineering Process-Driven SOA Patterns for Aligning Business and IT

Antipatterns Managing Software Organizations and People, Second Edition

Carsten Hentrich Uwe Zdun

Colin J. Neill

Series: Infosys Press

Philip A. Laplante

“… provides the architectural basis in the form of proven patterns that have passed the test of time and are rightly positioned to form the stable core of futureready enterprise architecture.”

The Pennsylvania State University, Malvern, USA

—Subu Goparaju, Senior Vice President and Head of Infosys Labs

This book provides guidance on how to design and build software architectures that follow principles of business-IT alignment. The authors illustrate the design process step-by-step, using proven patterns that address complex business/technical scenarios, where integrated concepts of SOA, Business Process Management, and event-driven architectures are required. Providing a hands-on guide to process-driven SOA, the text describes how to manage the complexity of business-aligned IT architecture with examples and industry cases. • Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0

The Pennsylvania State University, Malvern, USA

Joanna F. DeFranco The Pennsylvania State University, Malvern, USA Series: Applied Software Engineering Series

Emphasizing leadership principles and practices, this second edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly found in IT, software development, and other business domains. For each antipattern, it describes the situation and symptoms, gives examples, and offers a refactoring solution. Catalog no. K12863, December 2011, 327 pp. ISBN: 978-1-4398-6186-8, $83.95 / £51.99 Also available as an eBook

• Shows how the complexity of business-aligned IT architecture can be managed

Software Project Management

• Demonstrates how to synchronize parallel processes

A Process-Driven Approach

Selected Contents:

Ashfaque Ahmed

Service-Oriented Architecture: A Business Perspective. Service-Oriented Architecture: A Technical Perspective. Pattern Language Walk-Through: An Example from the Insurance Business. Decomposing and Executing Business-Driven and Technical Processes. Integration and Adaptation in ProcessDriven SOAs. Aligning Business Goals and Service Design. Business Object Integration: How to Deal with the Data? Process Design: Mapping Domain Views to Technical Views. Integrating Events into Process-Driven SOAs. Invoking Services from Processes. Synchronization of Processes Running in Parallel. Appendix: Related and Referenced Patterns. Catalog no. K14093, December 2011, 347 pp. ISBN: 978-1-4398-8929-9, $75.95 / £48.99 Also available as an eBook

SCM Consulting, Bhilai, Chattisgarh, India

Written for practitioners and students of software testing and quality assurance, this book covers all of the necessary concepts and techniques. The first part deals with software testing, while the second part covers software quality assurance. It covers standards issued by the IEEE, the ISO, and the Software Engineering Institute. The author details all of the processes, metrics, techniques, and standards for testing and quality assurance. To add practical knowledge, the book includes case studies showing applications and realworld use. It also includes challenging practice questions and solutions. Catalog no. K12087, December 2011, 456 pp. ISBN: 978-1-4398-4655-1, $83.95 / £55.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

19


Software Engineering The ScrumMaster Study Guide

Secure and Resilient Software

James Schiel

Requirements, Test Cases, and Testing Methods

Founder, Artisan Software Consulting, Lafayette Hill, Pennsylvania, USA

Mark S. Merkow

Series: Applied Software Engineering Series

Examining the questions usually asked by students attending Certified Scrum Master (CSM) training, this book is a compilation of the insights of the author gained through teaching nearly 100 CSM classes. It starts by introducing the concepts of agile development and Scrum. Next, it explains how to create Scrum teams and how to assess their productivity. Considering how to sell agile development to upper management and to customers, the book illustrates the implementation of agile development in an organization—addressing the roles and responsibilities of various team players. Catalog no. K12736, December 2011, 234 pp. ISBN: 978-1-4398-5991-9, $75.95 / £48.99 Also available as an eBook

Fundamentals of Multicore Software Development Edited by

Victor Pankratius Ali-Reza Adl-Tabatabai Intel Corporation, Santa Clara, California, USA

Walter Tichy University of Karlsruhe, Germany Series: Chapman & Hall/CRC Computational Science

With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, this book helps software engineers understand parallel programming and master the multicore challenge. Accessible to newcomers to the field, it covers the fundamentals of multicore hardware, parallel design patterns, and parallel programming in C++, .NET, and Java. It also discusses manycore computing on graphics cards and heterogeneous multicore platforms, automatic parallelization, automatic performance tuning, transactional memory, and emerging applications. Catalog no. K10647, December 2011, 330 pp. ISBN: 978-1-4398-1273-0, $98.95 / £62.99 Also available as an eBook

20

Technical Security Strategy, Scottsdale, Arizona, USA

Lakshmikanth Raghavan PayPal, San Jose, California, USA

Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements. It offers ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods to help ensure software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides the tools needed to integrate security into the requirements analysis, design, and testing phases of the software development lifecycle. Catalog no. K12954, November 2011, 278 pp. ISBN: 978-1-4398-6621-4, $83.95 / £55.99 Also available as an eBook

Software Engineering The Current Practice Vaclav Rajlich Wayne State University, Detroit, Michigan, USA Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

This text teaches students basic software engineering skills and helps practitioners refresh their knowledge and explore recent developments in the field. It covers the most common iterative processes: agile, directed, and centralized processes. The book also discusses the role of software change in these processes and the phases of software change, including concept location, impact analysis, refactoring, actualization, and verification. The text journeys through the software life span from the initial development of software from scratch to the final stages that lead toward software closedown. Catalog no. K11915, November 2011, 315 pp. ISBN: 978-1-4398-4122-8, $83.95 / £48.99 Also available as an eBook

Save when you order online at www.crcpress.com


Software Engineering Software Maintenance Success Recipes

How to Reduce the Cost of Software Testing

Donald J. Reifer

Edited by

President, Reifer Consultants LLC, Prescott, Arizona, USA

Matthew Heusser Govind Kulkarni

Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 realworld maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do their work and instructs on the methods required to achieve success. Donald J. Reifer—an award winner for his contributions to the field of software engineering—provides step-by-step guidance on how to structure the job to complete all of the work related to the task. Catalog no. K12367, November 2011, 344 pp. ISBN: 978-1-4398-5166-1, $87.95 / £55.99 Also available as an eBook

Social Software Engineering Development and Collaboration with Social Networking Jessica Keyes New Art Technologies, Monroe Township, New Jersey, USA

Social Software Engineering examines the field through the spectrum of social activities that now compose it. Supplying an up-to-date look at this ever-evolving field, coverage includes security, legal, and privacy issues in addition to workflow and people issues. Jessica Keyes, former managing director of R&D for the New York Stock Exchange, details the methodology needed to bring mission-critical software projects to successful conclusions. She provides readers with the understanding and tools required to develop infrastructures capable of supporting the collaborative applications that today’s users require. Catalog no. K12482, September 2011, 481 pp. ISBN: 978-1-4398-5375-7, $98.95 / £55.99 Also available as an eBook

Plenty of software testing books tell you how to test well; this one tells you how to do it while decreasing your testing budget. A series of essays written by some of the leading minds in software testing, this book provides tips, tactics, and techniques to help readers accelerate the testing process, improve the performance of test teams, and lower costs. Detailing strategies that testers can immediately put to use to reduce costs, the book explains how to make testing nimble, how to remove bottlenecks in the testing process, and how to locate and track defects efficiently and effectively. Catalog no. K12845, September 2011, c. 340 pp. ISBN: 978-1-4398-6155-4, $73.95 / £48.99 Also available as an eBook

Database Design Using EntityRelationship Diagrams Second Edition Sikha Bagui University of West Florida, Pensacola, USA

Richard Earp University of West Florida, Pensacola, USA Series: Foundations of Database Design

With Database Design Using Entity-Relationship Diagrams, Second Edition, readers can quickly learn the ins and outs of ER diagramming. Building on the success of the bestselling first edition, this accessible text includes a new chapter on the relational model and functional dependencies. It also includes expanded chapters on Enhanced Entity Relationship (EER) diagrams and reverse mapping. It uses cutting-edge case studies and examples to help readers master database development basics and defines ER and EER diagramming in terms of requirements and specifications. Catalog no. K12857, September 2011, c. 371 pp. ISBN: 978-1-4398-6176-9, $83.95 / £55.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

21


Software Engineering Building Enterprise Systems with ODP

Software Development

An Introduction to Open Distributed Processing

Allen Tucker

An Open Source Approach

Peter F. Linington, Zoran Milosevic, Akira Tanaka, and Antonio Vallecillo

Ralph Morelli Trinity College, Hartford, Connecticut, USA

Chamindra de Silva

Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

This book presents a systematic approach to the design of large, complex distributed systems using the concepts and mechanisms defined by the Reference Model of Open Distributed Processing (RM-ODP). Focusing on the key choices that make an architectural design robust and durable, the authors illustrate the benefits of using a viewpoint-based approach and help readers understand the concepts, mechanisms, and problems involved in the design of complex enterprise systems. Complete UML models and more are available on a supporting website. Catalog no. K12956, September 2011, 284 pp. ISBN: 978-1-4398-6625-2, $75.95 / £48.99 Also available as an eBook

Sahana Project, Colombo, Sri Lanka Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

Written by experienced software developers and educators, this text immerses readers directly into an agile free and open source software (FOSS) development process. It focuses on the methodologies and goals that drive the development of FOSS, combining principles with real-world skill building, such as debugging, refactoring, and writing. The authors highlight the value of collaboration as a fundamental paradigm for software development and provide hands-on projects using real open source software. Numerous supporting materials are available on the book’s website. Catalog no. K10655, January 2011, 398 pp. ISBN: 978-1-4398-1290-7, $83.95 / £55.99 Also available as an eBook

Software Engineering Reviews and Audits

Applied Semantic Web Technologies Edited by

Boyd L. Summers

Vijayan Sugumaran Oakland University, Rochester, MI, USA

Jon Atle Gulla NTNU, Trondheim, Norway

Integrating theory with case studies, this book illustrates the history, current state, and future direction of the semantic web. It maintains an emphasis on realworld applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. Using case studies, it highlights valuable lessons learned by the authors. They explain how to create social ontologies and present examples of the application of semantic technologies in building automation, logistics, ontology-driven business process intelligence, decision making, and energy efficiency in smart homes. Catalog no. K10096, August 2011, 476 pp. ISBN: 978-1-4398-0156-7, $98.95 / £62.99 Also available as an eBook

22

Bowdoin College, Brunswick, Maine, USA

The Boeing Company, Seattle, Washington, USA

This book offers authoritative guidance for conducting and performing software first article inspections, and functional and physical configuration software audits. It provides best methods for conducting reviews and audits for aerospace companies, defense contractors, and software organizations. The author includes checklists, sample forms, and a glossary of industry terms and acronyms to help ensure formal audits are successful the first time around. The text will help readers increase service quality, generate cost reductions, and improve individual and team efforts. Catalog no. K12356, January 2011, 260 pp. ISBN: 978-1-4398-5145-6, $98.95 / £55.99 Also available as an eBook

Save when you order online at www.crcpress.com


Programming Explorations in Computing An Introduction to Computer Science and Python Programming John S. Conery University of Oregon, Eugene, USA Series: Chapman & Hall/CRC Textbooks in Computing

This text helps beginners develop their own Python programs. Experiments with fully completed programs are provided at the beginning of each chapter, allowing instructors to use the text in CS0 courses where students do not learn programming. Programming projects appear later in each chapter. Students are encouraged either to write the code that implements the functions introduced earlier or extend the existing programs. All the projects push students to explore further on their own. • Takes an active learning approach to teaching computer science concepts and Python programming • Illustrates important ideas in computer science through interesting projects

LogiQL A Query Language for Smart Databases Terry Halpin INTI International University, Malaysia

Spencer Rugaber College of Computing, Georgia Institute of Technology, Atlanta, USA

This book introduces readers to programming in Datalog, which is a subset of Prolog, a general purpose logic programming language associated with AI and computational linguistics. The book shows how Datalog deals with large data sets while avoiding low-level implementation details found in other relational database languages. It also explores the application of Datalog programming in data warehousing, data mining, data quality, business rules, and more. • Covers the syntax of the language, the structure of programs, and how to express a problem in terms of constraints, derivation rules, and facts • Provides a series of practical examples to motivate the utility of Datalog in real-world environments

• Emphasizes depth and breadth in its approach

• Uses the most recent version of Datalog with code updates posted online as necessary

• Presents material suitable for both CS0 and CS1 courses

Selected Contents:

• Offers ancillaries online

Basics. Intermediate Aspects. Diving Deeper. Advanced Aspects. Appendices.

Figure slides are available upon qualifying course adoption

Selected Contents: Introduction. The Python Workbench. The Sieve of Eratosthenes. A Journey of a Thousand Miles. Iteration as a Strategy for Solving Computational Problems. Breaking Large Problems into Smaller Subproblems. A Machine Learning Approach to Filtering Junk Mail. An Algorithm for Generating Random Numbers. Binary Codes and Algorithms for text Compression and Error Detection. Introduction to Computer Architecture and Assembly Language Programming. A Program that Understands English (or does it). Computer Simulation and the N-Body Problem. A Genetic Algorithm for a Computationally Demanding Problem.

Catalog no. K23512, September 2014, 272 pp. Soft Cover ISBN: 978-1-4822-4493-9, $69.95 / £44.99 Also available as an eBook

Catalog no. K16600, August 2014, 434 pp. ISBN: 978-1-4665-7244-7, $79.95 / £49.99

For more information and complete contents, visit www.crcpress.com

23


Programming Exploring Neural Networks with C#

Exercises in Programming Style

Ryszard Tadeusiewicz

Cristina Videira Lopes

AGH University of Science & Technology, Poland

University of California, Irvine, USA

Rituparna Chaki

“… an instant classic. In the spirit of Queneau’s Exercises in Style, Cristina examines a common programming problem though the lens of different programming styles, each shaped by different constraints. … book offers a most rewarding journey through the landscape of languages and idioms and will help the professional programmer advance their craft.”

University of Calcutta, Kolkata, West Bengal, India

Nabendu Chaki University of Calcutta, Kolkata, West Bengal, India

“I therefore highly recommend this book to all who want to learn neurocomputing techniques for its unique and practical educational value!” —Dr. Jacek M. Zurada, Department of Electrical and Computer Engineering, University of Louisville, Kentucky

This book presents the important properties of neural networks—while keeping mathematics to a minimum. Explaining how to build neural networks and use them, the book presents complicated information about neural networks structure, functioning, and learning in a manner that is easy to understand. Taking a "learn by doing" approach, the book is filled with illustrations to guide readers through the mystery of neural networks. Examples of experiments are provided in the text to encourage individual research. C# programs are also included to help readers independently discover the properties of neural networks. • Describes neural networks in very easy-to-understand format, while keeping mathematics to a minimum • Provides C# computer programs that can be used by the reader to independently discovery properties of neural networks • Includes examples of experiments to encourage individual research

—Grady Booch, IBM Fellow, Chief Scientist for Software Engineering, IBM Research

Using a simple computational task (term frequency) to illustrate different programming styles, this book helps readers understand the various ways of writing programs and designing systems. It contains 33 different styles for writing the term frequency task. Designed to be used in conjunction with code provided on an online repository, the book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. • Presents a comprehensive collection of programming styles using a simple computational task, term frequency • Uses constraints as a unifying principle for explaining style in software systems • Includes end-of-chapter exercises that test readers’ understanding of each style • Offers suggestions for further reading that are useful for graduate students • Provides the code on a supporting website

Selected Contents: Introduction to Natural and Artificial Neural Networks. A Neural Net Structure. Teaching the networks. Functioning of a Simplest Network. Teaching Simple Linear One Layer Neural Networks. Nonlinear Networks. Backpropagation. Forms of Neural Networks Learning. Self-Learning Neural Networks. Self-Organizing Neural Networks. Recurrent Networks.

Selected Contents: Historical. Basic Styles. Function Composition. Objects and Object Interaction. Reflection and Metaprogramming. Adversity. Data-Centric. Concurrency. Interactivity. Catalog no. K22536, June 2014, 304 pp., Soft Cover ISBN: 978-1-4822-2737-6, $39.95 / £25.99

Catalog no. K22949, September 2014, 296 pp. Soft Cover ISBN: 978-1-4822-3339-1, $79.95 / £49.99 Also available as an eBook

24

Save when you order online at www.crcpress.com


Programming The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation Lixiang Yang Graduate University of the Chinese Academy of Sciences, Beijing

This book uses the real source code of a multi-process operating system (OS) as the blueprint and its actual running operation as the main thread. It uses the concept of "master-slave mechanism" and provides more than 300 figures, illustrating the complex relationships within the OS. Divided into two sections, it provides detailed insight on the complete process from booting up to system idling. The second part uses a few carefully designed real-life user operations as study cases to explicate important OS concepts. • Provides more than 300 high-resolution figures to illustrate the actual inside status of the operating system (OS) • Reveals the fundamental design concepts of the OS • Presents thorough explanations of the original source code, helping readers to learn how an actual OS operates and understand common problems faced • Uses the running operation of the OS as the main thread to explain how it works • Includes a concise summary, special notes, and author’s comments to help the reader gain a better understanding of the material

Selected Contents: From Power-Up to the Main Function . Device Initialization and Process 0 Activation. Creation and Execution of Process 1. Creation and Execution of Process 2. File Operation. The User Process and Memory Management. Buffer and Multiprocess Operating File. Inter-Process Communication. Operating System’s Design Guidelines. Catalog no. K15142, April 2014, 534 pp., Soft Cover ISBN: 978-1-4665-1803-2, $69.95 / £49.99 Also available as an eBook

C From Theory to Practice George S. Tselikis 4Plus company, Athens, Greece

Nikolaos D. Tselikas University of Peloonnese, Tripolis, Greece

This easy-to-use, classroomtested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. More than 500 exercises and examples of progressive difficulty aid students in understanding all the aspects and peculiarities of the C language. The exercises test students on various levels of programming and the examples enhance their concrete understanding of programming know-how. The book tests the skills of beginners and advanced developers by providing an easy-to-read compilation of the C theory enriched with tips and advice as well as difficulty-scaled solved programming exercises. It decodes the secrets of the C language, providing inside information and programming knowledge through practical examples and meaningful advice. The examples are designed to be short, concrete, and substantial, quickly giving students the know-how they need. • Gives thorough explanations of complicated concepts, such as pointers, structures, memory management, and files • Provides concrete examples that illustrate hands-on programming • Includes exercises to test students’ programming skills • Offers source code online

Selected Contents: Introduction to C. Data Types, Variables, and Data Output. Getting Input with scanf(). Operators. Program Control. Loops. Arrays. Pointers. Characters. Strings. Functions. Searching and Sorting Arrays. Structures and Unions. Memory Management and Data Structures. Files. Preprocessor Directives and Macros. Review Exercises. Appendices. Catalog no. K21756, February 2014, 518 pp. Soft Cover ISBN: 978-1-4822-1450-5, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

25


Programming Programming Languages for MIS

Introduction to Programming Languages

Concepts and Practice

Arvind Kumar Bansal

Hai Wang

Designed for a one-semester undergraduate course, this classroom-tested book separates programming language concepts from the restraints of multiple language syntax by discussing the concepts at an abstract level. The author explains the principles of programming language design and implementation and covers both classical and newer topics, such as concurrent programming constructs and mobile computing models. Along with problems and further reading in each chapter, the text includes in-depth examples and case studies using various languages that help students understand syntax in practical contexts.

Kent State University, Ohio, USA

Saint Mary's University, Halifax, Nova Scotia, Canada

Shouhong Wang University of Massachusetts Dartmouth, USA

This book supplies a synopsis of the major computer programming languages, including C++, HTML, JavaScript, CSS, VB.NET, C#.NET, ASP.NET, PHP (with MySQL), XML (with XSLT, DTD, and XML Schema), and SQL. Ideal for undergraduate students in IS and IT programs, this textbook and its previous versions have been used in the authors’ classes for the past 15 years. Focused on web application development, the book considers client-side computing, server-side computing, and database applications. This book supplies professors with the opportunity to structure a course consisting of two distinct modules: the teaching module and the project module. The teaching module supplies an overview of representative computer languages. The project module provides students with the opportunity to gain hands-on experience with the various computer languages through projects. • Focuses on web application development, including client-side computing, server-side computing, and database applications • Includes hands-on examples for each language covered • Emphasizes programming techniques, including structured programming, object-oriented programming, client-side programming, server-side programming, graphical user interface, and database for web applications

Selected Contents: Introduction. C++. HTML, JavaScript , and CSS. VB.NET. C#.NET. ASP.NET. PHP. XML. SQL. Catalog no. K22290, January 2014, 317 pp. ISBN: 978-1-4822-2266-1, $79.95 / £49.99 Also available as an eBook

• Introduces programming language concepts at an abstract level, freeing them from the restraints of multiple language syntax • Illustrates the concepts using many examples from modern languages, such as Java, C++, C#, Ada 2012, Ruby, Perl, Python, Scala, and Haskell • Describes implementation models of various paradigms, including imperative, functional, logic, and object-oriented programming • Covers up-to-date topics in concurrent programming, web-based programming, distributed computing, and other areas highly relevant in today’s computing world • Gives insight into low-level implementation behavior

Selected Contents: Introduction. Background and Fundamental Concepts. Syntax and Semantics. Abstractions in Programs and Information Exchange. Implementation Model for Imperative Languages. Dynamic Memory Management. Type Theory. Concurrency Programming Paradigm. Functional Programming Paradigm. Logic Programming Paradigm. Object-Oriented Programming Paradigm. Web and Multimedia Programming Paradigms. Other Programming Paradigms. Scripting Languages. Conclusion and Future of Programming Languages. Appendices. Bibliography. Index. Catalog no. K16083, December 2013, c. 624 pp. Soft Cover ISBN: 978-1-4665-6514-2, $79.95 / £49.99 Also available as an eBook

26

Save when you order online at www.crcpress.com


Programming PhoneGap Build Developing Cross Platform Mobile Applications in the Cloud Bintu Harwani PhoneGap is a standardsbased, open-source development framework that can be deployed to any mobile device without losing the features of the native app—allowing for access to device contacts, the local file system, camera, and media on multiple platforms without requiring users to write a single line of code. Ideal for intermediate to advanced users, this book offers the comprehensive coverage you need to harness the power of this dynamic tool. It provides complete coverage of the cloud computing platform and the theories behind cloud computing, using a series of engaging examples. • Explains how to use HTML5, CSS3, and JavaScript to develop apps for devices that operate on different mobile operating systems • Exploits the features provided by PhoneGap and PhoneGap Build to develop cross platform mobile applications for the cloud • Suitable for developers and instructors that want to learn or teach mobile programming • Describes how to use back end databases to store and retrieve information

Selected Contents: Introducing PhoneGap. Beginning with PhoneGap. Creating Cross Platform Applications. Using PhoneGap Build. Using Geolocation. Using Contacts. Storing Data. Understanding Accelerometer. Using Compass. Media. Using Camera. Capture. Using PhoneGap with Sencha Touch. Using PhoneGap with jQuery Mobile. Catalog no. K20423, November 2013, c. 303 pp. ISBN: 978-1-4665-8974-2, $69.95 / £44.99 Also available as an eBook

Introduction to Compiler Construction in a Java World Bill Campbell, Swami Iyer, and Bahar Akbal-Delibas University of Massachusetts, Boston, USA

“… covers most standard compiler construction techniques well, and does a good job of exposing students to actual implementation environments. … Highly recommended. Upper-division undergraduates and above. “ —C. Vickery, Queens College of CUNY in CHOICE Magazine

“… an excellent book to use for individual study or in an upper-level undergraduate or first-year graduate course. No previous background in the theory of computation is needed.” —Computing Reviews, March 2014

Immersing students in Java and the JVM, this text enables a deep understanding of the Java programming language and its implementation. It focuses on design, organization, and testing, helping students learn good software engineering skills and become better programmers. By working with and extending a real, functional compiler, students develop a handson appreciation of how compilers work, how to write compilers, and how the Java language behaves. Fully documented Java code for the compiler is accessible on a supplementary website. • Presents a hands-on introduction to compiler construction, Java technology, and software engineering principles • Teaches how to fit code into existing projects • Describes a JVM-to-MIPS code translator, along with optimization techniques • Includes end-of-chapter exercises that encourage students to write tests, re-factor code, and create new code

Selected Contents: Compilation. Lexical Analysis. Parsing. Type Checking. JVM Code Generation. Translating JVM Code to MIPS Code. Register Allocation. Celebrity Compilers. Appendices. Bibliography. Index. Catalog no. K12801, November 2012, c. 381 pp. ISBN: 978-1-4398-6088-5, $93.95 / £51.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

27


Programming Introduction to the Art of Programming Using Scala Mark C. Lewis Trinity University, San Antonio, Texas, USA Series: Chapman & Hall/CRC Textbooks in Computing

“This textbook for college programming courses is obviously aimed at students in computing, but it would also be useful for students in other fields since it is about problem solving. Software designers can also use it as a reference for many programming techniques. … this is great textbook, containing a huge amount of useful information for students.” —Claudiu Popescu, Computing Reviews, March 2013

This text presents many concepts from CS1 and CS2 using a modern, JVM-based language that works well for both programming in the small and programming in the large. It teaches fundamental problem solving and programming in the small, illustrates the benefits of object-oriented design, and presents data structures showing different implementations of key ADTs. It also covers advanced topics such as multithreading and networking. Ancillary resources, including video lectures and more exercises, are accessible from the book’s website. • Represents the first textbook to teach introductory programming via Scala, a modern language with a JVM implementation that supports coding in the large and small • Introduces the concepts of parallelism and parallel collections • Covers a variety of advanced topics, including multithreading and networking • Contains numerous exercises and hands-on projects in each chapter • Provides video lectures, data sets, additional exercises and projects, and sample solutions on the book’s website

Selected Contents: Introductory Concepts: Basics of Computers, Computing, and Programming. Getting to Know the Tools. Scala Basics. Conditionals. Functions. Recursion for Iteration. Arrays and Lists in Scala. Loops. Text Files. Case Classes. GUIs. Graphics. Sorting and Searching. XML. Recursion. ObjectOrientation, Abstraction, and Data Structures: Object-Orientation. Bigger Programs/New Tools... Catalog no. K14273, November 2012, c. 936 pp. Soft Cover ISBN: 978-1-4398-9666-2, $83.95 / £46.99 Also available as an eBook

28

Programming GPS and OpenStreetMap Applications with Java The RealObject Application Framework Kristof Beiglböck This book provides a concrete paradigm for object-oriented modeling and programming. It introduces the use of available global positioning data for the development of applications involving digital maps. The author describes the different formats of GPS data and digital maps and shows how to use recorded GPS traces to replay and display this data on a digital map. Then, he works through in detail the processing steps of obtaining dedicated data from OpenStreetMaps and how to extract a network for a simple navigation application. For each topic covered—GPS data, OpenStreetMaps, and navigation—Java code is developed that can be adapted to readers’ needs and locality. Catalog no. K14656, January 2012, 248 pp. Soft Cover ISBN: 978-1-4665-0718-0, $62.95 / £40.99 Also available as an eBook

Some Assembly Required Assembly Language Programming with the AVR Microcontroller Timothy S Margush The University of Akron, Ohio, USA

A comprehensive treatment of assembly language programming and computer organization, this text teaches the basic system capabilities of 8-bit AVR microcontrollers. It provides a foundation for understanding compilers, linkers, loaders, and operating systems in addition to the processors themselves. The book covers function call mechanisms and parameter passing techniques, explains how to use the XPLAIN Evaluation Kit, and describes data representation for integers, floating point, and character data. Along with many examples to illustrate the assembly language concepts, each chapter includes standard questions and programming exercises. Catalog no. K11091, August 2011, 643 pp. ISBN: 978-1-4398-2064-3, $98.95 / £62.99 Also available as an eBook

Save when you order online at www.crcpress.com


Web-Based Software Engineering Web Security A WhiteHat Perspective Wu Hanqing Academy of Mathematics and Systems Science, Chinese Academy of Sciences

Liz Zhao Academy of Mathematics and Systems Science, Chinese Academy of Sciences

This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, security development lifecycle, and security operations. • Offers practical solutions to a wide range of web security vulnerabilities and issues • Explains how a website should deal with leaks and how to guarantee the safety of the site • Covers numerous security development processes and operations issues • Analyzes the nature of web security and describes how to solve problems on a practical basis Catalog no. K20571, September 2014, c. 544 pp. Soft Cover ISBN: 978-1-4665-9261-2, $79.95 / £49.99 Also available as an eBook

Secure Development for Mobile Apps How to Design and Code Secure Mobile Applications with PHP and JavaScript J. D. Glaser Although there are many books that address security issues, most do not explain how to incorporate security into the building process. This book does exactly that. It supplies step-by-step guidance on how to integrate security measures into social applications running on mobile platforms. It explains how to design and code applications with security as part of the process and not an afterthought. The author outlines best practices to help readers build better, more secure software. • Describes how to account for security a social applications • Illustrates how to apply software design best practices to mobile security • Explains how to ensure security through testdriven development • Demonstrates how to use process automation to eliminate and reduce mistakes • Includes a process toolkit that can be reused on any social network project

Selected Contents: Understanding Points of Entry for All Web Applications. Simple Patterns - Building a Basic Service. Factories, Templates, Observers, Visitors, and Mediators. Catalog no. K21617, September 2014, 296 pp. Soft Cover ISBN: 978-1-4822-0903-7, $59.95 / £38.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

29


Web-Based Software Engineering Anonymous Communication Networks

Dynamic Web Programming and HTML5

Protecting Privacy on the Web

Paul S. Wang

Kun Peng

Helping readers master web development, this comprehensive and up-to-date guide covers specific web programming languages, APIs, and coding techniques and provides an in-depth understanding of the underlying concepts, theory, and principles. The author leads readers through page structuring, page layout/styling, user input processing, dynamic user interfaces, database-driven websites, and mobile website development. Numerous examples illustrate how the programming techniques and other elements work together to achieve practical goals. Encouraging hands-on practice, the book’s companion website offers live examples, code, and additional resources.

Institute for Infocomm Research, Singapore

This book examines anonymous communication networks as a solution to Internet privacy concerns. It explores various anonymous communication networks as possible solutions to Internet privacy concerns and identifies specific scenarios where it is best to remain anonymous. The text details the two main approaches to anonymous communication networks: onion routing and mixed networks. Using examples and case studies, it illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It also includes guidance to help readers download and install Tor, I2P, JAP/JonDo, and QuickSilver. Catalog no. K13841, April 2014, 203 pp. ISBN: 978-1-4398-8157-6, $79.95 / £49.99 Also available as an eBook

Kent State University, Ohio, USA

• Programs from the text bundled in a downloadable code package • Ample resource listings and information updates • Covers new web standards, including HTML5 and CSS3 • Emphasizes dynamism and user friendliness with PHP and JavaScript

Foundations of Fuzzy Logic and Semantic Web Languages Umberto Straccia Institute of Information and Science Technologies, CNR, Pisa, Italy Series: Chapman & Hall/CRC Studies in Informatics Series

This book is the first to combine coverage of fuzzy logic and Semantic Web languages. It provides indepth insight into fuzzy Semantic Web languages for non-fuzzy set theory and fuzzy logic experts. It also helps researchers of non-Semantic Web languages get a better understanding of the theoretical fundamentals of Semantic Web languages. The first part of the book covers all the theoretical and logical aspects of classical (two-valued) Semantic Web languages. The second part explains how to generalize these languages to cope with fuzzy set theory and fuzzy logic. Catalog no. K12469, August 2013, c. 386 pp. ISBN: 978-1-4398-5347-4, $89.95 / £57.99 Also available as an eBook

30

• Requires no prior knowledge of web development • Discusses advanced topics such as the HTML5 DOM, database-driven websites, the LAMP package, XML, MathML, SVG, and AJAX • Includes a chapter on mobile websites • Presents many examples and ready-to-run programs, along with end-of-chapter exercises • Provides live examples, code, appendices, and additional resources on a companion website

Selected Contents: The Web: An Overview. Webpage Markup with HTML5. Audio, Video, and More HTML5. Styling with CSS. Forms, PHP, and Form Processing. Dynamic User Interface with JavaScript. HTML5 DOM and APIs. Server-Side Programming with PHP. Database-Driven Websites. Web Hosting: Apache, PHP, and MySQL. XML, AJAX, and Web Services. SVG and MathML. HTML5 and Mobile Websites. Bibliography. Index. Catalog no. K13293, November 2012, c. 664 pp. Soft Cover ISBN: 978-1-4398-7182-9, $83.95 / £51.99 Also available as an eBook

Save when you order online at www.crcpress.com


Web-Based Software Engineering Intelligent Technologies for Web Applications Priti Srinivas Sajja Rajendra Akerkar Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

This reference presents both fundamental and advanced topics and related to web operations. Using an integrated approach, the authors describe the basics as well as latest trends in the area. They cover agent-based web, wrapper induction, web mining, information retrieval, web knowledge management, and social networks. The text includes a host of examples and over 100 illustrations that clarify complex material. It also contains many bibliographical notes, end-of-chapter exercises, glossaries, and practice questions with solutions/hints. • Covers most of the major trends of web intelligence

Web 2.0 and Beyond Principles and Technologies Paul Anderson Intelligent Content Limited, Nottingham, UK

Incorporating research from a range of disciplines, this book provides an accessible and engaging explanation of Web 2.0 and its wider context yet is still grounded in the rigor of computer science. The author discusses the underlying ideas and principles and covers the main types of Web 2.0 services, including social networks, media sharing sites, and microblogging. He also presents the technologies and standards that underpin the operation of Web 2.0 and goes beyond this to explore cloud computing, web science, and other emerging topics. Catalog no. K11407, May 2012, c. 408 pp. ISBN: 978-1-4398-2867-0, $73.95 / £46.99

• Offers a literature review of the work done so far in the area of intelligent web with a necessary background • Provides a detailed but simplified explanation of advanced topics for beginners and noncomputer professionals with attractive figures, illustrations, tables, and real-world examples • Includes case studies, research issues, and lists of applications for each chapter, as well as exercises and projects with solution hints • Incorporates teaching material, a model syllabus, and sample examination papers • Requires no prior knowledge of data mining and statistics

Selected Contents: Introduction to the Web, machine learning, new AI techniques, and web intelligence. Introduction to World Wide Web. Machine learning concepts. Overview of constituents for the new artificial intelligence. Web intelligence. Information retrieval, mining, and extraction of content from the Web. Web information retrieval. Web mining. Structured data extraction. Semantic web and web knowledge management. Semantic web. Web knowledge management. Social network intelligence.. Agent-based web, security issues, and human–computer interaction.. Agent-based web. Web security. Human–web interactions.. Catalog no. K13281, May 2012, 367 pp. ISBN: 978-1-4398-7162-1, $93.95 / £59.99 Also available as an eBook

Machine-toMachine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5) Jesus Mena Triangular Marketing, El Paso, Texas, USA

This book examines the technologies, software, networks, mechanisms, techniques, and solution providers that are shaping the next generation of mobile advertising. Discussing the interactive environments that comprise the web, it explains how to deploy Machine-to-Machine Marketing (M3) and Anonymous Advertising Apps Anywhere Anytime (A5). The book’s case studies illustrate M3 and A5 implementations at JP Morgan Chase, Hyundai, Dunkin’ Donuts, New York Life, Twitter, Best Buy, JetBlue, IKEA, Urban Outfitters, JC Penney, Sony, eHarmony, and NASCAR. Catalog no. K13871, May 2012, 436 pp., Soft Cover ISBN: 978-1-4398-8191-0, $73.95 / £46.99 Also available as an eBook

For more information and complete contents, visit www.crcpress.com

31


Web-Based Software Engineering Mining Software Specifications Methodologies and Applications Edited by

David Lo Singapore Management University

Siau-Cheng Khoo National University of Singapore

Jiawei Han University of Illinois, Urbana-Champaign, USA

Chao Liu Microsoft Research, Redmond, Washington, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

Exploring existing and emerging work in the field, this volume shows how specification mining techniques can help find software bugs and improve program understanding. Top researchers in the software engineering community provide valuable insight on upto-date case studies of various software systems, including open source programs and those used by Microsoft Research and IBM Research. The book focuses on mining both finite state machines and temporal rules/patterns of behavior. It presents approaches that use static analysis, dynamic analysis, and combinations of the two. Catalog no. K10312, May 2011, c. 460 pp. ISBN: 978-1-4398-0626-5, $98.95 / ÂŁ62.99 Also available as an eBook

32

Save when you order online at www.crcpress.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.