- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Commercial software components can dramatically reduce the cost and time required to develop complex business-critical systems. However, integrating them offers stiff challenges that are not well understood by most software practitioners, and there have been many spectacular failures. Now, a team of authors from the Software Engineering Institute draws upon the lessons presented by both the failures and the successes, offering a start-to-finish methodology for integrating commercial components successfully. The authors examine failed integration projects, identifying key lessons and early…mehr
Andere Kunden interessierten sich auch für
- Rob AllenZend Framework in Action49,99 €
- John SonmezSoft Skills: The Software Developer's Life Manual32,99 €
- Tijs RademakersOpen-Source Esbs in Action: Example Implementations in Mule and Servicemix49,99 €
- Stan MageeGuide to Software Engineering Standards and Specifications166,99 €
- Robert MyklandPalm OS Cobalt Programming from the Ground Up, Second Edition35,99 €
- Mike McgrathBuilding Android Apps in Easy Steps13,99 €
- Chris FarrellUnder the Hood of .NET Memory Management26,99 €
-
-
-
Commercial software components can dramatically reduce the cost and time required to develop complex business-critical systems. However, integrating them offers stiff challenges that are not well understood by most software practitioners, and there have been many spectacular failures. Now, a team of authors from the Software Engineering Institute draws upon the lessons presented by both the failures and the successes, offering a start-to-finish methodology for integrating commercial components successfully. The authors examine failed integration projects, identifying key lessons and early warning signs, including the failure to account for loss of control over engineering design and production. Drawing upon both successes and failures, they present proven solutions for establishing requirements, evaluating components, creating flexible system designs that incorporate commercial components; and managing multiple concurrent design options linked to external market events and feasibility proofs. They also show how to build "just-in-time" competency with commercial components and integration.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- SEI Software Engineering
- Verlag: ADDISON WESLEY PUB CO INC
- New
- Seitenzahl: 432
- Erscheinungstermin: Juli 2001
- Englisch
- Abmessung: 243mm x 167mm x 31mm
- Gewicht: 848g
- ISBN-13: 9780201700640
- ISBN-10: 0201700646
- Artikelnr.: 21495304
- SEI Software Engineering
- Verlag: ADDISON WESLEY PUB CO INC
- New
- Seitenzahl: 432
- Erscheinungstermin: Juli 2001
- Englisch
- Abmessung: 243mm x 167mm x 31mm
- Gewicht: 848g
- ISBN-13: 9780201700640
- ISBN-10: 0201700646
- Artikelnr.: 21495304
Kurt C. Wallnau is a senior technical staff member at the Software Engineering Institute (SEI). He was team lead for the SEI's commercial off-the-shelf (COTS)-based systems project, and now leads the predictable assembly from certifiable components project. He designed and taught the CMU/MSE course in component-based development methods, and has over 20 years experience in research and industry. Scott A. Hissam is a senior technical staff member at the SEI and adjunct faculty member at the University of Pittsburgh. He has over 15 years of software development experience, including project leadership positions at Lockheed Martin and Bell Atlantic. Robert Seacord began programming (professionally) for IBM in 1982 and has been programming in C since 1985, and in C++ since 1992. Robert is currently a Senior Vulnerability Analyst with the CERT/Coordination Center at the Software Engineering Institute (SEI). He is coauthor of Building Systems from Commercial Components (Addison-Wesley, 2002) and Modernizing Legacy Systems (Addison-Wesley, 2003). The CERT/CC, among other security-related activities, regularly analyzes software vulnerability reports and assesses the risk to the Internet and other critical infrastructure.
Preface.
I: FUNDAMENTALS.
1. Components Everywhere.
The Software Component Revolution.
Component Space.
Process, Method & Notation Assumptions.
Terminology and Acronyms.
Summary.
2. The Unfinished Revolution.
The First Software Crisis.
The Software Factory Regime.
The Second Software Crisis.
The Market Regime.
Le Procés c'est mort! Vive le Procés!
Summary.
For Further Reading.
Discussion Questions.
3. Engineering Design & Components.
Fundamental Ideas.
Impact of Software Components.
Designing With & For Components.
Summary.
Discussion Questions.
4. Requirements & Components.
Fundamental Ideas.
Traditional Requirements Engineering.
Component-Based Requirements Engineering.
Summary.
Discussion Questions.
5. Ensembles & Blackboards.
Fundamental Ideas.
The Ensemble Metamodel.
Modeling Ensembles with Blackboards.
Summary.
Discussion Questions.
6. Model Problems.
Fundamental Ideas.
The Role of Toys.
From Toy to Model Problem.
Finding the Right Model Problems.
Repair and Contingency.
Summary.
For Further Reading.
Discussion Questions.
7. Managing the Design Space.
Fundamental Ideas.
Ensembles, Blackboards, Relations.
Ensemble Management.
Component & Ensemble Composition.
Repository Structure.
Summary.
Discussion Questions.
8. Storing Competence.
Fundamental Ideas.
Packaging With Ensemble Handbooks.
Automation.
Summary.
Discussion Questions.
9. The Multi-Attribute Utility Technique.
Fundamental Ideas.
Evaluating Components with MAUT.
Summary.
For Further Reading.
Discussion Questions.
10. Risk-Misfit.
Fundamental Ideas.
Feature and Repair Analysis.
Component Selection.
Why Risk/Misfit?
Experiences with Risk/Misfit.
Summary.
For Further Reading.
Discussion Questions.
11. Black Box Visibility.
Fundamental Ideas.
Opportunities for Visibility.
Probing.
Snooping.
Spoofing.
Static Program Analysis.
Summary.
Discussion Questions.
II: CASE STUDY.
12. The DIRS Case Study.
Sources of Complexity in DIRS.
A False Start.
Regrouping: The "DeepWeb" Approach.
Implications of DeepWeb.
Commitments.
Deceptive Simplicity.
Summary.
For Further Reading.
Discussion Questions.
13. Applet Ensemble: The Opening.
Where are We?
Risk Analysis.
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
14. Public Key Infrastructure.
Fundamental Ideas.
Non-Repudiation.
Confidentiality.
Integrity.
Summary.
For Further Reading.
Discussion Questions.
15. A Certificate Odyssey.
Where are We?
Exploring Certificate Space.
Sustaining the Public Key Infrastructure.
Evaluation.
Summary.
Discussion Questions.
16. Applet Ensemble: The Middlegame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
17. Secure Applet Ensemble.
Where are We?
Model Problem.
Model Solutions.
For Further Reading.
Summary.
Discussion Questions.
18. Instrumented Model Problem.
Where are We?
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
19. Sorbet: A Custom Ensemble.
Where are We?
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
20. Hardware Components.
Where are We?
Risk Analysis.
Realize Confidentiality Model Problem.
Realize Authorization Model problem.
Repair Analysis.
Summary.
Discussion Questions.
21. Into the Black Box.
Where are We?
Define Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
22. Applet Ensemble: The Endgame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
23. Secure Applet Ensemble Redux.
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
24. Conclusion & Retrospective.
Multi-Attribute Evaluation.
Conclusion.
Retrospective.
Summary.
Discussion Questions.
III: ONWARD.
25. Getting Started.
Build a Competence Center.
Define Your Infrastructure.
Build an Enterprise Design Handbook.
Certify Designers and Lead Engineers.
Summary.
26. The Prophecies.
Bibliography.
Index.
I: FUNDAMENTALS.
1. Components Everywhere.
The Software Component Revolution.
Component Space.
Process, Method & Notation Assumptions.
Terminology and Acronyms.
Summary.
2. The Unfinished Revolution.
The First Software Crisis.
The Software Factory Regime.
The Second Software Crisis.
The Market Regime.
Le Procés c'est mort! Vive le Procés!
Summary.
For Further Reading.
Discussion Questions.
3. Engineering Design & Components.
Fundamental Ideas.
Impact of Software Components.
Designing With & For Components.
Summary.
Discussion Questions.
4. Requirements & Components.
Fundamental Ideas.
Traditional Requirements Engineering.
Component-Based Requirements Engineering.
Summary.
Discussion Questions.
5. Ensembles & Blackboards.
Fundamental Ideas.
The Ensemble Metamodel.
Modeling Ensembles with Blackboards.
Summary.
Discussion Questions.
6. Model Problems.
Fundamental Ideas.
The Role of Toys.
From Toy to Model Problem.
Finding the Right Model Problems.
Repair and Contingency.
Summary.
For Further Reading.
Discussion Questions.
7. Managing the Design Space.
Fundamental Ideas.
Ensembles, Blackboards, Relations.
Ensemble Management.
Component & Ensemble Composition.
Repository Structure.
Summary.
Discussion Questions.
8. Storing Competence.
Fundamental Ideas.
Packaging With Ensemble Handbooks.
Automation.
Summary.
Discussion Questions.
9. The Multi-Attribute Utility Technique.
Fundamental Ideas.
Evaluating Components with MAUT.
Summary.
For Further Reading.
Discussion Questions.
10. Risk-Misfit.
Fundamental Ideas.
Feature and Repair Analysis.
Component Selection.
Why Risk/Misfit?
Experiences with Risk/Misfit.
Summary.
For Further Reading.
Discussion Questions.
11. Black Box Visibility.
Fundamental Ideas.
Opportunities for Visibility.
Probing.
Snooping.
Spoofing.
Static Program Analysis.
Summary.
Discussion Questions.
II: CASE STUDY.
12. The DIRS Case Study.
Sources of Complexity in DIRS.
A False Start.
Regrouping: The "DeepWeb" Approach.
Implications of DeepWeb.
Commitments.
Deceptive Simplicity.
Summary.
For Further Reading.
Discussion Questions.
13. Applet Ensemble: The Opening.
Where are We?
Risk Analysis.
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
14. Public Key Infrastructure.
Fundamental Ideas.
Non-Repudiation.
Confidentiality.
Integrity.
Summary.
For Further Reading.
Discussion Questions.
15. A Certificate Odyssey.
Where are We?
Exploring Certificate Space.
Sustaining the Public Key Infrastructure.
Evaluation.
Summary.
Discussion Questions.
16. Applet Ensemble: The Middlegame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
17. Secure Applet Ensemble.
Where are We?
Model Problem.
Model Solutions.
For Further Reading.
Summary.
Discussion Questions.
18. Instrumented Model Problem.
Where are We?
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
19. Sorbet: A Custom Ensemble.
Where are We?
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
20. Hardware Components.
Where are We?
Risk Analysis.
Realize Confidentiality Model Problem.
Realize Authorization Model problem.
Repair Analysis.
Summary.
Discussion Questions.
21. Into the Black Box.
Where are We?
Define Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
22. Applet Ensemble: The Endgame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
23. Secure Applet Ensemble Redux.
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
24. Conclusion & Retrospective.
Multi-Attribute Evaluation.
Conclusion.
Retrospective.
Summary.
Discussion Questions.
III: ONWARD.
25. Getting Started.
Build a Competence Center.
Define Your Infrastructure.
Build an Enterprise Design Handbook.
Certify Designers and Lead Engineers.
Summary.
26. The Prophecies.
Bibliography.
Index.
Preface.
I: FUNDAMENTALS.
1. Components Everywhere.
The Software Component Revolution.
Component Space.
Process, Method & Notation Assumptions.
Terminology and Acronyms.
Summary.
2. The Unfinished Revolution.
The First Software Crisis.
The Software Factory Regime.
The Second Software Crisis.
The Market Regime.
Le Procés c'est mort! Vive le Procés!
Summary.
For Further Reading.
Discussion Questions.
3. Engineering Design & Components.
Fundamental Ideas.
Impact of Software Components.
Designing With & For Components.
Summary.
Discussion Questions.
4. Requirements & Components.
Fundamental Ideas.
Traditional Requirements Engineering.
Component-Based Requirements Engineering.
Summary.
Discussion Questions.
5. Ensembles & Blackboards.
Fundamental Ideas.
The Ensemble Metamodel.
Modeling Ensembles with Blackboards.
Summary.
Discussion Questions.
6. Model Problems.
Fundamental Ideas.
The Role of Toys.
From Toy to Model Problem.
Finding the Right Model Problems.
Repair and Contingency.
Summary.
For Further Reading.
Discussion Questions.
7. Managing the Design Space.
Fundamental Ideas.
Ensembles, Blackboards, Relations.
Ensemble Management.
Component & Ensemble Composition.
Repository Structure.
Summary.
Discussion Questions.
8. Storing Competence.
Fundamental Ideas.
Packaging With Ensemble Handbooks.
Automation.
Summary.
Discussion Questions.
9. The Multi-Attribute Utility Technique.
Fundamental Ideas.
Evaluating Components with MAUT.
Summary.
For Further Reading.
Discussion Questions.
10. Risk-Misfit.
Fundamental Ideas.
Feature and Repair Analysis.
Component Selection.
Why Risk/Misfit?
Experiences with Risk/Misfit.
Summary.
For Further Reading.
Discussion Questions.
11. Black Box Visibility.
Fundamental Ideas.
Opportunities for Visibility.
Probing.
Snooping.
Spoofing.
Static Program Analysis.
Summary.
Discussion Questions.
II: CASE STUDY.
12. The DIRS Case Study.
Sources of Complexity in DIRS.
A False Start.
Regrouping: The "DeepWeb" Approach.
Implications of DeepWeb.
Commitments.
Deceptive Simplicity.
Summary.
For Further Reading.
Discussion Questions.
13. Applet Ensemble: The Opening.
Where are We?
Risk Analysis.
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
14. Public Key Infrastructure.
Fundamental Ideas.
Non-Repudiation.
Confidentiality.
Integrity.
Summary.
For Further Reading.
Discussion Questions.
15. A Certificate Odyssey.
Where are We?
Exploring Certificate Space.
Sustaining the Public Key Infrastructure.
Evaluation.
Summary.
Discussion Questions.
16. Applet Ensemble: The Middlegame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
17. Secure Applet Ensemble.
Where are We?
Model Problem.
Model Solutions.
For Further Reading.
Summary.
Discussion Questions.
18. Instrumented Model Problem.
Where are We?
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
19. Sorbet: A Custom Ensemble.
Where are We?
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
20. Hardware Components.
Where are We?
Risk Analysis.
Realize Confidentiality Model Problem.
Realize Authorization Model problem.
Repair Analysis.
Summary.
Discussion Questions.
21. Into the Black Box.
Where are We?
Define Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
22. Applet Ensemble: The Endgame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
23. Secure Applet Ensemble Redux.
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
24. Conclusion & Retrospective.
Multi-Attribute Evaluation.
Conclusion.
Retrospective.
Summary.
Discussion Questions.
III: ONWARD.
25. Getting Started.
Build a Competence Center.
Define Your Infrastructure.
Build an Enterprise Design Handbook.
Certify Designers and Lead Engineers.
Summary.
26. The Prophecies.
Bibliography.
Index.
I: FUNDAMENTALS.
1. Components Everywhere.
The Software Component Revolution.
Component Space.
Process, Method & Notation Assumptions.
Terminology and Acronyms.
Summary.
2. The Unfinished Revolution.
The First Software Crisis.
The Software Factory Regime.
The Second Software Crisis.
The Market Regime.
Le Procés c'est mort! Vive le Procés!
Summary.
For Further Reading.
Discussion Questions.
3. Engineering Design & Components.
Fundamental Ideas.
Impact of Software Components.
Designing With & For Components.
Summary.
Discussion Questions.
4. Requirements & Components.
Fundamental Ideas.
Traditional Requirements Engineering.
Component-Based Requirements Engineering.
Summary.
Discussion Questions.
5. Ensembles & Blackboards.
Fundamental Ideas.
The Ensemble Metamodel.
Modeling Ensembles with Blackboards.
Summary.
Discussion Questions.
6. Model Problems.
Fundamental Ideas.
The Role of Toys.
From Toy to Model Problem.
Finding the Right Model Problems.
Repair and Contingency.
Summary.
For Further Reading.
Discussion Questions.
7. Managing the Design Space.
Fundamental Ideas.
Ensembles, Blackboards, Relations.
Ensemble Management.
Component & Ensemble Composition.
Repository Structure.
Summary.
Discussion Questions.
8. Storing Competence.
Fundamental Ideas.
Packaging With Ensemble Handbooks.
Automation.
Summary.
Discussion Questions.
9. The Multi-Attribute Utility Technique.
Fundamental Ideas.
Evaluating Components with MAUT.
Summary.
For Further Reading.
Discussion Questions.
10. Risk-Misfit.
Fundamental Ideas.
Feature and Repair Analysis.
Component Selection.
Why Risk/Misfit?
Experiences with Risk/Misfit.
Summary.
For Further Reading.
Discussion Questions.
11. Black Box Visibility.
Fundamental Ideas.
Opportunities for Visibility.
Probing.
Snooping.
Spoofing.
Static Program Analysis.
Summary.
Discussion Questions.
II: CASE STUDY.
12. The DIRS Case Study.
Sources of Complexity in DIRS.
A False Start.
Regrouping: The "DeepWeb" Approach.
Implications of DeepWeb.
Commitments.
Deceptive Simplicity.
Summary.
For Further Reading.
Discussion Questions.
13. Applet Ensemble: The Opening.
Where are We?
Risk Analysis.
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
14. Public Key Infrastructure.
Fundamental Ideas.
Non-Repudiation.
Confidentiality.
Integrity.
Summary.
For Further Reading.
Discussion Questions.
15. A Certificate Odyssey.
Where are We?
Exploring Certificate Space.
Sustaining the Public Key Infrastructure.
Evaluation.
Summary.
Discussion Questions.
16. Applet Ensemble: The Middlegame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
17. Secure Applet Ensemble.
Where are We?
Model Problem.
Model Solutions.
For Further Reading.
Summary.
Discussion Questions.
18. Instrumented Model Problem.
Where are We?
Model Problem.
Model Solutions.
Evaluation.
Summary.
Discussion Questions.
19. Sorbet: A Custom Ensemble.
Where are We?
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
20. Hardware Components.
Where are We?
Risk Analysis.
Realize Confidentiality Model Problem.
Realize Authorization Model problem.
Repair Analysis.
Summary.
Discussion Questions.
21. Into the Black Box.
Where are We?
Define Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
22. Applet Ensemble: The Endgame.
Where are We?
Repair Analysis.
Risk Analysis.
Summary.
Discussion Questions.
23. Secure Applet Ensemble Redux.
Model Problem.
Model Solution.
Evaluation.
Summary.
Discussion Questions.
24. Conclusion & Retrospective.
Multi-Attribute Evaluation.
Conclusion.
Retrospective.
Summary.
Discussion Questions.
III: ONWARD.
25. Getting Started.
Build a Competence Center.
Define Your Infrastructure.
Build an Enterprise Design Handbook.
Certify Designers and Lead Engineers.
Summary.
26. The Prophecies.
Bibliography.
Index.