Highly Dependable Software
Marvin V. Zelkowitz
Gulf Professional Publishing, 2003 - Computers - 366 pages
Since 1960, Advances in Computers has chronicled the constantly shifting theories and methods of Information Technology which greatly shapes our lives today. Highly Dependable Software is the 58th volume in this Series. The seven chapters describe various approaches towards dependability: software development measurability, transformation oriented programming, Bounded Model Checking, GUI testing, history and lessons from software inspections, impact and problems related to errors in software, the evolution of the various security policies. This book would be an invaluable addition to any university course in computer technology, and an excellent reference tool for industrial practitioners.
* Includes in-depth surveys and tutorials on advances in Computer Technology.* Features the work of well-known authors and researchers in the field.* Provides a broad overview of important developments.* Contains extensive bibliographies.
What people are saying - Write a review
We haven't found any reviews in the usual places.
What Factors Can Have an Impact on Productivity?
How to Identify Influential Factors
Benchmarking Software Development Productivity
A Development Methodology
Approaches to Developing HighAssurance Systems
State Machine Models
TOP as a Program Development Method
Summary and Conclusion
Bounded Model Checking
Reducing Bounded Model Checking to SAT
Techniques for Completeness
Propositional SAT Solvers
Related Work and Conclusions
Advances in GUI Testing Atif M Memon
GUI Testing Steps
Software Inspections Marc Roper Alastair Dunsmore and Murray Wood
The Beginnings of the Inspection Process
Variations on the Original Process
To Err Is Human
Fault Tolerance Is Related to Reliability Theory
Concepts of Information Assurance
A Historical Perspective
Todays Threat and Countermeasures
CONTENTS OF VOLUMES IN THIS SERIES
abstract algorithm analysis application approach architecture assurance benchmarking bounded model checking bytecodes Canonical Form checklist classfiles classloader COCOMO complexity component operator computer security computer system constant pool entries database defined denote described documents dynamic effort environment errors evaluation example execution factors failure fault tolerance files formal methods formula function points goal GUI testing hardware high-assurance IEEE implementation indexi infol initial input inspection process inspectors interaction Java Kripke structure language Latin squares model checking modules mult object object-oriented output path performance phase problem reading techniques reliability requirements reuse rewrite ROM image SAT solver security engineer semantics sequence software development Software Engineering software inspection software maintenance software system specification step strategy structure TCSEC term tion transformation rules transformation-oriented variables verification