Pareto diagram, 118–19
Parity checking, 154, 155
Password security, 152–53, 154
Patch, 133
Path analyzer, 90
Peer review, 3, 51, 53, 61–62, 75
Performance evaluation, employee, 53, 57, 125
Personal certification, 242
Personnel risk, 195
Phase, 3, 112, 113
Phased implementation, 176
Phase-end review, 57–58, 60, 90, 134–35
Physical audit, 11, 58–59, 135, 146
Physical destruction, data, 152, 158
Physical risks, 198
Pirated software, 156
Planned obsolescence, 173
Planning
configuration management, 207, 210
disaster recovery, 157–58
inadequate, 184
maintenance, 221
outlines, 245–49
risk management, 202
software development, 207, 208–10
software safety, 190
system implementation, 227–29
testing, 11–12, 218
Point-of-sale terminal software testing, 85–86
Polishing, software, 173, 177–78
Postimplementation review, 59–60
Precode testing, 51
Preliminary design review, 58, 59–60, 62, 65–66, 68, 135, 145
Preliminary design specifications, 145, 211, 214, 215, 253–54
Prevention costs, 108–9
Process, 3
Process analysis, 99–100
Process control chart, 108, 121–23
Process-oriented metrics, 108
Process review, 11
Producer, 3
Product, 3
Product analysis, 99, 100
Product baseline, 135, 145
Productivity metrics, 108
Product-oriented metrics, 107–8
Product review, 135
Professional group standards, 41
Program, 3
Project completion analysis, 58–60
Proprietary source code escrow, 170, 173
Prototyping, 31–32, 159
Purchased software, 19–20, 167–73
Purchased standards, 42