Flylib.com
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
ISBN: 0131872508
EAN: 2147483647
Year: 2006
Pages: 394
Authors:
Bijay K. Jayaswal
,
Peter C. Patton
BUY ON AMAZON
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
Table of Contents
Copyright
Foreword
Preface
Acknowledgments
About the Authors
Part I: Contemporary Software Development Process, Their Shortcomings, and the Challenge of Trustworthy Software
Chapter 1. Software Development Methodology Today
Overview
Software Development: The Need for a New Paradigm
Software Development Strategies and Life-Cycle Models
Software Process Improvement
ADR Method
Seven Components of the Robust Software Development Process
Robust Software Development Model
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 2. The Challenge of Trustworthy Software: Robust Design in Software Context
Overview
Software Reliability: Myth and Reality
Limitations of Traditional Quality Control Systems
Japanese Quality Management Systems and the Taguchi Approach
The Nitty-Gritty of Taguchi Methods for Robust Design
The Challenge of Software Reliability: Design for Trustworthy Software
A Robust Software Development Model: DFTS Process in Practice
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 3. Software Quality Metrics
Overview
Measuring Software Quality
Classic Software Quality Metrics
Total Quality Management
Generic Software Quality Measures
Current Metrics and Models Technology
New Metrics for Architectural Design and Assessment
Common Architectural Design Problems
Pattern Metrics in OOAD
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 4. Financial Perspectives on Trustworthy Software
Overview
Why DFTS Entails Different Financial Analyses
Cost and Quality: Then and Now
Cost of Software Quality
Cost of Software Quality Over the Life Cycle
CoSQ and Activity-Based Costing
Quality Loss Function in Software
Financial Evaluation of a DFTS Investment
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions
Problems
Endnotes
Chapter 5. Organizational Infrastructure and Leadership for DFTS
Overview
Organizational Challenges of a DFTS Deployment
DFTS Implementation Framework
Putting It All Together
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Part II: Tools and Techniques of Design for Trustworthy Software
Chapter 6. The Seven Basic (B7) Tools of Quality
Overview
The Seven Basic (B7) Tools
B7 in a DFTS Context
Other DFTS Tools, Techniques, and Methodologies
Flowcharts
Pareto Charts
Cause-and-Effect Diagrams
Scatter Diagrams
Check Sheets
Histograms
Graphs
Control Charts
Key Points
Additional Resources
Review Questions
Discussion Questions
Endnotes
Chapter 7. The 7 MP Tools: Analyzing and Interpreting Qualitative and Verbal Data
Overview
The N7 and 7 MP Tools
Typical Applications of 7 MP Tools
Affinity Diagram
Interrelationship Diagraph (I.D.)
Tree Diagram
Prioritization Matrices
Matrix Diagram
Process Decision Program Chart (PDPC)
Activity Network Diagram
Behavioral Skills for 7 MP Tools
Key Points
Additional Resources
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 8. The Analytic Hierarchy Process
Overview
Prioritization, Complexity, and the Analytic Hierarchy Process
Multiobjective Decision-Making and AHP
Case Study 8.1 Solution Using Expert Choice
Approximations to AHP with Manual Calculations
Conclusion
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Problems
Endnotes
Chapter 9. Complexity, Mistakes, and Poka Yoke in Software Development Processes
Overview
Poka Yoke as a Quality Control System
Principles of Poka Yoke
Causes of Defects: Variation, Mistakes, and Complexities
Situations in Which Poka Yoke Works Well
Mistakes as Causes of Defects
Controlling Complexity in Software Development
Mistakes, Inspection Methods, and Poka Yoke
Deploying a Poka Yoke System
Identifying a Poka Yoke Solution
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 10. 5S for Intelligent Housekeeping in Software Development
Overview
5S: A Giant Step Toward a Productive Workplace Environment
Implementation Phases of the 5S System
The 5S System and the DFTS Process
Overcoming Resistance
Implementing 5S
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 11. Understanding Customer Needs: Software QFD and the Voice of the Customer
Overview
QFD: Origin and Introduction
Problems with Traditional QFD Applied to Software
Modern QFD for Software
The Blitz QFD Process
Implementing Software QFD
Conclusion
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions
Endnotes
About the Author
Chapter 12. Creativity and Innovation in the Software Design Process: TRIZ and Pugh Concept Selection Methodology
Overview
The Need for Creativity in DFTS
Creativity and TRIZ
TRIZ in Software Development
TRIZ, QFD, and Taguchi Methods
Brainstorming
Pugh Concept Selection Methodology
Software as Intellectual Property
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 13. Risk Assessment and Failure Modes and Effects Analysis in Software
Overview
FMEA: Failure Modes and Effects Analysis
Upstream Application of FMEA
Software Failure Tree Analysis
Software Failure Modes and Their Sources
Risk Assignment and Evaluation at Each Stage of DFTS
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 14. Object and Component Technologies and Other Development Tools
Overview
Major Challenges in Enterprise Business Applications
Object-Oriented Analysis, Design, and Programming
Component-Based Software Development Technology
Extreme Programming for Productivity
N-Version Programming for Reliability
Modern Programming Environments
Trends in Computer Programming Automation
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Part III: Designing for Trustworthy Software
Chapter 15. Quality Measures and Statistical Methods for Trustworthy Software
Overview
Trustworthy Software
Microsoft s Trustworthy Computing Initiative
Statistical Process Control for Software Development Processes
Statistical Methods for Software Architects
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Problems
Endnotes
Chapter 16. Robust Software in Context
Overview
The Software Specification Process
What Is Robust Software?
Requirements for Software to Be Robust
Specifying Software Robustness
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Problems
Endnotes
Chapter 17. Taguchi Methods and Optimization for Robust Software
Overview
Taguchi Methods for Robust Software Design
An Example from Engineering Design
An Example from Software Design and Development
Orthogonal Matrices for Taguchi Parameter Design Experiments
Applications to the Design of Trustworthy Software
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions
Problems
Endnotes
Chapter 18. Verification, Validation, Testing, and Evaluation for Trustworthiness
Overview
Continuing the Development Cycle
Verification
Validation
Testing and Evaluation
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Problems
Endnotes
Chapter 19. Integration, Extension, and Maintenance for Trustworthiness
Overview
Completing the Development Cycle
Integration
Extension
Maintenance
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Problems
Endnotes
Part IV: Putting It All Together: Deployment of a DFTS Program
Chapter 20. Organizational Preparedness for DFTS
Overview
Time to Ponder
Leadership Challenges for Transformational Initiatives
Assessing Key Organizational Elements
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions and Projects
Endnotes
Chapter 21. Launching a DFTS Initiative
Overview
DFTS and the PICS Framework
Plan
Implement
Control
Secure
Application in Small Software Firms and e-Cottages
What s Next?
Key Points
Additional Resources
Internet Exercises
Review Questions
Discussion Questions
Endnotes
Part V: Six Case Studies
Chapter 22. Cost of Software Quality (CoSQ) at Raytheon s Electronic Systems (RES) Group
Introduction
RES and Its Improvement Program
Cost of Software Quality
Experiences and Lessons Learned
Case Study Implications
Endnotes
Chapter 23. Information Technology Portfolio Alignment
Overview
Part OneThe Challenge
Part TwoA New, Rational Approach
Risk
Extensions
Summary
Endnote
Chapter 24. Defining Customer Needs for Brand-New Products: QFD for Unprecedented Software
Overview
Introduction
Defining Brand-New Needs
Tools
Last Steps
Layers of Resistance
Conclusion
Acknowledgments
References
About the Author
Chapter 25. Jurassic QFD: Integrating Service and Product Quality Function Deployment
Overview
Company Profile of MD Robotics
Why QFD?
Triceratops Encounter at Universal Studios Florida Island of Adventure
Summary
About the Authors
References
Endnotes
Chapter 26. Project QFD: Managing Software Development Projects Better with Blitz QFD
Overview
Introduction
Problems with New Development
Focus on Value with Project QFD
Summary
Acknowledgments
References
About the Author
Chapter 27. QFD 2000: Integrating QFD and Other Quality Methods to Improve the New-Product Development Process
Overview
Demand for New Products
Quality and New-Product Development
Resources for QFD and Other Quality Methods
About the Author
References
Glossary of Technical Terms
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Name Index
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
ISBN: 0131872508
EAN: 2147483647
Year: 2006
Pages: 394
Authors:
Bijay K. Jayaswal
,
Peter C. Patton
BUY ON AMAZON
Strategies for Information Technology Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
Cisco Voice Gateways and Gatekeepers
Dial Plan Considerations
Implementing SIP Gateways
Digital Circuits
Digital Trunks
Appendix A. Answers to Chapter-Ending Review Questions
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 49. Poll Wireless Clients
Hack 63. Build Your Own Access Point with Linux
Hack 72. Run Your Mac as an Access Point
Section A.1. 802.11: The Mother of All IEEE Wireless Ethernet
Section A.12. BSS Versus IBSS
Microsoft VBScript Professional Projects
VBScript and the WSH
Scheduling Disk Maintenance
Developing Script Log Analyzers
Developing a Setup Script
Processing and Consolidating Report Data
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Using Procedures to Organize Scripts
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Automation Executables
Working with the Range Object
Properties Merged from OLEObject or OLEControl
Introduction to Excels XML Features
Excel-Friendly XML Schemas
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies