Implementing software engineering practices [Book Review]

18 downloads 1107 Views 111KB Size Report
ing standards and practices that adapt well to an ... a skeletal format for writing a policy document in terms of ... presents information on security tech niques that ...
Implementing Software Engineering Practices Fletcher J. Buckley (John Wiley & Sons. New York, 1989, 172 pp., $34.95) Most software development shops have adopted development standards,

approach to introduce and explain his

plans, configuration management plans,

methodology for evolving a standardized

quality assurance plans, and the stan­

generally consisting of a commercial

development process. In Chapter 2, he

dards and procedures manual. He then

project-management methodology such

provides an overview of establishing pol­

devotes a chapter to each product to de­

as SDM 70 and Method I. I have observed

icy and implementation guidelines.

scribe the policies, how to establish them,

that software developers find these stan­

In Chapter 3, the author outlines the

and the tradeoffs involved. The author disc us ses the software de­

dards cumbersome, since they generate

documents that serve as a development

overhead that reduces productivity and

framework. He introduces such notions

sign phase in Chapter 13 and identifies

restrict s creativity. In practice, adher­

as grandfather clauses, escape clauses.

five sets of documents: top-level design

ence to these standards means that the

and termination clauses, and he presents

description, integration plan. test proce­

software developers are using the docu­

a skeletal format for writing a policy

dures, user documentation, and changes

mentation formats and meeting the pro­

document in terms of what needs to be

to all previously approved documents.

cedural milestones of these methodol­

done, who will do it, and who is respon­

He also dis cusses the issues involved in

ogies, regardless of their a pprop riateness

sible. The author uses this skeletal format

establishing policies for these documents.

to the task at hand.

throughout thc text to formulate sample

The appendix contains a comprehen­

policy statements that can be adapted by

sive bibliography of IEEE and DoD stan­

P ractices succinctly examines the pro­

practitioners to develop their own poli­

dards and illustrations of requirement

cesses and products for engineering and

cies and standards.

specifications and design specifications.

Implementing Software Engineering

managing large software projects. The

The rest of the book provides specific

Although software engineering practi­

details for (he different phases of the de­

tioners are the primary audience for this

ing standards and practices that adapt

velopment life cycle. Each chapter focuses

book, it is an excellent text to support a

well to an organization ' s culture and are

on developing policies and generating pro­

projects course in software development

tailored to the unique needs of the indi­

cedures that put the policies into practice.

or computer information systems. It

author provides guidelines for develop­

viduals in that organization. The book's

In Chapter 4, the author discusses how

should be required reading for graduate

to execute the requirement definition

students in software engineering and ap­

trum of software engineering practices as

phase and identifies seven produ cts of the

plied computing programs.

they apply to the various phases of soft­

phase: software requirement specifica­

short chapters collectively reveal a spec­

ware development. The author uses a stepwise refinement

tions, external interface specifications,

Donald R. Chand

acceptance test plans, development

Bentley College

NEW LITERATURE Security advice. In Computer and

55R51-03R-9. 600 pp., $39.95) by Roger

(ISBN 0-8136-8857-2, Order No. 857,

Communications Security: Strategies for

T. Stevens explores such fractals as the

200 pp., $31.50 members, $42 nonmem­

the 1990s (ISBN 0-07�012926-6, 411

von Koch snowflake, the Gosper curve,

bers) by Jerome C. Huck and Michael J.

pp., $44.95),author James Arlin Cooper

dragon curves, and the Mandelbrot set, as

Flynn studies and compares architec­

presents information on security tech­

well as the software for plotting and in­

tures by measuring the execution of two

niques that will be available in the next

vestigating them. The book includes over

identical sets of high-level-language pro­

decade and surveys safeguards against

100 black-and-white and 32 full-color

grams. The analysis relies on observable

security threats. The author examines

fractal illustrations. The author also de­

measures that reflect the effectiveness of

problems in six principal areas: physical,

scribes how to create displays of the Julia

an instruction set. Other measures include storage requirements and execution times.

personnel, regulatory. hardware, soft­

set and offers C language programs to re­

ware, and network security. He discusses

produce all the fractals in the book. The

software viruses and malfunctions, natu­

available MS-DOS format disk contains

Manufacturing Systems (ISBN 0-8186-

ral disasters. and technological advances

the source code to reproduce over 100

that can be used to exploit security weak­

fractals. The programs require an IBM

8916-1, Order No. 1916,450 pp., $55 members, S41 nonmembers) by Alan A.

Modeling and Control of Automated

nesses. He also explains hardware de­

PC or compatible with EGA or VGA card,

Desrochers surveys and summarizes cur­

vices, software strategies, mathematical

color monitor, and a Turbo C, Quick C. or

rent research related to systems issues in

approaches, and protective techniques. A

Microsoft C compiler.

number of case studies illustrate the issues. Contact McGraw-Hili, II W. 19th St., New York, NY 10011, phone (800) 262-

Contact M&T Books, 501 Galveston Drive, Redwood City, CA 94063, phone

emerging mathematical techniques with

(415) 336-3600.

purported potential for changing the way

4729.

manufacturing systems operate. CS Press offerings. The IEEE Com­

Fractals. Fractal Programming in C (book only, ISBN 1-55851-037-0,600 pp., $24.95; book and disk, ISBN 1-

September 1989

automation and flexible manufacturing. The control methods presented are

Contact IEEE Computer Society Press,

puter Society Press has recently pub­

Order Dept., 10662 Los Vaqueros Circle,

lished the following books:

Los Alamitos. CA 90720. phone (800)

Analyzing Computer Architertures

272-6657 (in California. (714) 821-8380). 119

Suggest Documents