ing standards and practices that adapt well to an ... a skeletal format for writing a policy document in terms of ... presents information on security tech niques that ...
Implementing Software Engineering Practices Fletcher J. Buckley (John Wiley & Sons. New York, 1989, 172 pp., $34.95) Most software development shops have adopted development standards,
approach to introduce and explain his
plans, configuration management plans,
methodology for evolving a standardized
quality assurance plans, and the stan
generally consisting of a commercial
development process. In Chapter 2, he
dards and procedures manual. He then
project-management methodology such
provides an overview of establishing pol
devotes a chapter to each product to de
as SDM 70 and Method I. I have observed
icy and implementation guidelines.
scribe the policies, how to establish them,
that software developers find these stan
In Chapter 3, the author outlines the
and the tradeoffs involved. The author disc us ses the software de
dards cumbersome, since they generate
documents that serve as a development
overhead that reduces productivity and
framework. He introduces such notions
sign phase in Chapter 13 and identifies
restrict s creativity. In practice, adher
as grandfather clauses, escape clauses.
five sets of documents: top-level design
ence to these standards means that the
and termination clauses, and he presents
description, integration plan. test proce
software developers are using the docu
a skeletal format for writing a policy
dures, user documentation, and changes
mentation formats and meeting the pro
document in terms of what needs to be
to all previously approved documents.
cedural milestones of these methodol
done, who will do it, and who is respon
He also dis cusses the issues involved in
ogies, regardless of their a pprop riateness
sible. The author uses this skeletal format
establishing policies for these documents.
to the task at hand.
throughout thc text to formulate sample
The appendix contains a comprehen
policy statements that can be adapted by
sive bibliography of IEEE and DoD stan
P ractices succinctly examines the pro
practitioners to develop their own poli
dards and illustrations of requirement
cesses and products for engineering and
cies and standards.
specifications and design specifications.
Implementing Software Engineering
managing large software projects. The
The rest of the book provides specific
Although software engineering practi
details for (he different phases of the de
tioners are the primary audience for this
ing standards and practices that adapt
velopment life cycle. Each chapter focuses
book, it is an excellent text to support a
well to an organization ' s culture and are
on developing policies and generating pro
projects course in software development
tailored to the unique needs of the indi
cedures that put the policies into practice.
or computer information systems. It
author provides guidelines for develop
viduals in that organization. The book's
In Chapter 4, the author discusses how
should be required reading for graduate
to execute the requirement definition
students in software engineering and ap
trum of software engineering practices as
phase and identifies seven produ cts of the
plied computing programs.
they apply to the various phases of soft
phase: software requirement specifica
short chapters collectively reveal a spec
ware development. The author uses a stepwise refinement
tions, external interface specifications,
Donald R. Chand
acceptance test plans, development
Bentley College
NEW LITERATURE Security advice. In Computer and
55R51-03R-9. 600 pp., $39.95) by Roger
(ISBN 0-8136-8857-2, Order No. 857,
Communications Security: Strategies for
T. Stevens explores such fractals as the
200 pp., $31.50 members, $42 nonmem
the 1990s (ISBN 0-07�012926-6, 411
von Koch snowflake, the Gosper curve,
bers) by Jerome C. Huck and Michael J.
pp., $44.95),author James Arlin Cooper
dragon curves, and the Mandelbrot set, as
Flynn studies and compares architec
presents information on security tech
well as the software for plotting and in
tures by measuring the execution of two
niques that will be available in the next
vestigating them. The book includes over
identical sets of high-level-language pro
decade and surveys safeguards against
100 black-and-white and 32 full-color
grams. The analysis relies on observable
security threats. The author examines
fractal illustrations. The author also de
measures that reflect the effectiveness of
problems in six principal areas: physical,
scribes how to create displays of the Julia
an instruction set. Other measures include storage requirements and execution times.
personnel, regulatory. hardware, soft
set and offers C language programs to re
ware, and network security. He discusses
produce all the fractals in the book. The
software viruses and malfunctions, natu
available MS-DOS format disk contains
Manufacturing Systems (ISBN 0-8186-
ral disasters. and technological advances
the source code to reproduce over 100
that can be used to exploit security weak
fractals. The programs require an IBM
8916-1, Order No. 1916,450 pp., $55 members, S41 nonmembers) by Alan A.
Modeling and Control of Automated
nesses. He also explains hardware de
PC or compatible with EGA or VGA card,
Desrochers surveys and summarizes cur
vices, software strategies, mathematical
color monitor, and a Turbo C, Quick C. or
rent research related to systems issues in
approaches, and protective techniques. A
Microsoft C compiler.
number of case studies illustrate the issues. Contact McGraw-Hili, II W. 19th St., New York, NY 10011, phone (800) 262-
Contact M&T Books, 501 Galveston Drive, Redwood City, CA 94063, phone
emerging mathematical techniques with
(415) 336-3600.
purported potential for changing the way
4729.
manufacturing systems operate. CS Press offerings. The IEEE Com
Fractals. Fractal Programming in C (book only, ISBN 1-55851-037-0,600 pp., $24.95; book and disk, ISBN 1-
September 1989
automation and flexible manufacturing. The control methods presented are
Contact IEEE Computer Society Press,
puter Society Press has recently pub
Order Dept., 10662 Los Vaqueros Circle,
lished the following books:
Los Alamitos. CA 90720. phone (800)
Analyzing Computer Architertures
272-6657 (in California. (714) 821-8380). 119