4 results (0,13448 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

A Software Development Approach for Driving Competitiveness in Small Firms

A Software Development Approach for Driving Competitiveness in Small Firms

The COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However for decades managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software software flaws can also raisesecurity concerns as hackers can gain complete control of various devices and data such as mobile phones computers or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products in many cases the promised benefits of user satisfaction efficiency productivity and profitability are not realized. In more severe circumstances software development firms have failed and face the threat of going bankrupt being acquired or suffering closure because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software the book outlines how mobilizing people processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.

GBP 89.99
1

Software Development Patterns and Antipatterns

Software Development Patterns and Antipatterns

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10 000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies breach of contract lawsuits and the literature on major software failures. This section considers the factors involved with cost overruns schedule delays canceled projects poor quality and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section’s first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence as well as measures that can prove excellence to C-level executives and with continuing excellence through the maintenance cycle as well as for software development.

GBP 48.99
1

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1