|
![]() |
|||
|
||||
OverviewStarting with an overview of quality software, this text identifies potential threats associated with software developments, explains how to establish an effective risk management programme and details six critical steps involved: asset valuation, security threat identification, security and control testing, safeguard assessment, economic value analyses and reiterative procedures. It also discusses various software metrics approaches used to measure software quality. Full Product DetailsAuthor: Marian MyersonPublisher: Artech House Publishers Imprint: Artech House Publishers Dimensions: Width: 15.60cm , Height: 1.40cm , Length: 23.40cm Weight: 0.514kg ISBN: 9780890066355ISBN 10: 0890066353 Pages: 240 Publication Date: 31 October 1996 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsIndustrial Espionage: Industrial Espionage and Other Major Risks. Malicious Computer Viruses. Low Position on the CMM. Software Engineering: Software Maturity. Organizational Maturity. Software Metrics: Metrics in Risk Management. Metrics in Various Maturity Models. Metrics in Capability Maturity Model. Metrics in Orange Book. Other Metrics Approaches. Security: Risk Analysis Methodologies. Risk Management Methodologies. Process Maturity Models: Risk Analysis Methods. Risk Management Methodologies. Asset Valuations: Basic Asset Categories. Customized Asset Categories. Asset Valuations. Security Threats: Security Threat Categories. Sample Data Sheets. Security Controls and Tests: Vulnerability Examples. Security Control and Test Categories. Sample Data Sheets on Vulnerabilities. Safeguards: Two Safeguard Scenarios. Safeguards. Sample Data Sheets on Safeguards. Economic Analysis: Algorithms Mathematical Values. Savings Justification. Return on Investments. Safeguard Worksheets. Reiterative Processes: Existing Approaches. Proposed Approaches. Automated Risk Management. Issues of Reiteration Limits. Sample Data Sheets.ReviewsAuthor InformationJudy Myerson earned her M.S.E.E. in computer and information sciences from an ivy league university. She is a computer/software engineer, a technical writer and consulting editor of computer manuals, technical reports, and textbooks. She has written numerous articles on data language and processing technologies for national trade publications. Tab Content 6Author Website:Countries AvailableAll regions |