000 | 05716cam a2200637Ii 4500 | ||
---|---|---|---|
001 | sulb-eb0030752 | ||
003 | BD-SySUS | ||
005 | 20170713221235.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110210t20112011cau ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dDG1 _dOCLCQ _dIEEEE _dAU@ _dOCLCO _dDEBSZ _dOCLCA _dFTU _dCDN _dYDXCP _dCOO _dDEBBG _dBD-SySUS |
||
019 | _a802316221 | ||
020 |
_a9780470909959 _q(electronic bk.) |
||
020 |
_a0470909951 _q(electronic bk.) |
||
020 |
_a9780470909942 _q(electronic bk.) |
||
020 |
_a0470909943 _q(electronic bk.) |
||
020 |
_a9780470922873 _q(electronic bk.) |
||
020 |
_a0470922877 _q(electronic bk.) |
||
020 |
_z9780470922872 _q(electronic bk.) |
||
020 |
_z9780470597170 _q(print) |
||
020 |
_z0470597178 _q(print) |
||
024 | 7 |
_a10.1002/9780470909959 _2doi |
|
029 | 1 |
_aAU@ _b000049641604 |
|
029 | 1 |
_aDEBSZ _b400042533 |
|
029 | 1 |
_aNZ1 _b15915651 |
|
029 | 1 |
_aGBVCP _b790198231 |
|
029 | 1 |
_aDEBBG _bBV043392760 |
|
035 |
_a(OCoLC)701311761 _z(OCoLC)802316221 |
||
037 |
_a10.1002/9780470909959 _bWiley InterScience _nhttp://www3.interscience.wiley.com |
||
050 | 4 |
_aQA76.758 _b.R67 2011 |
|
082 | 0 | 4 |
_a174.90051 _222 |
049 | _aMAIN | ||
100 | 1 |
_aRost, Johann. _eauthor. |
|
245 | 1 | 4 |
_aThe dark side of software engineering : _bevil on computing projects / _cJohann Rost and Robert L. Glass. |
264 | 1 |
_aLos Alamitos, CA : _bIEEE Computer Society ; _aHoboken, New Jersey : _bJohn Wiley & Sons, Inc., _c[2011] |
|
264 | 4 | _c©2011 | |
300 | _a1 online resource (x, 305 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | 0 |
_tFOREWORD / _rLinda Rising -- _tINTRODUCTION. _gI.1. _tWhat's the Dark Side? -- _gPART 1. _tDARK SIDE ISSUES -- _gCHAPTER 1. _tSUBVERSION. _g1.1. _tIntroductory Case Studies and Anecdotes. _g1.2. _tThe Survey: Impact of Subversive Stakeholders On Software Projects. _g1.3. _tSelected Responses 37. _g1.4. _tA Follow-Up to the Survey: Some Hypotheses and Related Survey Findings -- _gCHAPTER 2. _tLYING. _g2.1. _tIntroductory Case Studies and Anecdotes. _g2.2. _tIncidents of Lying: The Survey. _g2.3. _tQualitative Survey Responses on Lying. _g2.4. _tWhat Can Be Done About Lying?. _g2.5. _tThe Questionnaire Used in the Survey -- _gCHAPTER 3. _tHACKING. _g3.1. _tCase Studies of Attacks and Biographies of Hackers. _g3.2. _tCyber Terrorism and Government-Sponsored Hacking. _g3.3. _tThe Hacker Subculture. _g3.4. _tHow a Hacker Is Identified. _g3.5. _tTime Line of a Typical Malware Attack. _g3.6. _tHacker Economy: How Does a Hacker Make Money?. _g3.7. _tSocial Engineering. _g3.8. _tA Lingering Question. _g3.9. _tLate-Breaking News -- _gCHAPTER 4. _tTHEFT OF INFORMATION. _g4.1. _tIntroduction. _g4.2. _tCase Studies. _g4.3. _tHow Do the Victims Find Out That Their Secrets Are Stolen?. _g4.4. _tIntellectual Property Protection. _g4.5. _tOpen Versus Closed Source -- _gCHAPTER 5. _tESPIONAGE. _g5.1. _tIntroduction. _g5.2. _tWhat Is Espionage?. _g5.3. _tCase Studies. _g5.4. _tCyber Warfare -- _gCHAPTER 6. _tDISGRUNTLED EMPLOYEES AND SABOTAGE. _g6.1. _tIntroduction and Background. _g6.2. _tDisgruntled Employee Data Issues. _g6.3. _tDisgruntled Employee Software Issues. _g6.4. _tDisgruntled Employee System Issues. _g6.5. _tWhat to Do About Disgruntled Employee Acts. _g6.6. _tSabotage -- _gCHAPTER 7. _tWHISTLE-BLOWING. _g7.1. _tA Hypothetical Scenario. _g7.2. _tWhistle-Blowing and Software Engineering. _g7.3. _tMore Case Studies and Anecdotes. _gAPPENDIX TO CHAPTER 7. _tPRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING -- _gPART 2. _tVIEWPOINTS ON DARK SIDE ISSUES -- _tIntroduction -- _gCHAPTER 8. _tOPINIONS, PREDICTIONS, AND BELIEFS. _g8.1. _tAutomated Crime 246 Donn B. Parker Information Sources. _g8.2. _tLet's Play Make Believe / _rKarl E. Wiegers. _g8.3. _tDark, Light, or Just Another Shade of Grey? / _rLes Hatton. _g8.4. _tRational Software Developers as Pathological Code Hackers / _rNorman Fenton -- _gCHAPTER 9. _tPERSONAL ANECDOTES. _g9.1. _tAn Officer and a Gentleman Confronts the Dark Side / _rGrady Booch. _g9.2. _tLess Carrot and More Stick / _rJune Verner. _g9.3. _t"Them and Us": Dispatches from the Virtual Software Team Trenches / _rValentine Casey. _g9.4. _tWhat is it to Lie on a Software Project? / _rRobert N. Britcher. _g9.5. _t"Merciless Control Instrument" and the Mysterious Missing Fax / _rA. H. (anonymous). _g9.6. _tForest of Arden / _rDavid Alan Grier. _g9.7. _tHard-Headed Hardware Hit Man / _rWill Tracz. _g9.8. _tA Lighthearted Anecdote / _rEugene Farmer -- _tCONCLUSIONS. |
588 | 0 | _aOnline resource and print version record. | |
520 | 8 | _aIn the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes is increasing. Based on substantive research, this is an exposé on the prevalence of subversion, lying, hacking and espionage on every level of the management of software projects. | |
650 | 0 |
_aSoftware engineering _xMoral and ethical aspects. |
|
650 | 0 |
_aComputer software industry _xMoral and ethical aspects. |
|
650 | 7 |
_aSoftware engineering _2fast _0(OCoLC)fst01124185 |
|
650 | 7 |
_aComputer software industry _2fast _0(OCoLC)fst00872606 |
|
650 | 7 |
_aEthics _2fast _0(OCoLC)fst00915833 |
|
700 | 1 |
_aGlass, Robert L., _d1932- _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aRost, Johann. _tDark side of software engineering. _dHoboken, N.J. : John Wiley & Sons [for] IEEE Computer Society, 2011 _z9780470597170 _w(OCoLC)664324106 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9780470909959 _zWiley Online Library [Free Download only for SUST IP] |
938 |
_aYBP Library Services _bYANK _n12667909 |
||
994 |
_a92 _bDG1 |
||
999 |
_c62404 _d62404 |