000 05716cam a2200637Ii 4500
001 sulb-eb0030752
003 BD-SySUS
005 20170713221235.0
006 m o d
007 cr cn|||||||||
008 110210t20112011cau ob 001 0 eng d
040 _aDG1
_beng
_erda
_epn
_cDG1
_dDG1
_dOCLCQ
_dIEEEE
_dAU@
_dOCLCO
_dDEBSZ
_dOCLCA
_dFTU
_dCDN
_dYDXCP
_dCOO
_dDEBBG
_dBD-SySUS
019 _a802316221
020 _a9780470909959
_q(electronic bk.)
020 _a0470909951
_q(electronic bk.)
020 _a9780470909942
_q(electronic bk.)
020 _a0470909943
_q(electronic bk.)
020 _a9780470922873
_q(electronic bk.)
020 _a0470922877
_q(electronic bk.)
020 _z9780470922872
_q(electronic bk.)
020 _z9780470597170
_q(print)
020 _z0470597178
_q(print)
024 7 _a10.1002/9780470909959
_2doi
029 1 _aAU@
_b000049641604
029 1 _aDEBSZ
_b400042533
029 1 _aNZ1
_b15915651
029 1 _aGBVCP
_b790198231
029 1 _aDEBBG
_bBV043392760
035 _a(OCoLC)701311761
_z(OCoLC)802316221
037 _a10.1002/9780470909959
_bWiley InterScience
_nhttp://www3.interscience.wiley.com
050 4 _aQA76.758
_b.R67 2011
082 0 4 _a174.90051
_222
049 _aMAIN
100 1 _aRost, Johann.
_eauthor.
245 1 4 _aThe dark side of software engineering :
_bevil on computing projects /
_cJohann Rost and Robert L. Glass.
264 1 _aLos Alamitos, CA :
_bIEEE Computer Society ;
_aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_c[2011]
264 4 _c©2011
300 _a1 online resource (x, 305 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 0 _tFOREWORD /
_rLinda Rising --
_tINTRODUCTION.
_gI.1.
_tWhat's the Dark Side? --
_gPART 1.
_tDARK SIDE ISSUES --
_gCHAPTER 1.
_tSUBVERSION.
_g1.1.
_tIntroductory Case Studies and Anecdotes.
_g1.2.
_tThe Survey: Impact of Subversive Stakeholders On Software Projects.
_g1.3.
_tSelected Responses 37.
_g1.4.
_tA Follow-Up to the Survey: Some Hypotheses and Related Survey Findings --
_gCHAPTER 2.
_tLYING.
_g2.1.
_tIntroductory Case Studies and Anecdotes.
_g2.2.
_tIncidents of Lying: The Survey.
_g2.3.
_tQualitative Survey Responses on Lying.
_g2.4.
_tWhat Can Be Done About Lying?.
_g2.5.
_tThe Questionnaire Used in the Survey --
_gCHAPTER 3.
_tHACKING.
_g3.1.
_tCase Studies of Attacks and Biographies of Hackers.
_g3.2.
_tCyber Terrorism and Government-Sponsored Hacking.
_g3.3.
_tThe Hacker Subculture.
_g3.4.
_tHow a Hacker Is Identified.
_g3.5.
_tTime Line of a Typical Malware Attack.
_g3.6.
_tHacker Economy: How Does a Hacker Make Money?.
_g3.7.
_tSocial Engineering.
_g3.8.
_tA Lingering Question.
_g3.9.
_tLate-Breaking News --
_gCHAPTER 4.
_tTHEFT OF INFORMATION.
_g4.1.
_tIntroduction.
_g4.2.
_tCase Studies.
_g4.3.
_tHow Do the Victims Find Out That Their Secrets Are Stolen?.
_g4.4.
_tIntellectual Property Protection.
_g4.5.
_tOpen Versus Closed Source --
_gCHAPTER 5.
_tESPIONAGE.
_g5.1.
_tIntroduction.
_g5.2.
_tWhat Is Espionage?.
_g5.3.
_tCase Studies.
_g5.4.
_tCyber Warfare --
_gCHAPTER 6.
_tDISGRUNTLED EMPLOYEES AND SABOTAGE.
_g6.1.
_tIntroduction and Background.
_g6.2.
_tDisgruntled Employee Data Issues.
_g6.3.
_tDisgruntled Employee Software Issues.
_g6.4.
_tDisgruntled Employee System Issues.
_g6.5.
_tWhat to Do About Disgruntled Employee Acts.
_g6.6.
_tSabotage --
_gCHAPTER 7.
_tWHISTLE-BLOWING.
_g7.1.
_tA Hypothetical Scenario.
_g7.2.
_tWhistle-Blowing and Software Engineering.
_g7.3.
_tMore Case Studies and Anecdotes.
_gAPPENDIX TO CHAPTER 7.
_tPRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING --
_gPART 2.
_tVIEWPOINTS ON DARK SIDE ISSUES --
_tIntroduction --
_gCHAPTER 8.
_tOPINIONS, PREDICTIONS, AND BELIEFS.
_g8.1.
_tAutomated Crime 246 Donn B. Parker Information Sources.
_g8.2.
_tLet's Play Make Believe /
_rKarl E. Wiegers.
_g8.3.
_tDark, Light, or Just Another Shade of Grey? /
_rLes Hatton.
_g8.4.
_tRational Software Developers as Pathological Code Hackers /
_rNorman Fenton --
_gCHAPTER 9.
_tPERSONAL ANECDOTES.
_g9.1.
_tAn Officer and a Gentleman Confronts the Dark Side /
_rGrady Booch.
_g9.2.
_tLess Carrot and More Stick /
_rJune Verner.
_g9.3.
_t"Them and Us": Dispatches from the Virtual Software Team Trenches /
_rValentine Casey.
_g9.4.
_tWhat is it to Lie on a Software Project? /
_rRobert N. Britcher.
_g9.5.
_t"Merciless Control Instrument" and the Mysterious Missing Fax /
_rA. H. (anonymous).
_g9.6.
_tForest of Arden /
_rDavid Alan Grier.
_g9.7.
_tHard-Headed Hardware Hit Man /
_rWill Tracz.
_g9.8.
_tA Lighthearted Anecdote /
_rEugene Farmer --
_tCONCLUSIONS.
588 0 _aOnline resource and print version record.
520 8 _aIn the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes is increasing. Based on substantive research, this is an exposé on the prevalence of subversion, lying, hacking and espionage on every level of the management of software projects.
650 0 _aSoftware engineering
_xMoral and ethical aspects.
650 0 _aComputer software industry
_xMoral and ethical aspects.
650 7 _aSoftware engineering
_2fast
_0(OCoLC)fst01124185
650 7 _aComputer software industry
_2fast
_0(OCoLC)fst00872606
650 7 _aEthics
_2fast
_0(OCoLC)fst00915833
700 1 _aGlass, Robert L.,
_d1932-
_eauthor.
776 0 8 _iPrint version:
_aRost, Johann.
_tDark side of software engineering.
_dHoboken, N.J. : John Wiley & Sons [for] IEEE Computer Society, 2011
_z9780470597170
_w(OCoLC)664324106
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9780470909959
_zWiley Online Library [Free Download only for SUST IP]
938 _aYBP Library Services
_bYANK
_n12667909
994 _a92
_bDG1
999 _c62404
_d62404