Software Engineering Handbook - J. Keyes (Auerbach, 2005) WW.pdf

(6255 KB) Pobierz
433368450 UNPDF
433368450.001.png
Software
Engineering
Handbook
OTHER AUERBACH PUBLICATIONS
The ABCs of IP Addressing
Gilbert Held
ISBN: 0-8493-1144-6
The ABCs of TCP/IP
Gilbert Held
ISBN: 0-8493-1463-1
Building an Information Security
Awareness Program
Mark B. Desman
ISBN: 0-8493-0116-5
Building a Wireless Office
Gilbert Held
ISBN: 0-8493-1271-X
The Complete Book of Middleware
Judith Myerson
ISBN: 0-8493-1272-8
Computer Telephony Integration,
2nd Edition
William A. Yarberry, Jr.
ISBN: 0-8493-1438-0
Cyber Crime Investigators Field Guide
Bruce Middleton
ISBN: 0-8493-1192-6
Cyber Forensics: A Field Manual for
Collecting, Examining, and Preserving
Evidence of Computer Crimes
Albert J. Marcella and Robert S. Greenfield,
Editors
ISBN: 0-8493-0955-7
Global Information Warfare:
How Businesses, Governments, and
Others Achieve Objectives and Attain
Competitive Advantages
Andy Jones, Gerald L. Kovacich,
and Perry G. Luzwick
ISBN: 0-8493-1114-4
Information Security Architecture
Jan Killmeyer Tudor
ISBN: 0-8493-9988-2
Information Security Management
Handbook, 4th Edition, Volume 1
Harold F. Tipton and Micki Krause, Editors
ISBN: 0-8493-9829-0
Information Security Management
Handbook, 4th Edition, Volume 2
Harold F. Tipton and Micki Krause, Editors
ISBN: 0-8493-0800-3
Information Security Management
Handbook, 4th Edition, Volume 3
Harold F. Tipton and Micki Krause, Editors
ISBN: 0-8493-1127-6
Information Security Management
Handbook, 4th Edition, Volume 4
Harold F. Tipton and Micki Krause, Editors
ISBN: 0-8493-1518-2
Information Security Policies,
Procedures, and Standards:
Guidelines for Effective Information
Security Management
Thomas R. Peltier
ISBN: 0-8493-1137-3
Information Security Risk Analysis
Thomas R. Peltier
ISBN: 0-8493-0880-1
A Practical Guide to Security Engineering
and Information Assurance
Debra Herrmann
ISBN: 0-8493-1163-2
The Privacy Papers:
Managing Technology and Consumers,
Employee, and Legislative Action
Rebecca Herold
ISBN: 0-8493-1248-5
Secure Internet Practices:
Best Practices for Securing Systems in
the Internet and eBusiness Age
Patrick McBride, Jody Patilla,
Craig Robinson, Peter Thermos,
and Edward P. Moser
ISBN: 0-8493-1239-6
Securing and Controlling Cisco Routers
Peter T. Davis
ISBN: 0-8493-1290-6
Securing EBusiness Applications and
Communications
Jonathan S. Held and John R. Bowers
ISBN: 0-8493-0963-8
Securing Windows NT/2000:
From Policies to Firewalls
Michael A. Simonyi
ISBN: 0-8493-1261-2
Six Sigma Software Development
Christine B. Tayntor
ISBN: 0-8493-1193-4
A Technical Guide to IPSec Virtual Private
Networks
James S. Tiller
ISBN: 0-8493-0876-3
Telecommunications Cost Management
Brian DiMarsico, Thomas Phelps IV,
and William A. Yarberry, Jr.
ISBN: 0-8493-1101-2
AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: orders@crcpress.com
433368450.002.png
Engineering
Handbook
Jessica Keyes
AUERBACH PUBLICATIONS
A CRC Press Company
Boca Raton London New York Washington, D.C.
Software
433368450.003.png
This edition published in the Taylor & Francis eLibrary, 2005.
“To purchase your own copy of this or any of Taylor & Francis or Routledge’s
collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.”
/LEUDU\RI&RQJUHVV&DWDORJLQJLQ3XEOLFDWLRQ'DWD
.H\HV-HVVLFD
6RIWZDUHHQJLQHHULQJKDQGERRNE\-HVVLFD.H\HV
SFP
,QFOXGHVELEOLRJUDSKLFDOUHIHUHQFHVDQGLQGH[
,6%1
6RIWZDUHHQJLQHHULQJ³+DQGERRNVPDQXDOVHWF,7LWOH
4$.
³GF
7KLVERRNFRQWDLQVLQIRUPDWLRQREWDLQHGIURPDXWKHQWLFDQGKLJKO\UHJDUGHGVRXUFHV5HSULQWHGPDWHULDO
LVTXRWHGZLWKSHUPLVVLRQDQGVRXUFHVDUHLQGLFDWHG$ZLGHYDULHW\RIUHIHUHQFHVDUHOLVWHG5HDVRQDEOH
HIIRUWVKDYHEHHQPDGHWRSXEOLVKUHOLDEOHGDWDDQGLQIRUPDWLRQEXWWKHDXWKRUVDQGWKHSXEOLVKHUFDQQRW
DVVXPHUHVSRQVLELOLW\IRUWKHYDOLGLW\RIDOOPDWHULDOVRUIRUWKHFRQVHTXHQFHVRIWKHLUXVH
1HLWKHUWKLVERRNQRUDQ\SDUWPD\EHUHSURGXFHGRUWUDQVPLWWHGLQDQ\IRUPRUE\DQ\PHDQVHOHFWURQLF
RUPHFKDQLFDOLQFOXGLQJSKRWRFRS\LQJPLFURÀOPLQJDQGUHFRUGLQJRUE\DQ\LQIRUPDWLRQVWRUDJHRU
UHWULHYDOV\VWHPZLWKRXWSULRUSHUPLVVLRQLQZULWLQJIURPWKHSXEOLVKHU
7KHFRQVHQWRI&5&3UHVV//&GRHVQRWH[WHQGWRFRS\LQJIRUJHQHUDOGLVWULEXWLRQIRUSURPRWLRQIRU
FUHDWLQJQHZZRUNVRUIRUUHVDOH6SHFLÀFSHUPLVVLRQPXVWEHREWDLQHGLQZULWLQJIURP&5&3UHVV//&
IRUVXFKFRS\LQJ
'LUHFWDOOLQTXLULHVWR&5&3UHVV//&1:&RUSRUDWH%OYG%RFD5DWRQ)ORULGD
3URGXFWRUFRUSRUDWHQDPHVPD\EHWUDGHPDUNVRUUHJLVWHUHGWUDGHPDUNVDQGDUH
XVHGRQO\IRULGHQWLÀFDWLRQDQGH[SODQDWLRQZLWKRXWLQWHQWWRLQIULQJH
9LVLWWKH$XHUEDFK3XEOLFDWLRQV:HEVLWHDWZZZDXHUEDFKSXEOLFDWLRQVFRP
E\&5&3UHVV//&
$XHUEDFKLVDQLPSULQWRI&5&3UHVV//&
1RFODLPWRRULJLQDO86*RYHUQPHQWZRUNV
,QWHUQDWLRQDO6WDQGDUG%RRN1XPEHU
/LEUDU\RI&RQJUHVV&DUG1XPEHU
ISBN 0-203-97278-3 Master ebook ISBN
7UDGHPDUN1RWLFH
433368450.004.png
Zgłoś jeśli naruszono regulamin