Muutke küpsiste eelistusi

Dark Side of Software Engineering: Evil on Computing Projects [Pehme köide]

  • Formaat: Paperback / softback, 316 pages, kõrgus x laius x paksus: 234x158x18 mm, kaal: 467 g, Drawings: 0 B&W, 0 Color
  • Ilmumisaeg: 04-Feb-2011
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0470597178
  • ISBN-13: 9780470597170
  • Formaat: Paperback / softback, 316 pages, kõrgus x laius x paksus: 234x158x18 mm, kaal: 467 g, Drawings: 0 B&W, 0 Color
  • Ilmumisaeg: 04-Feb-2011
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0470597178
  • ISBN-13: 9780470597170
This is not a book about software project failure, or about prescriptive thinking about how to build software better. This is a book about the evil things that happen on computing and software projects---what the kinds of evil are, how they manifest themselves, and what the good guys can do about them.

In this timely report on vice at every level of software project management, industry experts Johann Rost and Robert Glass explore the seamy underbelly of software engineering. Based on the authors' original research and augmented by frank insights from other well-respected figures, The Dark Side of Software Engineering consists of anecdotes about occurrences of the practices, an analysis of research findings in the context of the anecdotes, and some suggestions on what to do about the dark side. Discussions draw from the software and information technology literature and from the management literature specific to these topics.

Written in a quick-reading journalistic style, The Dark Side of Software Engineering goes where other management studies fear to tread---a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.

Scandal! Corruption! Software engineering?

Industry experts Johann Rost and Robert L. Glass explore the seamy underbelly of software engineering in this timely report on and analysis of the prevalance of subversion, lying, hacking, and espionage on every level of software project management. Based on the authors' original research and augmented by frank discussion and insights from other well-respected figures, The Dark Side of Software Engineering goes where other management studies fear to tread -- a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.

Foreword ix
Linda Rising
Introduction 1(14)
I.1 What's the Dark Side?
1(14)
I.1.1 Why the Dark Side?
2(1)
I.1.2 Who Cares About the Dark Side?
3(2)
I.1.3 How Dark is the Dark Side?
5(2)
I.1.4 What Else is on the Dark Side?
7(1)
I.1.5 Ethics and the Dark Side
8(3)
I.1.6 Personal Anecdotes About the Dark Side
11(3)
Reference
14(1)
PART 1 DARK SIDE ISSUES
15(228)
Chapter 1 Subversion
17(64)
1.1 Introductory Case Studies and Anecdotes
17(7)
1.1.1 A Faculty Feedback System
18(3)
1.1.2 An Unusual Cooperative Effort
21(1)
1.1.3 Lack of Cooperation due to Self Interest
22(1)
1.1.4 An Evil Teammate
22(2)
1.1.5 Thwarting the Evil Union
24(1)
1.2 The Survey: Impact of Subversive Stakeholders On Software Projects
24(13)
1.2.1 Introduction
25(1)
1.2.2 The Survey
26(1)
1.2.3 The Survey Findings
27(7)
1.2.4 Conclusions
34(1)
1.2.5 Impact on Practice
35(1)
1.2.6 Impact on Research
35(1)
1.2.7 Limitations
35(1)
1.2.8 Challenges
36(1)
1.2.9 Acknowledgments
37(1)
1.3 Selected Responses
37(44)
1.3.1 Sample Answers to the Question: "What Were the Motivations and Goals of the Subversive Stakeholders?"
37(8)
1.3.2 Sample Answers to the Question "How Were the Subversive Attacks Discovered?"
45(4)
1.3.3 Sample Answers to the Question "How Can Projects be Defended Against Subversive Stakeholders?"
49(7)
1.4 A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings
56(24)
References
80(1)
Chapter 2 Lying
81(32)
2.1 Introductory Case Studies and Anecdotes
81(5)
2.2 Incidents of Lying: The Survey
86(9)
2.2.1 The Survey Results
87(1)
2.2.2 General Scope
87(1)
2.2.3 An Overview of the Problem
88(1)
2.2.4 Clarification of Terms
89(4)
2.2.5 Discussion
93(1)
2.2.6 Conclusions
93(1)
2.2.7 Limitations
94(1)
2.3 Qualitative Survey Responses on Lying
95(1)
2.4 What Can Be Done About Lying?
96(11)
2.5 The Questionnaire Used in the Survey
107(6)
References
112(1)
Chapter 3 Hacking
113(44)
3.1 Case Studies of Attacks and Biographies of Hackers
113(5)
3.2 Cyber Terrorism and Government-Sponsored Hacking
118(3)
3.3 The Hacker Subculture
121(11)
3.3.1 Why They Are Called "Hackers"
121(1)
3.3.2 Motivation of Hackers
121(1)
3.3.3 Hacker Slang
122(1)
3.3.4 Hacker Ethics
123(7)
3.3.5 Public Opinion about Hackers
130(2)
3.4 How a Hacker Is Identified
132(3)
3.5 Time Line of a Typical Malware Attack
135(1)
3.6 Hacker Economy: How Does a Hacker Make Money?
136(6)
3.7 Social Engineering
142(11)
3.7.1 Social Engineering Examples and Case Studies
143(8)
3.7.2 Tactics of Social Engineering
151(2)
3.8 A Lingering Question
153(1)
3.9 Late-Breaking News
154(3)
Chapter 4 Theft Of Information
157(18)
4.1 Introduction
157(1)
4.2 Case Studies
158(6)
4.2.1 Data Theft
158(3)
4.2.2 Source Code Theft
161(3)
4.3 How Do the Victims Find Out That Their Secrets Are Stolen?
164(2)
4.4 Intellectual Property Protection
166(4)
4.4.1 Trade Secret Protection
167(2)
4.4.2 Copyright Protection
169(1)
4.4.3 Patent Protection
169(1)
4.4.4 Steganography
170(1)
4.5 Open Versus Closed Source
170(5)
Chapter 5 Espionage
175(14)
5.1 Introduction
175(1)
5.2 What Is Espionage?
176(1)
5.3 Case Studies
177(8)
5.3.1 Sweden Versus Russia
178(1)
5.3.2 Shekhar Verma
178(1)
5.3.3 Lineage III
179(1)
5.3.4 GM versus VW: Jose Ignacio Lopez
179(1)
5.3.5 British Midland Tools
179(1)
5.3.6 Solid Oak Software
180(1)
5.3.7 Proctor & Gamble versus Unilever
181(1)
5.3.8 News Corp Versus Vivendi
181(1)
5.3.9 Spying Was A TI Chip Really Stolen by a French Spy?
181(2)
5.3.10 Conficker
183(2)
5.4 Cyber Warfare
185(4)
Reference
187(2)
Chapter 6 Disgruntled Employees And Sabotage
189(24)
6.1 Introduction and Background
189(3)
6.2 Disgruntled Employee Data Issues
192(7)
6.2.1 Data Tampering
192(2)
6.2.2 Data Destruction
194(2)
6.2.3 Data Made Public
196(3)
6.2.4 Theft Via Data
199(1)
6.3 Disgruntled Employee Software Issues
199(1)
6.3.1 Software Destruction
199(1)
6.4 Disgruntled Employee System Issues
200(6)
6.5 What to Do About Disgruntled Employee Acts
203(3)
6.6 Sabotage+
206(7)
References
212(1)
Chapter 7 Whistle-Blowing
213(30)
7.1 A Hypothetical Scenario
215(2)
7.2 Whistle-Blowing and Software Engineering
217(3)
7.3 More Case Studies and Anecdotes
220(23)
7.3.1 Jeffrey Wigand and Brown and Williamson Tobacco
220(1)
7.3.2 A Longitudinal Study of Whistle-Blowing
221(1)
7.3.3 An Even More Pessimistic View
222(1)
7.3.4 Academic Whistle-Blowing
223(1)
7.3.5 The Sum Total of Whistle-Blowing
224(1)
References
225(2)
Appendix To
Chapter 7 PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING
227(13)
References
240(3)
PART 2 VIEWPOINTS ON DARK SIDE ISSUES
243(56)
Introduction
243(2)
Chapter 8 Opinions, Predictions, And Beliefs
245(24)
8.1 Automated Crime
246(12)
Donn B. Parker
Information Sources
257(1)
8.2 Let's Play Make Believe
258(3)
Karl E. Wiegers
Reference
260(1)
8.3 Dark, Light, or Just Another Shade of Grey?
261(3)
Les Hatton
8.4 Rational Software Developers as Pathological Code Hackers
264(5)
Norman Fenton
Chapter 9 Personal Anecdotes
269(30)
9.1 An Officer and a Gentleman Confronts the Dark Side
270(3)
Grady Booch
9.2 Less Carrot and More Stick
273(3)
June Verner
References
275(1)
9.3 "Them and Us": Dispatches from the Virtual Software Team Trenches
276(5)
Valentine Casey
9.4 What is it to Lie on a Software Project?
281(3)
Robert N. Britcher
9.5 "Merciless Control Instrument" and the Mysterious Missing Fax
284(5)
A. H. (anonymous)
9.6 Forest of Arden
289(3)
David Alan Grier
9.7 Hard-Headed Hardware Hit Man
292(2)
Will Tracz
9.8 A Lighthearted Anecdote
294(5)
Eugene Farmer
Conclusions 299(4)
Index 303
Johann Rost has worked in the software industry for twenty years. He has taught at the University of Applied Science at Bingen, Germany, and at Politehnica University at Bucharest, Romania. Robert L. Glass is the author of twenty-eight books on computing subjects, including the bestselling Facts and Fallacies of Software Engineering. He has written nearly one hundred articles on computing subjects and has served as a columnist for three leading publicationsCommunications of the ACM ("The Practical Programmer"), IEEE Software ("The Loyal Opposition"), and Information Systems Management ("Through a Glass, Darkly").