Advances in Computers: Highly Dependable Software Volume 58 Contributor(s): Zelkowitz, Marvin (Editor) |
|||
ISBN: 0120121581 ISBN-13: 9780120121588 Publisher: Academic Press
Binding Type: Hardcover - See All Available Formats & Editions Published: August 2003 Annotation: Since 1960, Advances in Computers has chronicled the constantly shifting theories and methods of Information Technology which greatly shapes our lives today. "Highly Dependable Software" is the 58th volume in this Series. The seven chapters describe various approaches towards dependability: software development measurability, transformation oriented programming, Bounded Model Checking, GUI testing, history and lessons from software inspections, impact and problems related to errors in software, the evolution of the various security policies. This book would be an invaluable addition to any university course in computer technology, and an excellent reference tool for industrial practitioners. * Includes in-depth surveys and tutorials on advances in Computer Technology.* Features the work of well-known authors and researchers in the field.* Provides a broad overview of important developments.* Contains extensive bibliographies. |
Additional Information |
BISAC Categories: - Computers | Computer Science - Computers | Programming - General - Computers | Software Development & Engineering - General |
Dewey: 004.05 |
Physical Information: 0.98" H x 5.9" W x 9.48" L (1.67 lbs) 392 pages |
Descriptions, Reviews, Etc. |
Publisher Description: Since 1960, Advances in Computers has chronicled the constantly shifting theories and methods of Information Technology which greatly shapes our lives today. Highly Dependable Software is the 58th volume in this Series. The seven chapters describe various approaches towards dependability: software development measurability, transformation oriented programming, Bounded Model Checking, GUI testing, history and lessons from software inspections, impact and problems related to errors in software, the evolution of the various security policies. This book would be an invaluable addition to any university course in computer technology, and an excellent reference tool for industrial practitioners. |
Customer ReviewsSubmit your own review |
To tell a friend about this book, you must Sign In First! |