Software Engineering

by
Edition: 9th
Format: Hardcover
Pub. Date: 2011-01-01
Publisher(s): Addison Wesley
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $137.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

SOMMERVILLESoftware Engineering 8 The eighth edition of the best-selling introduction to software engineering is now updated with three new chapters on state-of-the-art topics. New chapters in the 8th edition Oslash; Security engineering, showing youhow you can design software to resist attacks and recover from damage;Oslash; Service-oriented software engineering, explaininghow reusable web services can be used to develop new applications;Oslash; Aspect-oriented software development, introducing new techniques based on the separation of concerns. Key features Oslash; Includes the latest developments in software engineering theory and practice, integrated with relevant aspects of systems engineering.Oslash; Extensive coverage ofagile methods andreuse.Oslash; Integrated coverage of system safety, security and reliability illustrating best practice in developing critical systems.Oslash; Two running case studies (an information system and a control system) illuminate different stages of thesoftware lifecycle. Online resources Visit www.pearsoned.co.uk/sommerville to access a full range of resources for students and instructors. In addition, a rich collection of resources including links to other web sites, teaching material on related courses and additional chapters is available at http://www.software-engin.com . IAN SOMMERVILLE is Professor of Software Engineering at the University of St. Andrews in Scotland.

Table of Contents

Preface v
Part 1 Overview
1(114)
Introduction
3(17)
FAQs about software engineering
5(9)
Professional and ethical responsibility
14(6)
Key Points
17(1)
Further Reading
18(1)
Exercises
18(2)
Socio-technical systems
20(23)
Emergent system properties
23(2)
Systems engineering
25(9)
Organisations, people and computer systems
34(4)
Legacy systems
38(5)
Key Points
40(1)
Further Reading
41(1)
Exercises
41(2)
Critical systems
43(20)
A simple safety-critical system
46(1)
System dependability
47(4)
Availability and reliability
51(4)
Safety
55(3)
Security
58(5)
Key Points
60(1)
Further Reading
61(1)
Exercises
61(2)
Software processes
63(29)
Software process models
65(6)
Process iteration
71(3)
Process activities
74(8)
The Rational Unified Process
82(3)
Computer-Aided Software Engineering
85(7)
Key Points
89(1)
Further Reading
90(1)
Exercises
91(1)
Project management
92(23)
Management activities
94(2)
Project planning
96(3)
Project scheduling
99(5)
Risk management
104(11)
Key Points
111(1)
Further Reading
112(1)
Exercises
112(3)
Part 2 Requirements
115(124)
Software requirements
117(25)
Functional and non-functional requirements
119(8)
User requirements
127(2)
System requirements
129(6)
Interface specification
135(1)
The software requirements document
136(6)
Key Points
140(1)
Further Reading
140(1)
Exercises
141(1)
Requirements engineering processes
142(27)
Feasibility studies
144(2)
Requirements elicitation and analysis
146(12)
Requirements validation
158(3)
Requirements management
161(8)
Key Points
166(1)
Further Reading
167(1)
Exercises
167(2)
System models
169(24)
Context models
171(2)
Behavioural models
173(4)
Data models
177(4)
Object models
181(6)
Structured methods
187(6)
Key Points
190(1)
Further Reading
191(1)
Exercises
191(2)
Critical systems specification
193(24)
Risk-driven specification
195(7)
Safety specification
202(2)
Security specification
204(3)
Software reliability specification
207(10)
Key Points
213(1)
Further Reading
214(1)
Exercises
214(3)
Formal specification
217(22)
Formal specification in the software process
219(3)
Sub-system interface specification
222(7)
Behavioural specification
229(10)
Key Points
236(1)
Further Reading
236(1)
Exercises
237(2)
Design
239(150)
Architectural design
241(25)
Architectural design decisions
245(2)
System organisation
247(5)
Modular decomposition styles
252(4)
Control styles
256(4)
Reference architectures
260(6)
Key Points
263(1)
Further Reading
264(1)
Exercises
264(2)
Distributed systems architectures
266(26)
Multiprocessor architectures
269(1)
Client-server architectures
270(5)
Distributed object architectures
275(7)
Inter-organisational distributed computing
282(10)
Key Points
289(1)
Further Reading
290(1)
Exercises
290(2)
Application architectures
292(21)
Data processing systems
295(3)
Transaction processing systems
298(6)
Event processing systems
304(3)
Language processing systems
307(6)
Key Points
310(1)
Further Reading
310(1)
Exercises
311(2)
Object-oriented design
313(26)
Objects and object classes
316(4)
An object-oriented design process
320(15)
Design evolution
335(4)
Key Points
336(1)
Further Reading
337(1)
Exercises
337(2)
Real-time software design
339(23)
System design
342(4)
Real-time operating systems
346(3)
Monitoring and control systems
349(6)
Data acquisition systems
355(7)
Key Points
357(2)
Further Reading
359(1)
Exercises
359(3)
User interface design
362(27)
Design issues
366(10)
The UI design process
376(2)
User analysis
378(3)
User interface prototyping
381(2)
Interface evaluation
383(6)
Key Points
385(1)
Further Reading
386(1)
Exercises
386(3)
Part 4 Development
389(124)
Rapid software development
391(24)
Agile methods
396(2)
Extreme programming
398(7)
Rapid application development
405(4)
Software prototyping
409(6)
Key Points
412(1)
Further Reading
413(1)
Exercises
414(1)
Software reuse
415(24)
The reuse landscape
418(3)
Design patterns
421(2)
Generator-based reuse
423(3)
Application frameworks
426(2)
Application system reuse
428(11)
Key Points
437(1)
Further Reading
437(1)
Exercises
438(1)
Component-based software engineering
439(23)
Components and component models
442(8)
The CBSE process
450(2)
Component composition
452(10)
Key Points
460(1)
Further Reading
460(1)
Exercises
461(1)
Critical systems development
462(26)
Dependable processes
466(1)
Dependable programming
467(8)
Fault tolerance
475(7)
Fault-tolerant architectures
482(6)
Key Points
486(1)
Further Reading
486(1)
Exercises
487(1)
Software evolution
488(25)
Program evolution dynamics
490(2)
Software maintenance
492(6)
Evolution processes
498(6)
Legacy system evolution
504(9)
Key Points
509(1)
Further Reading
510(1)
Exercises
510(3)
Part 5 Verification and Validation
513(76)
Verification and validation
515(22)
Planning verification and validation
519(2)
Software inspections
521(6)
Automated static analysis
527(3)
Verification and formal methods
530(7)
Key Points
535(1)
Further Reading
535(1)
Exercises
536(1)
Software testing
537(29)
System testing
540(7)
Component testing
547(4)
Test case design
551(10)
Test automation
561(5)
Key Points
563(1)
Further Reading
564(1)
Exercises
565(1)
Critical systems validation
566(23)
Reliability validation
568(6)
Safety assurance
574(7)
Security assessment
581(2)
Safety and dependability cases
583(6)
Key Points
586(1)
Further Reading
587(1)
Exercises
587(2)
Management
589(126)
Managing people
591(21)
Selecting staff
593(3)
Motivating people
596(3)
Managing groups
599(8)
The People Capability Maturity Model
607(5)
Key Points
610(1)
Further Reading
610(1)
Exercises
611(1)
Software cost estimation
612(29)
Software productivity
614(6)
Estimation techniques
620(3)
Algorithmic cost modelling
623(14)
Project duration and staffing
637(4)
Key Points
638(1)
Further Reading
639(1)
Exercises
639(2)
Quality management
641(24)
Process and product quality
644(1)
Quality assurance and standards
645(7)
Quality planning
652(1)
Quality control
653(2)
Software measurement and metrics
655(10)
Key Points
663(1)
Further Reading
663(1)
Exercises
664(1)
Process improvement
665(24)
Process and product quality
667(2)
Process classification
669(3)
Process measurement
672(1)
Process analysis and modelling
673(5)
Process change
678(2)
The CMMI process improvement framework
680(9)
Key Points
687(1)
Further Reading
687(1)
Exercises
688(1)
Configuration management
689(26)
Configuration management planning
692(3)
Change management
695(3)
Version and release management
698(7)
System building
705(1)
CASE tools for configuration management
706(9)
Key Points
711(1)
Further Reading
711(1)
Exercises
712(3)
Emerging Technologies
715(79)
Security engineering
717(26)
Security concepts
720(2)
Security risk management
722(5)
Design for security
727(10)
System survivability
737(6)
Key Points
741(1)
Further Reading
742(1)
Exercises
742(1)
Service-oriented software engineering
743(27)
Services as reusable components
747(4)
Service engineering
751(9)
Software development with services
760(10)
Key Points
768(1)
Further Reading
768(1)
Exercises
769(1)
Aspect-oriented software development
770(24)
The separation of concerns
772(4)
Aspects, join points and pointcuts
776(4)
Software engineering with aspects
780(14)
Key Points
792(1)
Further Reading
792(1)
Exercises
793(1)
Glossary 794(12)
References 806(18)
Index 824

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.