Software Reuse: A Standards-based Guide
This book provides specific instructions for implementing reuse within the context of the IEEE Software Reuse Process Standard 1517 as well as the IEEE/EIA Standard 12207 - Standard for Information Technology Software Life Cycle Processes. This new guide aids the reader in interpreting the meaning of the standard, implementing the standard, and applying the standard. Like IEEE Std. 1517, this book is written for both managers and technical personnel involved in acquiring, supplying, or developing software applications and systems or reusable assets.
She served as chairperson of the Reuse Process Working Group of the IEEE Software Engineering Standards Committee which wrote IEEE Std. 1517 Reuse Processes.
Dr. McClure received a B.A. in Mathematics from Loyola University and an M.S. and Ph.D. in Computer Science from Illinois Institute of Technology. She is a professor at the Illinois Institute of Technology and the Kellog Graduate School of Management at Northwestern University. She also served as an ACM National Lecturer. E-Mail: 7373302037@Compuserve.com.
Table of Contents
PART 1. OVERVIEW.
Chapter 1. Introduction to IEEE Std. 1517--Software Reuse Processes.
Chapter 2. ISO/IEC & IEEE/EIA Standard 12207--Standard for Information Technology--Software Life Cycle Processes.
Chapter 3. Organization of IEEE Std. 1517.
PART 2. INTERPRETATION AND IMPLEMENTATION.
Chapter 4. IEEE Std. 1517 Primary Processes: Adding Reuse to Software Development, Operation, and Maintenance.
Chapter 5. Asset Management Process.
Chapter 6. Adding the Reuse Program Administration Process to the Software Life Cycle Process Framework.
Chapter 7. Adding Domain Engineering to the Software Life Cycle Process Framework.
PART 3. APPLICAION.
Chapter 8. Application of IEEE Std. 1517.
Chapter 9. Relationship to the SEI Capability Maturity Model.
Chapter 10. Relationship to the OMG Unified Modeling Language.
Sources for Reuse Standards.
About the Author.
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.
Dropbox is a sharing tool that allows you to synchronize your documents, as well share files with others. It automatically uploads the files to the ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTTechnical Business AnalystNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTWeb Analyst - WebTrendsVIC
- FTQuality ManagerSA
- FTOS Web Applications DeveloperNSW
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia