Byte Wars: The Impact of September 11 on Information Technology

Overview

How 9/11 is transforming IT—and how to survive the new "decade of security"!

The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engineering expert and author of Decline and Fall of the American Programmer—focuses on the immediate changes IT professionals are already encountering and the long-term changes they must prepare for. Yourdon addresses 9/11's impact on ...

See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (24) from $1.99   
  • New (6) from $3.84   
  • Used (18) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$3.84
Seller since 2010

Feedback rating:

(1796)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
0130477257 BRAND NEW. We are a tested and proven company with over 900,000 satisfied customers since 1997. Choose expedited shipping (if available) for much faster delivery. ... Delivery confirmation on all US orders. Read more Show Less

Ships from: Nashua, NH

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$8.18
Seller since 2010

Feedback rating:

(1796)

Condition: New
0130477257 New book with publisher's mark on edge. We are a tested and proven company with over 900,000 satisfied customers since 1997. Choose expedited shipping (if available) ... for much faster delivery. Delivery confirmation on all US orders. Read more Show Less

Ships from: Nashua, NH

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$12.95
Seller since 2009

Feedback rating:

(6)

Condition: New
Paperback New New.

Ships from: Sacramento, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$15.78
Seller since 2007

Feedback rating:

(23157)

Condition: New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$20.50
Seller since 2007

Feedback rating:

(312)

Condition: New
1st Edition, Fine/Fine Clean, bright & very tight. NO ink names, bookplates, DJ tears, etc. ISBN 0130477257

Ships from: Troy, NY

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$35.19
Seller since 2013

Feedback rating:

(2)

Condition: New
New

Ships from: San Diego, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

How 9/11 is transforming IT—and how to survive the new "decade of security"!

The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engineering expert and author of Decline and Fall of the American Programmer—focuses on the immediate changes IT professionals are already encountering and the long-term changes they must prepare for. Yourdon addresses 9/11's impact on IT at every level: strategic, national, corporate, and personal. Coverage includes:

  • "Thinking the unthinkable": Identifying and managing risks you've never considered
  • New "decade of security" that is following the '90s "decade of productivity" and the '80s "decade of quality"
  • Privacy landscape changed forever: what it means to your organization—and to you
  • New threats, new paradigms, new counter measures (the balance of security vs. functionality)
  • "Death March," security, disaster recovery, and contingency planning projects
  • The new balance of security vs. functionality
  • Increasing the resilience of your IT infrastructure
  • Grassroots, peer-to-peer collaboration: responding to tomorrow's unpredictable, chaotic crises

Yourdon doesn't just present problems: he outlines specific strategy options designed to lead to more effective decision-making—for IT professionals, projectmanagers and senior corporate executives, government leaders, and citizens alike.

"One of the ten most influential men and women in the software field."

Crosstalk magazine

Read More Show Less

Product Details

  • ISBN-13: 9780130477255
  • Publisher: Prentice Hall
  • Publication date: 3/28/2002
  • Series: Yourdon Press Series
  • Pages: 336
  • Product dimensions: 6.10 (w) x 8.90 (h) x 0.80 (d)

Meet the Author

EDWARD YOURDON is an internationally recognized consultant, lecturer, and author or coauthor of more than 25 books, including Managing High-Intensity Internet Projects, Death March, and The Rise and Resurrection of the American Programmer. Widely known as the lead developer of structured analysis/design methods in the 1970s and the popular Coad/Yourdon object-oriented methodology in the early 1990s, he has been inducted into the Computer Hall of Fame along with such notables as Charles Babbage, Seymour Cray, James Martin, Grace Hopper, Gerald Weinberg, and Bill Gates.

Read More Show Less

Table of Contents

Preface.

1. Introduction.

September 11, 2001. The paradigm shift. IT will be one of the likely battlefields of the future. What Assumptions Does the Book Make About You? Who Is This Book Aimed At? Structure of the Book.

2. Strategic Implications Of 9/11.

Personal Consequences. Corporate Consequences. Recognition of the unpredictability of today's world. Developing early-warning systems of impending change. Learning to change and adapt much more quickly than ever before. Recognizing the importance and vulnerability of their "information assets". National Consequences. "Guns and butter" vs. "guns or butter". Recognition of national "critical infrastructure" issues. Coordination, improvement of existing systems. Impact on privacy. Conclusion.

3. Security.

Basic Concepts. Techniques and Technologies. Identification of users. Authorization and access control. Protection of data in transit across "exposed" areas. Audit of activities and accesses to information. Monitoring of suspected security threats. Paradigm Shift. IT systems are part of the "critical Infrastructure". Threats exist from various levels of players. Operational security vs. software development security. Physical security has changed because of miniaturization. Using the Internet as indirect weapon to support terrorism. The decade of security. Strategic Implications. Government and political leaders. Senior corporate executives. Mid-level IT managers. Technical IT professionals. Citizens.

4. Risk Management.

Basic Concepts. Techniques and Technologies. Establishing a risk-aware culture. Realistic assessment of risks. Ensuring that risks are shared between stakeholders. Developing processes for risk management. Paradigm Shifts in Risk Management. High tech can be threatened by low tech. Kamikaze players. The rise of the "stateless" power. The rapid pace of change. Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

5. Emergent Systems.

Basic Concepts. Benefits of emergent systems and emergent organizations. Characteristics of the emergent organization. Techniques and Technologies. Peer-to-peer communication mechanisms. Tools for collaboration. Modeling and simulation tools. Paradigm Shifts. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

6. Resilient Systems.

Basic Concepts. Techniques and Technologies. Familiar techniques. Early warning systems. Mechanisms for rapid change. Paradigm Shifts. Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

7. Good Enough Systems.

Basic Concepts. Techniques and Technologies for Developing Good-Enough Software. A utilitarian strategy. An evolutionary strategy. Heroic teams. Dynamic infrastructure. Dynamic processes. Paradigm Shifts. Malevolent threats. Life and death circumstances. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

8. Death-March Projects.

Basic Concepts. What is a death-march project? Why do death-march projects exist? Why do people participate in death-march projects? Techniques and Technologies. Negotiations. Peopleware. Processes. Monitoring progress. Paradigm Shifts. The impact of September 11th. The impact of the recession. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

9. Conclusions.

A Summary of the Paradigm Shifts. Security-related paradigm shifts. Risk management paradigm shifts. Emergent-systems paradigm shifts. Resiliency paradigm shifts. Good-enough paradigm shifts. Death-march paradigm shifts. A Summary of the Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

A Final Thought: When Will We Be Able to Abandon These Ideas?

Bibliography.

Index.

Read More Show Less

Preface

PREFACE

This is not a book I expected to write.

Indeed, it's highly unlikely that I would have written Byte Wars, had it not been for the awful events of September 11th. But even without the attacks on the World Trade Center and the Pentagon, someone should have been writing about the disruptive, chaotic changes we face in the coming years—changes enabled and facilitated by technology. As it turns out, many scientists, pundits, and gurus have been writing such books in recent years, including some about terrorism and bio-warfare to which we should have been paying much more attention. But most of the recent books dealing with the future of computers and the field of information technology (IT) have focused on the glamorous future of e-commerce and the Internet; ironically, that future appears much less glamorous than it did just a short while ago.

One of the themes in Byte Wars is that a number of changes-not just gentle, incremental changes, but massive, paradigm-shift changes—have actually been underway for the past several years. The events of September 11th have crystallized those changes, forcing us to confront and acknowledge some new realities that we have ignored for too long. For example, anyone who accesses the Internet is aware of the rash of computer-based viruses and worms that have proliferated since the "Love Bug" episode a couple years ago. But we may not have faced up to the terrifying threat of "zombie armies" of powerful home computers with high-speed, always-on Internet connections, computers that can be invaded by hackers and reprogrammed to launch denial-of-service attacks on businesses and government agencies.

It doesn't take a rocket scientist to see that computer technology is going to play a central role in the war on terrorism being formulated by the U.S. government as this book goes to press. Not only are we likely to see billions of dollars invested in a new generation of laser-guided missiles, computer-assisted weapons, but we'll see a vast array of scanning devices, face-recognition devices, and other computer technologies to enhance identification and tracking of suspect individuals. We'll see the development and integration of public-sector and private-sector databases, which will raise a plethora of privacy issues and concerns. And we'll see an enormous increase in the techniques and technologies for protecting telecommunication networks, Web sites, Internet portals, and other computer-dependent aspects of the nation's "critical infrastructure."

Even so, many IT professionals may be predisposed to view these activities as nothing more than a "political" response to September 11th, much like the Cold War was a response to the actions of the former Soviet Union after World War II. As such, the reaction to September 11th is obviously a much less upbeat and cheerful response than that caused by the fall of the Berlin Wall, the reunification of Germany, and the collapse of the Soviet Empire in the late 1980s and early 1990s. Americans—including not only IT professionals, but everyone else, too—must now confront the discomforting reality that they are no longer protected by two vast oceans. They must confront the reality that some conflicts, especially those that involve deep ethnic and religious disputes, can go on for generations and centuries. And they must confront what they've heard for years, but never really accepted: not everyone appreciates or approves of Coca-Cola, McDonald's, Disney World, MTV, Hollywood, and various other trappings of the American way of life.

I don't have much advice to offer when it comes to politics, religion or ethnic disputes. And the only observation I'll make about Coca-Cola, McDonald's, and Disney World is that our corporate executives might be well advised to re-examine their built-in assumptions that globalization is always a good thing. Perhaps we don't need the same corporate logo on every office building around the world; perhaps we shouldn't be attempting to impose the same standardized payroll and inventory control system on every regional office around the world; perhaps not everyone wants to see the same MTV video clips and the same Hollywood movies. Maybe what our technology has done for us, as Clue Train Manifesto co-author David Weinberger suggests in the title of his forthcoming book, is to make it possible for peaceful coexistence in a global environment consisting of "small pieces, loosely joined."

Or maybe not. The point is that technology is a factor in these choices and decisions. Thus, while many IT professionals may prefer to think about September 11th as nothing but a terrorist attack, and while they may believe that the enormous response to that attack is nothing more than politics and military saber-rattling, their crown jewels—the most advanced and most sophisticated computer technology that they create—will be at the heart of that response. And that will be true not just for the next few weeks or months; I fully agree with the predictions that September 11th has ushered in an era that will last as long as the Cold War lasted. The fact that it will almost certainly last to the end of my life is only a trifle troubling to me; the fact that it may be the dominant influence on the lives and careers of my children, and their children, is something I don't feel I can ignore—particularly if that future is influenced significantly by the computer-based technologies that we IT professionals create.

So it's important for us to think about the topics in this book—not just the obvious topics of security and risk management, but also the somewhat less-understood topics of emergent systems and resilient systems, as well as the controversial concepts of good-enough systems and death-march projects. Not everyone will agree with the themes and recommendations I've offered on the following pages. That doesn't particularly bother me, but I do think it's important to remind the relatively young, idealistic IT professionals that existing power structures in corporations and government agencies may do little more than pay lip service to concepts such as emergent systems and resilient systems. Resiliency almost always implies redundancy, and the creation of enough "slack" in a system to withstand unanticipated disruptions; that's hard to justify in today's super-efficient, cost-conscious, lean-and-mean business environment.

And the notion that ad hoc, grass-roots systems can emerge on their own (supported, in many cases, by the peer-to-peer communication technologies that we IT professionals supply) and do a better job of responding to unplanned, disruptive threats is an anathema to traditional top-down, hierarchically managed organizations. It's worth remembering that the U.S. military, with all of its awesome resources, was unable to prevent two commercial airlines from crashing into the World Trade Center, nor a third plane from crashing into its very nerve center in Washington, DC. From that perspective, it's sobering indeed to realize that the only hijacked plane that was prevented from reaching its target on September 11th was United flight 93, in which a group of utter strangers, with no preconceived strategy and no top-down leadership, managed to create an ad hoc, grass-roots plan to take matters into their own hands.

It's customary, in a preface like this, for the author to acknowledge and thank the individuals who provided assistance in the creation of a book. But for me, that would require thanking almost everyone I've known since childhood; I am nothing more than the product of friendship, love, advice, guidance, and mentoring from thousands of friends, family members, business colleagues, former bosses, co-workers, and students.

But my wife and children deserve special thanks for tolerating periods when I would "tune out" in mid-sentence and begin thinking about the chapter I was working on. And my colleagues at the Cutter Consortium deserve special thanks, too, for many provocative and thought-provoking discussions about the future of computer technology. Numerous individuals, including anonymous Internet denizens from all over the world, provided valuable feedback and suggestions as I posted chapters of the manuscript online. And Steve Heller, who always loves to remind me of my 1975 prediction, in Techniques of Program Structure and Design, that "unless you're very rich or very eccentric, you'll never have your own computer," deserves special thanks for reading every word of every chapter, critiquing and challenging everything I wrote. Finally, a high-powered "death-march" team at Prentice Hall, headed up by Kathleen Caren and Paul Petralia, worked valiantly to bring the book out in record time. Of course, any mistakes that remain are my responsibility alone.

—Ed Yourdon New York, NY and Taos, New Mexico February 2002

Read More Show Less

Introduction

PREFACE

This is not a book I expected to write.

Indeed, it's highly unlikely that I would have written Byte Wars, had it not been for the awful events of September 11th. But even without the attacks on the World Trade Center and the Pentagon, someone should have been writing about the disruptive, chaotic changes we face in the coming years—changes enabled and facilitated by technology. As it turns out, many scientists, pundits, and gurus have been writing such books in recent years, including some about terrorism and bio-warfare to which we should have been paying much more attention. But most of the recent books dealing with the future of computers and the field of information technology (IT) have focused on the glamorous future of e-commerce and the Internet; ironically, that future appears much less glamorous than it did just a short while ago.

One of the themes in Byte Wars is that a number of changes-not just gentle, incremental changes, but massive, paradigm-shift changes—have actually been underway for the past several years. The events of September 11th have crystallized those changes, forcing us to confront and acknowledge some new realities that we have ignored for too long. For example, anyone who accesses the Internet is aware of the rash of computer-based viruses and worms that have proliferated since the "Love Bug" episode a couple years ago. But we may not have faced up to the terrifying threat of "zombie armies" of powerful home computers with high-speed, always-on Internet connections, computers that can be invaded by hackers and reprogrammed to launch denial-of-service attacks on businesses andgovernment agencies.

It doesn't take a rocket scientist to see that computer technology is going to play a central role in the war on terrorism being formulated by the U.S. government as this book goes to press. Not only are we likely to see billions of dollars invested in a new generation of laser-guided missiles, computer-assisted weapons, but we'll see a vast array of scanning devices, face-recognition devices, and other computer technologies to enhance identification and tracking of suspect individuals. We'll see the development and integration of public-sector and private-sector databases, which will raise a plethora of privacy issues and concerns. And we'll see an enormous increase in the techniques and technologies for protecting telecommunication networks, Web sites, Internet portals, and other computer-dependent aspects of the nation's "critical infrastructure."

Even so, many IT professionals may be predisposed to view these activities as nothing more than a "political" response to September 11th, much like the Cold War was a response to the actions of the former Soviet Union after World War II. As such, the reaction to September 11th is obviously a much less upbeat and cheerful response than that caused by the fall of the Berlin Wall, the reunification of Germany, and the collapse of the Soviet Empire in the late 1980s and early 1990s. Americans—including not only IT professionals, but everyone else, too—must now confront the discomforting reality that they are no longer protected by two vast oceans. They must confront the reality that some conflicts, especially those that involve deep ethnic and religious disputes, can go on for generations and centuries. And they must confront what they've heard for years, but never really accepted: not everyone appreciates or approves of Coca-Cola, McDonald's, Disney World, MTV, Hollywood, and various other trappings of the American way of life.

I don't have much advice to offer when it comes to politics, religion or ethnic disputes. And the only observation I'll make about Coca-Cola, McDonald's, and Disney World is that our corporate executives might be well advised to re-examine their built-in assumptions that globalization is always a good thing. Perhaps we don't need the same corporate logo on every office building around the world; perhaps we shouldn't be attempting to impose the same standardized payroll and inventory control system on every regional office around the world; perhaps not everyone wants to see the same MTV video clips and the same Hollywood movies. Maybe what our technology has done for us, as Clue Train Manifesto co-author David Weinberger suggests in the title of his forthcoming book, is to make it possible for peaceful coexistence in a global environment consisting of "small pieces, loosely joined."

Or maybe not. The point is that technology is a factor in these choices and decisions. Thus, while many IT professionals may prefer to think about September 11th as nothing but a terrorist attack, and while they may believe that the enormous response to that attack is nothing more than politics and military saber-rattling, their crown jewels—the most advanced and most sophisticated computer technology that they create—will be at the heart of that response. And that will be true not just for the next few weeks or months; I fully agree with the predictions that September 11th has ushered in an era that will last as long as the Cold War lasted. The fact that it will almost certainly last to the end of my life is only a trifle troubling to me; the fact that it may be the dominant influence on the lives and careers of my children, and their children, is something I don't feel I can ignore—particularly if that future is influenced significantly by the computer-based technologies that we IT professionals create.

So it's important for us to think about the topics in this book—not just the obvious topics of security and risk management, but also the somewhat less-understood topics of emergent systems and resilient systems, as well as the controversial concepts of good-enough systems and death-march projects. Not everyone will agree with the themes and recommendations I've offered on the following pages. That doesn't particularly bother me, but I do think it's important to remind the relatively young, idealistic IT professionals that existing power structures in corporations and government agencies may do little more than pay lip service to concepts such as emergent systems and resilient systems. Resiliency almost always implies redundancy, and the creation of enough "slack" in a system to withstand unanticipated disruptions; that's hard to justify in today's super-efficient, cost-conscious, lean-and-mean business environment.

And the notion that ad hoc, grass-roots systems can emerge on their own (supported, in many cases, by the peer-to-peer communication technologies that we IT professionals supply) and do a better job of responding to unplanned, disruptive threats is an anathema to traditional top-down, hierarchically managed organizations. It's worth remembering that the U.S. military, with all of its awesome resources, was unable to prevent two commercial airlines from crashing into the World Trade Center, nor a third plane from crashing into its very nerve center in Washington, DC. From that perspective, it's sobering indeed to realize that the only hijacked plane that was prevented from reaching its target on September 11th was United flight 93, in which a group of utter strangers, with no preconceived strategy and no top-down leadership, managed to create an ad hoc, grass-roots plan to take matters into their own hands.

It's customary, in a preface like this, for the author to acknowledge and thank the individuals who provided assistance in the creation of a book. But for me, that would require thanking almost everyone I've known since childhood; I am nothing more than the product of friendship, love, advice, guidance, and mentoring from thousands of friends, family members, business colleagues, former bosses, co-workers, and students.

But my wife and children deserve special thanks for tolerating periods when I would "tune out" in mid-sentence and begin thinking about the chapter I was working on. And my colleagues at the Cutter Consortium deserve special thanks, too, for many provocative and thought-provoking discussions about the future of computer technology. Numerous individuals, including anonymous Internet denizens from all over the world, provided valuable feedback and suggestions as I posted chapters of the manuscript online. And Steve Heller, who always loves to remind me of my 1975 prediction, in Techniques of Program Structure and Design, that "unless you're very rich or very eccentric, you'll never have your own computer," deserves special thanks for reading every word of every chapter, critiquing and challenging everything I wrote. Finally, a high-powered "death-march" team at Prentice Hall, headed up by Kathleen Caren and Paul Petralia, worked valiantly to bring the book out in record time. Of course, any mistakes that remain are my responsibility alone.

—Ed Yourdon
New York, NY and
Taos, New Mexico
February 2002

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)