Companies that consistently produce high-quality software on schedule and within budget have an enormous advantage over their competitors. To achieve and maintain a high level of productivity, you need to know how to eliminate the factors that impede successful development a challenge this new reference addresses in depth.
About the Author
Judy Myerson earned her M.S.E.E. in computer and information sciences from an ivy league university. She is a computer/software engineer, a technical writer and consulting editor of computer manuals, technical reports, and textbooks. She has written numerous articles on data language and processing technologies for national trade publications.
Table of Contents
Industrial Espionage: Industrial Espionage and Other Major Risks. Malicious Computer Viruses. Low Position on the CMM. Software Engineering: Software Maturity. Organizational Maturity. Software Metrics: Metrics in Risk Management. Metrics in Various Maturity Models. Metrics in Capability Maturity Model. Metrics in Orange Book. Other Metrics Approaches. Security: Risk Analysis Methodologies. Risk Management Methodologies. Process Maturity Models: Risk Analysis Methods. Risk Management Methodologies. Asset Valuations: Basic Asset Categories. Customized Asset Categories. Asset Valuations. Security Threats: Security Threat Categories. Sample Data Sheets. Security Controls and Tests: Vulnerability Examples. Security Control and Test Categories. Sample Data Sheets on Vulnerabilities. Safeguards: Two Safeguard Scenarios. Safeguards. Sample Data Sheets on Safeguards. Economic Analysis: Algorithms Mathematical Values. Savings Justification. Return on Investments. Safeguard Worksheets. Reiterative Processes: Existing Approaches. Proposed Approaches. Automated Risk Management. Issues of Reiteration Limits. Sample Data Sheets.