Software Reuse: Methods, Models, Costs, Second Edition - E-book - ePub

Edition en anglais

Note moyenne 
 Ronald J. Leach - Software Reuse: Methods, Models, Costs, Second Edition.
This updated edition of Software Reuse: Methods, Models, Costs is an essential guide to successful systematic, life cycle-based reuse.  It explains... Lire la suite
7,49 € E-book - ePub
Vous pouvez lire cet ebook sur les supports de lecture suivants :
Téléchargement immédiat
Dès validation de votre commande
Offrir maintenant
Ou planifier dans votre panier

Résumé

This updated edition of Software Reuse: Methods, Models, Costs is an essential guide to successful systematic, life cycle-based reuse.  It explains in depth the fundamentals, economics, and metrics of reuse and shows how it can succeed, even in rapidly changing technology environments.   This book emphasizes the type of complex systems that may evolve into "systems of systems."Important material has been added on the changed state-of-the-art and state-of-the-practice of software reuse, on product-line architectures, on reuse economics, and maintenance of COTS-based systems.

Caractéristiques

  • Date de parution
    27/02/2021
  • Editeur
  • ISBN
    978-1-393-34299-1
  • EAN
    9781393342991
  • Format
    ePub
  • Caractéristiques du format ePub
    • Protection num.
      pas de protection

Avis libraires et clients

Avis audio

Écoutez ce qu'en disent nos libraires !

À propos de l'auteur

Biographie de Ronald J. Leach

About the AuthorI recently retired from being a professor of computer science at Howard University for over 25 years, with 9 of those years as a department chair.  (I was a math professor for 16 years before that.)  While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States.  We also established a graduate certificate program in computer security, which became the largest certificate program at the university.  I had major responsibility for working with technical personnel to keep our department's hundreds of computers functional and virus-free, while providing email service to several hundred users.  We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems.
As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads.  I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications.  My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists.  More than 5, 000 people have attended my lectures on identity theft; many others have seen them on closed-circuit television.
I have written more than twenty books, and more than 120 technical articles, most of which are in technical areas. My interests in data storage and access meshed well with my genealogical interests when I wrote the Genealogy Technology column of the Maryland Genealogical Society Journal for several years.   I was the editor or co-editor of that society's journal for many years.

Souvent acheté ensemble

Vous aimerez aussi

Derniers produits consultés

Software Reuse: Methods, Models, Costs, Second Edition est également présent dans les rayons

7,49 €