Case Studies in Software Management
Book Details:
Publisher: | Wiley-IEEE Computer Society Pr |
Series: |
Wiley
|
Author: | Donald J. Reifer |
Edition: | 1 |
ISBN-10: | 1118650727 |
ISBN-13: | 9781118650721 |
Pages: | 288 |
Published: | Nov 04 2013 |
Posted: | Jan 16 2015 |
Language: | English |
Book format: | PDF |
Book size: | 4.29 MB |
Book Description:
A comprehensive, practical book on software management that dispels real-world issues through relevant case studiesSoftware managers inevitably will meet obstacles while trying to deliver quality products and provide value to customers, often with tight time restrictions. The result: Software War Stories.This book provides readers with practical advice on how to handle the many issues that can arise as a software project unfolds. It utilizes case studies that focus on what can be done to establish and meet reasonable expectations as they occur in government, industrial, and academic settings. The book also offers important discussions on both traditional and agile methods as well as lean development concepts.Software War Stories:Covers the basics of management as applied to situations ranging from agile projects to large IT projects with infrastructure problemsIncludes coverage of topics ranging from planning, estimating, and organizing to risk and opportunity managementUses twelve case studies to communicate lessons learned by the author in practiceOffers end-of-chapter exercises, sample solutions, and a blog for providing updates and answers to readers' questionsSoftware War Stories: Case Studies in Software Management mentors practitioners, software engineers, students and more, providing relevant situational examples encountered when managing software projects and organizations.
For Agile Software Development
The concept of user stories has its roots as one of the main tenets of Extreme Programming. In simple terms, user stories represent an effective means of gathering requirements from the customer (roughly akin to use cases). This book describes user stories and demonstrates how they can be used to properly plan, manage, and test software development projects. The book highlights both successful and unsuccessful implementations of the concept, and provides sets of questions and exercises that drive home its main points. After absorbing the lessons in this book, readers will be able to introduce user stories in their organizations as an effective means of determining precisely what is required of a software application....
A Player-Centered Approach to Creating Memorable Characters and Stories
What really makes a video game story interactive? What's the best way to create an interactive story?How much control should players be given? Do they really want that control in the first place?Do they even know what they want-or are their stated desires at odds with the unconscious preferences?All of these questions and more are examined in this definitive book on interactive storytelling for video games. You'll get detailed descriptions of all major types of interactive stories, case studies of popular games (including Bioshock, Fallout 3, Final Fantasy XIII, Heavy Rain, and Metal Gear Solid), and how players interact with them, and an in-depth analysis of the results of a national survey on player storytelling preferences in games. You'll get the...
The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique cred...
2007 - 2021 © eBooks-IT.org