Wonder Club world wonders pyramid logo
×

Byte wars Book

Byte wars
Byte wars, How 9/11 is transforming IT—and how to survive the new decade of security!
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engine, Byte wars has a rating of 2.5 stars
   2 Ratings
X
Byte wars, How 9/11 is transforming IT—and how to survive the new decade of security! The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engine, Byte wars
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Byte wars
  • Written by author Yourdon
  • Published by Upper Saddle River, NJ : Prentice Hall PTR, c2002., 2002/04/30
  • How 9/11 is transforming IT—and how to survive the new "decade of security"! The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engine
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface.

1. Introduction.

September 11, 2001. The paradigm shift. IT will be one of the likely battlefields of the future. What Assumptions Does the Book Make About You? Who Is This Book Aimed At? Structure of the Book.

2. Strategic Implications Of 9/11.

Personal Consequences. Corporate Consequences. Recognition of the unpredictability of today's world. Developing early-warning systems of impending change. Learning to change and adapt much more quickly than ever before. Recognizing the importance and vulnerability of their "information assets". National Consequences. "Guns and butter" vs. "guns or butter". Recognition of national "critical infrastructure" issues. Coordination, improvement of existing systems. Impact on privacy. Conclusion.

3. Security.

Basic Concepts. Techniques and Technologies. Identification of users. Authorization and access control. Protection of data in transit across "exposed" areas. Audit of activities and accesses to information. Monitoring of suspected security threats. Paradigm Shift. IT systems are part of the "critical Infrastructure". Threats exist from various levels of players. Operational security vs. software development security. Physical security has changed because of miniaturization. Using the Internet as indirect weapon to support terrorism. The decade of security. Strategic Implications. Government and political leaders. Senior corporate executives. Mid-level IT managers. Technical IT professionals. Citizens.

4. Risk Management.

Basic Concepts. Techniques and Technologies. Establishing a risk-aware culture. Realistic assessment of risks. Ensuring that risks are shared between stakeholders. Developing processes for risk management. Paradigm Shifts in Risk Management. High tech can be threatened by low tech. Kamikaze players. The rise of the "stateless" power. The rapid pace of change. Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

5. Emergent Systems.

Basic Concepts. Benefits of emergent systems and emergent organizations. Characteristics of the emergent organization. Techniques and Technologies. Peer-to-peer communication mechanisms. Tools for collaboration. Modeling and simulation tools. Paradigm Shifts. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

6. Resilient Systems.

Basic Concepts. Techniques and Technologies. Familiar techniques. Early warning systems. Mechanisms for rapid change. Paradigm Shifts. Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

7. Good Enough Systems.

Basic Concepts. Techniques and Technologies for Developing Good-Enough Software. A utilitarian strategy. An evolutionary strategy. Heroic teams. Dynamic infrastructure. Dynamic processes. Paradigm Shifts. Malevolent threats. Life and death circumstances. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

8. Death-March Projects.

Basic Concepts. What is a death-march project? Why do death-march projects exist? Why do people participate in death-march projects? Techniques and Technologies. Negotiations. Peopleware. Processes. Monitoring progress. Paradigm Shifts. The impact of September 11th. The impact of the recession. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

9. Conclusions.

A Summary of the Paradigm Shifts. Security-related paradigm shifts. Risk management paradigm shifts. Emergent-systems paradigm shifts. Resiliency paradigm shifts. Good-enough paradigm shifts. Death-march paradigm shifts. A Summary of the Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.

A Final Thought: When Will We Be Able to Abandon These Ideas?

Bibliography.

Index.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Byte wars, How 9/11 is transforming IT—and how to survive the new decade of security!
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engine, Byte wars

X
WonderClub Home

This item is in your Collection

Byte wars, How 9/11 is transforming IT—and how to survive the new decade of security!
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engine, Byte wars

Byte wars

X
WonderClub Home

This Item is in Your Inventory

Byte wars, How 9/11 is transforming IT—and how to survive the new decade of security!
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon—legendary software engine, Byte wars

Byte wars

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: