Section Menu

 CPSC 4900 Software Engineering (Non-IA Course)

Course Description:

Study of techniques used in the definition, specification, design, implementation and testing of large software systems. The course will include team efforts to identify and define the requirements of a large software product. The development of this product will continue in CPSC 4910. Prerequisite: CPSC 3200 a with minimum grade of C or department head approval. Supplementary course fee assessed.

Texts

Ian Sommerville, software engineering, 9th Edition, Pearson, 2010. ISBN: 978-0-13-703515-1.

Lecture Notes

Assignments

Syllabus

References

  • Software engineering. (January 01, 2013). Mena Report. 
  • SOFTWARE/ENGINEERING. (January 01, 2008). Modern Casting, 3, 9.
  • Mills, H. D. (January 01, 1977). Software engineering. Science (new York, N.y.), 195, 4283, 1199-205.
  • Anonymous, . (September 01, 2009). SOFTWARE/ENGINEERING. Modern Casting, 10.
  • Barzilay, O., Hazzan, O., & Yehudai, A. (August 01, 2009). A Multidimensional Software Engineering Course. Ieee Transactions on Education, 52, 3, 413-424.
  • Reifer, D. J. (January 01, 2003). Is the software engineering practice getting closer to the state of the art? .(Special Issue: The State of the Practice of the Practice of Software Engineering ). Ieee Software, 20, 6.)

 Book

  • Sommerville, I. (1982). Software engineering. London: Addison-Wesley Pub. Co.
  • International Conference on Information Technology and Software Engineering, & Lu, W. (2013). Proceedings of the 2012 international conference on information technology and software engineering: Software engineering & digital media technology. Berlin: Springer.
  • Schach, S. R. (1990). Software engineering. Homewood, IL: Aksen Associates.
  • Software Engineering Workshop, Freeman, H., & Lewis, P. M. (1980). Software engineering: Proceedings of the Software Engineering Workshop held in Albany, Troy, and Schenectady, New York, from May 30-June 1, 1979. New York: Academic Press.
  • Sneed, H. M. (1989). Software engineering management. Chichester [England: E. Horwood.
  • Vick, C. R., & Ramamoorthy, C. V. (1984). Handbook of software engineering. New York: Van Nostrand Reinhold Co.
  • Woodcock, J., & Loomes, M. (1989). Software engineering mathematics. Reading, Mass: Addison-Wesley Pub. Co.

Resources

Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics 

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition 

General Procedures: Inference

Inference Definition 

General Procedures: Rainbow Series

Rainbow Series 

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary 
TEMPEST 

General Countermeasures and Safeguards: Computer Law

Computer Law 

General Countermeasures and Safeguards: Computer Media

Computer Media 
Remanence 

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools 

Administrative Countermeasures/Safeguards: Control Management

Change Control 
Control Management 

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974 

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring 

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery 

Incidents

Policy and Procedures: Incident Response

Incident Response 

Policy and Procedures: Witness Interrogation

Witness Interrogation 

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks 
Computer Virus Timeline 

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams

CERT 

Configuration

Administrative Policies/Procedures: Approval to Operate

Approval to Operate 

Administrative Policies/Procedures: Configuration/Change Control

Change Control 

Administrative Policies/Procedures: Copyright Protection

Copyright Protection 

Administrative Policies/Procedures: Patch Management

Patch Management 

Administrative Policies/Procedures: Records Management

Records Management 

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy 

Anomolies and Integrity

General Risk Management: Computer System Risk Management

Risk Management 

Access Control Safeguards: Computer System Access Control

Access Control 

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System 

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions 

Administration

Access Control Mechanisms: KMI Applications

Key Management 

Access Control Mechanisms: Single Sign-on

Single Sign On 

 

IA Sites

 

©