SEPTEMBER 2007 (Vol. 40, No. 9) p. 95
0018-9162/07/$31.00 © 2007 IEEE
Published by the IEEE Computer Society
Published by the IEEE Computer Society
PDFs Require Adobe Acrobat
Forensic Computing: A Practitioner's Guide, 2nd ed., Tony Sammes and Brian Jenkinson. Forensic computing is becoming of primary importance as computers increasingly provide sources of evidence in criminal investigations. However, for such evidence to be legally useful it must be collected and processed according to rigorous principles.
The authors show how information held in computer systems can be recovered when it has been hidden or subverted by criminals, and they give readers the means to ensure that it is accepted as admissible evidence in court. Updated to fall in line with ACPO 2003 guidelines, the book is illustrated with many case studies and worked examples and can help practitioners and students gain a clear understanding of the principles involved in password protection and data encryption, the evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
Springer; www.springer.com; 1-84628-397-3; 470 pp.
Competing for the Future: How Digital Innovations Are Changing the World, Henry Kressel with Thomas V. Lento. Digital technology has revolutionized our economy and lifestyles. But how many of us really understand the drivers behind the technology—the significance of going digital, the miniaturization of circuit boards, the role of venture capital in financing the revolution, the importance of research and development? How many of us understand what it takes to make money from innovative technologies? Should we worry about manufacturing going offshore? What role do India and China play in the digital economy?
Drawing on a lifetime's experience in the industry—as an engineer, senior manager, and a partner in a venture capital firm—the author offers answers to all these questions. He explains how the technology works, why it matters, how it is financed, and what the key lessons are for public policy.
Cambridge University Press; www.cambridge.org; 978-0-521-86290-5; 422 pp.
Outside-in Software Development: A Practical Approach to Building Successful Stakeholder-Based Products, Carl Kessler and John Sweitzer. Imagine the ideal development project, one that will deliver exactly what clients need. It will achieve broad, rapid, enthusiastic adoption and a productive, high-morale team of expert software professionals will design and build it.
This book's outside-in approach to software development can make such a project possible. The authors show readers how to identify the stakeholders who will determine a project's real value, shape decisions around their real needs, and deliver software that achieves broad, rapid, enthusiastic adoption. They present an end-to-end framework and practical implementation techniques that development teams can quickly benefit from, regardless of project type or scope. Using this proven approach can help developers improve the effectiveness of every client conversation, define priorities with greater visibility and clarity, and make sure all code delivers maximum business value.
IBM Press/Prentice Hall PTR; www.phptr.com/ibmpress; 0-13-157551-1; 256 pp.
Ethical and Social Issues in the Information Age, Joseph Migga Kizza, 3rd ed. Ethical dilemmas have risen in number and intensity with the increasing dependence of contemporary society on computers and computer networks. Despite the proliferation of expert remedies, viable solutions to computer security issues remain too elusive, and society continues to suffer at the hands of cybercriminals, vandals, and hackers.
This comprehensive third edition takes off where the second ended, examining ethical, social, and policy challenges stemming from the emergence of cyberspace, the convergence of telecommunication and computing technologies, and the miniaturization of computing, telecommunication, and information-enabling devices.
This accessible volume broadly surveys thought-provoking questions about the impact of these new technologies, with particular emphasis on the rapid growth of a multitude of computer networks, including the Internet. It assumes only a modest familiarity with basic computer literacy.
Springer; www.springer.com; 1-84628-658-2; 439 pp.
Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective, Willem-Jan van den Heuvel. Distributed business component computing—the assembling of business components into electronic business processes, which interact via the Internet—caters to a new breed of enterprise systems that are flexible, relatively easy to maintain and upgrade to accommodate new business processes, and relatively simple to integrate with other enterprise systems. Companies with unwieldy legacy systems find it difficult to align their old systems with novel business processes. These systems, tightly intertwined with existing business processes and procedures, also have a brittle architecture after years of ad hoc fixes.
This book provides a methodological framework based on reverse engineering, which lets legacy systems be componentized; forward engineering, which derives a set of business components from requirements of the new business processes; and alignment of new business processes and componentized legacy systems.
MIT Press; mitpress.mit.edu; 0-262-22079-8; 230 pp.