Books on the topic 'Software defect'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 books for your research on the topic 'Software defect.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Zero defect software. New York: McGraw-Hill, 1990.
Find full textToward zero-defect programming. Reading, Mass: Addison-Wesley, 1999.
Find full textYounessi, Houman. Object-oriented defect management of software. Upper Saddle River, NJ: Prentice Hall PTR, 2002.
Find full textCai, Kai-Yuan. Software Defect and Operational Profile Modeling. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-5593-3.
Full textSoftware defect and operational profile modeling. Boston: Kluwer Academic Publishers, 1998.
Find full textMiller, Ann K. Engineering quality software: Defect detection and prevention. Reading, Mass: Addison-Wesley, 1992.
Find full textPeterson, Ivars. Fatal Defect: Chasing Killer Computer Bugs. New York: Vantage Books, 1996.
Find full textPeterson, Ivars. Fatal Defect: Chasing Killer Computer Bugs. New York: Times Books, 1995.
Find full textHuizinga, Dorota. Automated defect prevention: Best practices in software management. Hoboken, N.J: Wiley, 2007.
Find full textFerdinand, Arthur E. Systems, software, and qualityengineering: Applying defect behavior theory to programming. New York: Van Nostrand Reinhold, 1993.
Find full textSystems, software, and quality engineering: Applying defect behavior theory to programming. New York: Van Nostrand Reinhold, 1993.
Find full textGlitch: The hidden impact of faulty software. Upper Saddle River, NJ: Prentice Hall, 2010.
Find full textGreat Britain. Ministry of Defence. Directorate of Standardization. The procurement of safety related software in defence equipment. Glasgow: MoD, 1995.
Find full textGreat Britain. Ministry of Defence. Directorate of Standardization. The procurement of safety critical software in defence equipment. Glasgow: MOD, 1991.
Find full textThe software conspiracy: Why software companies put out faulty products, how they can hurt you, and what you can do about it. New York: McGraw-Hill, 2000.
Find full textKamphaus, Randy W. BASC monitor for ADHD: Manual and software guide. Circle Pines, Minn: American Guidance Service, 1998.
Find full textCiancarini, Paolo, Manuel Mazzara, Angelo Messina, Alberto Sillitti, and Giancarlo Succi, eds. Proceedings of 6th International Conference in Software Engineering for Defence Applications. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-14687-0.
Full textCiancarini, Paolo, Stanislav Litvinov, Angelo Messina, Alberto Sillitti, and Giancarlo Succi, eds. Proceedings of 5th International Conference in Software Engineering for Defence Applications. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-70578-1.
Full textCiancarini, Paolo, Alberto Sillitti, Giancarlo Succi, and Angelo Messina, eds. Proceedings of 4th International Conference in Software Engineering for Defence Applications. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27896-4.
Full textPěchouček, Michal. Defence industry applications of autonomous agents and multi-agent systems. Basel: Birkhäuser, 2008.
Find full textPerry, William E. A standard for auditing computer applications: Auditing information services defects. Boston: Auerbach, 1996.
Find full textCai, Kai-Yuan. Software Defect and Operational Profile Modeling. Springer, 2012.
Find full textHuizinga, Dorota, and Adam Kolawa. Automated Defect Prevention: Best Practices in Software Management. Wiley-IEEE Computer Society Pr, 2007.
Find full textHuizinga, Dorota, and Adam Kolawa. Automated Defect Prevention: Best Practices in Software Management. IEEE Computer Society Press, 2007.
Find full textMahfuz, Abusayed. Software Quality Management: Reducing Defect Through Root Cause Analysis. Independently Published, 2020.
Find full textThe Practical Guide to Defect Prevention. Microsoft Press, 2007.
Find full textMusson, Robert, Marc McDonald, and Ross Smith. The Practical Guide to Defect Prevention (Pro - Best Practices). Microsoft Press, 2007.
Find full textThe Software Conspiracy. New York: McGraw-Hill, 2001.
Find full textLloyd, Ian J. 24. Contractual liability for defective software. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787556.003.0024.
Full textSoftware Testing Techniques: Finding the Defects that Matter (Programming Series). Charles River Media, 2004.
Find full textMinasi, Mark. The Software Conspiracy: Why Companies Put Out Faulty Software, How They Can Hurt You and What You Can Do About It. Mcgraw-Hill, 1999.
Find full textMinasi, Mark. The Software Conspiracy: Why Companies Put Out Faulty Software, How They Can Hurt You and What You Can Do About It. Mcgraw-Hill, 1999.
Find full textSoftware Endgames: Eliminating Defects, Controlling Change, And The Countdown To On-time Delivery. Dorset House Publishing Company, Incorporated, 2004.
Find full textHow to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.
Find full textFlorac, William. Software Quality Measurement: A Framework for Counting Problems and Defects/Sei-92-Tr-022. Research Access Inc, 1992.
Find full textSucci, Giancarlo, Paolo Ciancarini, Alberto Sillitti, Angelo Messina, and Stanislav Litvinov. Proceedings of 5th International Conference in Software Engineering for Defence Applications: SEDA 2016. Springer, 2018.
Find full textSucci, Giancarlo, Paolo Ciancarini, Alberto Sillitti, Manuel Mazzara, and Angelo Messina. Proceedings of 6th International Conference in Software Engineering for Defence Applications: SEDA 2018. Springer, 2019.
Find full textButterworth, Brian, Sashank Varma, and Diana Laurillard. Dyscalculia. Edited by Roi Cohen Kadosh and Ann Dowker. Oxford University Press, 2014. http://dx.doi.org/10.1093/oxfordhb/9780199642342.013.001.
Full text(Editor), Simon G. Thompson, and Robert Ghanea-Hercock (Editor), eds. Defence Applications of Multi-Agent Systems: International Workshop, DAMAS 2005, Utrecht, The Netherlands, July 25, 2005, Revised and Invited Papers (Lecture Notes in Computer Science). Springer, 2006.
Find full textHarwood, Mike. Internet Security: How to Defend Against Attackers on the Web. Jones & Bartlett Learning, LLC, 2015.
Find full text