Synopses & Reviews
How 9/11 is transforming ITand how to survive the new "decade of security"!
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdonlegendary software engineering expert and author of Decline and Fall of the American Programmerfocuses on the immediate changes IT professionals are already encountering and the long-term changes they must prepare for. Yourdon addresses 9/11's impact on IT at every level: strategic, national, corporate, and personal. Coverage includes:
- "Thinking the unthinkable": Identifying and managing risks you've never considered
- New "decade of security" that is following the '90s "decade of productivity" and the '80s "decade of quality"
- Privacy landscape changed forever: what it means to your organizationand to you
- New threats, new paradigms, new counter measures (the balance of security vs. functionality)
- "Death March," security, disaster recovery, and contingency planning projects
- The new balance of security vs. functionality
- Increasing the resilience of your IT infrastructure
- Grassroots, peer-to-peer collaboration: responding to tomorrow's unpredictable, chaotic crises
Yourdon doesn't just present problems: he outlines specific strategy options designed to lead to more effective decision-makingfor IT professionals, projectmanagers and senior corporate executives, government leaders, and citizens alike.
"One of the ten most influential men and women in the software field."
Crosstalk magazine
Synopsis
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In this book, Ed Yourdon 7#151; legendary software engineering expert and author of Decline and Fall of the American Programmer focuses on the immediate changes IT professionals are already encountering and the long-term changes they must prepare for. Yourdon addresses 9/11's impact on IT at every level: strategic, national, corporate, and personal. Coverage includes:
- "Thinking the unthinkable": Identifying and managing risks you've never considered
- New "decade of security" that is following the '90s "decade of productivity" and the '80s "decade of quality"
- Privacy landscape changed forever: what it means to your organizationand to you
- New threats, new paradigms, new counter measures (the balance of security vs. functionality)
- "Death March," security, disaster recovery, and contingency planning projects
- The new balance of security vs. functionality
- Increasing the resilience of your IT infrastructure
- Grassroots, peer-to-peer collaboration: responding to tomorrow's unpredictable, chaotic crises
Synopsis
The September 11, 2001 terrorist attacks are transforming information technology, leading to profound and permanent changes. In Byte Wars, legendary software engineering expert Ed Yourdon focuses on the immediate changes IT professionals are already encountering, and the long-term changes they must prepare for. From privacy issues to lean supply chains, "Death March," security, disaster recovery, and contingency planning projects, Yourdon addresses 9/11's impact on IT at every level - and outlines effective responses for executives, IT pros, and citizens alike.
About the Author
EDWARD YOURDON is an internationally recognized consultant, lecturer, and author or coauthor of more than 25 books, including Managing High-Intensity Internet Projects, Death March, and The Rise and Resurrection of the American Programmer. Widely known as the lead developer of structured analysis/design methods in the 1970s and the popular Coad/Yourdon object-oriented methodology in the early 1990s, he has been inducted into the Computer Hall of Fame along with such notables as Charles Babbage, Seymour Cray, James Martin, Grace Hopper, Gerald Weinberg, and Bill Gates.
Table of Contents
Preface.
1. Introduction.
September 11, 2001. The paradigm shift. IT will be one of the likely battlefields of the future. What Assumptions Does the Book Make About You? Who Is This Book Aimed At? Structure of the Book.
2. Strategic Implications Of 9/11.
Personal Consequences. Corporate Consequences. Recognition of the unpredictability of today's world. Developing early-warning systems of impending change. Learning to change and adapt much more quickly than ever before. Recognizing the importance and vulnerability of their "information assets". National Consequences. "Guns and butter" vs. "guns or butter". Recognition of national "critical infrastructure" issues. Coordination, improvement of existing systems. Impact on privacy. Conclusion.
3. Security.
Basic Concepts. Techniques and Technologies. Identification of users. Authorization and access control. Protection of data in transit across "exposed" areas. Audit of activities and accesses to information. Monitoring of suspected security threats. Paradigm Shift. IT systems are part of the "critical Infrastructure". Threats exist from various levels of players. Operational security vs. software development security. Physical security has changed because of miniaturization. Using the Internet as indirect weapon to support terrorism. The decade of security. Strategic Implications. Government and political leaders. Senior corporate executives. Mid-level IT managers. Technical IT professionals. Citizens.
4. Risk Management.
Basic Concepts. Techniques and Technologies. Establishing a risk-aware culture. Realistic assessment of risks. Ensuring that risks are shared between stakeholders. Developing processes for risk management. Paradigm Shifts in Risk Management. High tech can be threatened by low tech. Kamikaze players. The rise of the "stateless" power. The rapid pace of change. Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.
5. Emergent Systems.
Basic Concepts. Benefits of emergent systems and emergent organizations. Characteristics of the emergent organization. Techniques and Technologies. Peer-to-peer communication mechanisms. Tools for collaboration. Modeling and simulation tools. Paradigm Shifts. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.
6. Resilient Systems.
Basic Concepts. Techniques and Technologies. Familiar techniques. Early warning systems. Mechanisms for rapid change. Paradigm Shifts. Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.
7. Good Enough Systems.
Basic Concepts. Techniques and Technologies for Developing Good-Enough Software. A utilitarian strategy. An evolutionary strategy. Heroic teams. Dynamic infrastructure. Dynamic processes. Paradigm Shifts. Malevolent threats. Life and death circumstances. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.
8. Death-March Projects.
Basic Concepts. What is a death-march project? Why do death-march projects exist? Why do people participate in death-march projects? Techniques and Technologies. Negotiations. Peopleware. Processes. Monitoring progress. Paradigm Shifts. The impact of September 11th. The impact of the recession. Strategic Implications. Government leaders. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.
9. Conclusions.
A Summary of the Paradigm Shifts. Security-related paradigm shifts. Risk management paradigm shifts. Emergent-systems paradigm shifts. Resiliency paradigm shifts. Good-enough paradigm shifts. Death-march paradigm shifts. A Summary of the Strategic Implications. Government officials. Senior corporate executives. Mid-level IT managers. IT professionals. Citizens.
A Final Thought: When Will We Be Able to Abandon These Ideas?
Bibliography.
Index.