Information Technology Reference
In-Depth Information
Networks & Servers . PCI Publisher
(August 2004 Issue).
[41] Troell, Burns, Chapman, Goddard,
Soderlund, Ward, Data Encryption
Performance: Layer 2 vs. Layer 3
Encryption in High Speed Point-
to-Point Networks . The Rochester
Institute of Technology, October 2005.
[42] Tim Richardson, Cowboy computer
glitch blamed for construction slump.
The Register 2004.
[43] Eclipse organization homepage www.
eclipse.org.
[44] Hyades project homepage www.
eclipse.org/hyades.
[45] Mercury Interactive Software testing
tools and training homepage www.
merc-int.com.
[46] Rational Software testing tools, testing
processes, and training homepage
www.rational.com.
[47] Segue Software testing tools and
training homepage www.segue.com.
[48] Stephen H. Kan, Metrics and Models
in Software Quality Engineering , 2nd
Edition, Addison-Wesley, 2002, ISBN
0-201-72915-6.
[49] ibid, Chapter 7.
[50] IBM Center for Software Engineering ,
T.J. Watson Research Laboratory,
http://www.watson.ibm.com/
[51] Please refer to Case Study B in website
http://www.wiley.com/WileyCDA/
Section/id-2925.html
[52] Computing Perspectives, Inc. is a Texas
corporation (#1054978-0) chartered to
provide computer consulting services.
The DriveSaveAmerica case study
is a customer project completed by
CPI and is used in this textbook with
the permission of Gerald D. Everett,
President of Computing Perspectives,
Inc.
[53] “2001 — A Space Odyssey”, a motion
picture by Stanley Kubrick, MGM,
1968.
Search WWH ::




Custom Search