1.

Record Nr.

UNINA9910478880203321

Autore

Chen Xia <1956->

Titolo

Limit theorems for functionals of ergodic Markov chains with general state space / / Xia Chen

Pubbl/distr/stampa

Providence, Rhode Island : , : American Mathematical Society, , [1999]

©1999

ISBN

1-4704-0253-X

Descrizione fisica

1 online resource (225 p.)

Collana

Memoirs of the American Mathematical Society, , 0065-9266 ; ; number 664

Disciplina

510 s

519.2

Soggetti

Central limit theorem

Markov processes

Large deviations

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"May 1999, volume 139, number 664 (third of 5 numbers)."

Nota di bibliografia

Includes bibliographical references (pages 200-203).

Nota di contenuto

""Contents""; ""Introduction""; ""Chapter I. Split Chain and Regeneration""; ""I-1 Motivation and notation""; ""I-2 Split chain""; ""I-3 Maximal and minimal inequalities""; ""I-4 Maximal integrability on small sets""; ""Chapter II. The Central Limit Theorem""; ""II-1 Introduction""; ""II-2 Validity of CLT""; ""II-3 Identification of the limiting variance in the CLT""; ""II-4 The CLT and the ergodicity conditions""; ""Chapter III. The Law of the Iterated Logarithm""; ""III-1 Introduction""; ""III-2 The LIL and CLT""; ""III-3 Some remarks on the limit set""; ""III-4 The LIL in vector setting""



2.

Record Nr.

UNINA9911018915303321

Titolo

The dark side of software engineering : evil on computing projects / / Johann Rost and Robert L. Glass

Pubbl/distr/stampa

Hoboken, N.J., : Wiley, : IEE Computer Society, 2010

ISBN

9780470922873

0470922877

9781283916097

1283916096

9780470909942

0470909943

9780470909959

0470909951

Descrizione fisica

1 online resource (317 p.)

Altri autori (Persone)

RostJohann

GlassRobert L. <1932->

Disciplina

174.90051

Soggetti

Computer software industry - Moral and ethical aspects

Software engineering - Management

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

FOREWORD (Linda Rising) -- INTRODUCTION -- I.1 What's the Dark Side? -- I.1.1 Why the Dark Side? -- I.1.2 Who Cares About the Dark Side? -- I.1.3 How Dark is the Dark Side? -- I.1.4 What Else is on the Dark Side? -- I.1.5 Ethics and the Dark Side -- I.1.6 Personal Anecdotes About the Dark Side -- Reference -- PART 1: DARK SIDE ISSUES -- CHAPTER 1 SUBVERSION -- 1.1 Introductory Case Studies and Anecdotes -- 1.1.1 A Faculty Feedback System -- 1.1.2 An Unusual Cooperative Effort -- 1.1.3 Lack of Cooperation due to Self Interest -- 1.1.4 An Evil Teammate -- 1.1.5 Thwarting the Evil Union -- 1.2 The Survey: Impact of Subversive Stakeholders On Software Projects -- 1.2.1 Introduction -- 1.2.2 The Survey -- 1.2.3 The Survey Findings -- 1.2.4 Conclusions -- 1.2.5 Impact on Practice -- 1.2.6 Impact on Research -- 1.2.7 Limitations -- 1.2.8 Challenges -- 1.2.9



Acknowledgments -- 1.3 Selected Responses -- 1.3.1 Sample Answers to the Question: "What Were the Motivations and Goals of the Subversive Stakeholders?" -- 1.3.2 Sample Answers to the Question "How Were the Subversive Attacks Discovered?" -- 1.3.3 Sample Answers to the Question "How Can Projects be Defended Against Subversive Stakeholders?" -- 1.4 A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings -- References -- CHAPTER 2 LYING -- 2.1 Introductory Case Studies and Anecdotes -- 2.2 Incidents of Lying: The Survey -- 2.2.1 The Survey Results -- 2.2.2 General Scope -- 2.2.3 An Overview of the Problem -- 2.2.4 Clarifi cation of Terms -- 2.2.5 Discussion -- 2.2.6 Conclusions -- 2.2.7 Limitations -- 2.3 Qualitative Survey Responses on Lying -- 2.4 What Can Be Done About Lying? -- 2.5 The Questionnaire Used in the Survey -- References -- CHAPTER 3 HACKING -- 3.1 Case Studies of Attacks and Biographies of Hackers -- 3.2 Cyber Terrorism and Government-Sponsored Hacking -- 3.3 The Hacker Subculture -- 3.3.1 Why They Are Called "Hackers" -- 3.3.2 Motivation of Hackers -- 3.3.3 Hacker Slang -- 3.3.4 Hacker Ethics.

3.3.5 Public Opinion about Hackers -- 3.4 How a Hacker Is Identified -- 3.5 Time Line of a Typical Malware Attack -- 3.6 Hacker Economy: How Does a Hacker Make Money? -- 3.7 Social Engineering -- 3.7.1 Social Engineering Examples and Case Studies -- 3.7.2 Tactics of Social Engineering -- 3.8 A Lingering Question -- 3.9 Late-Breaking News -- CHAPTER 4 THEFT OF INFORMATION -- 4.1 Introduction -- 4.2 Case Studies -- 4.2.1 Data Theft -- 4.2.2 Source Code Theft -- 4.3 How Do the Victims Find Out That Their Secrets Are Stolen? -- 4.4 Intellectual Property Protection -- 4.4.1 Trade Secret Protection -- 4.4.2 Copyright Protection -- 4.4.3 Patent Protection -- 4.4.4 Steganography -- 4.5 Open Versus Closed Source -- CHAPTER 5 ESPIONAGE -- 5.1 Introduction -- 5.2 What Is Espionage? -- 5.3 Case Studies -- 5.3.1 Sweden Versus Russia -- 5.3.2 Shekhar Verma -- 5.3.3 Lineage III -- 5.3.4 GM versus VW: Jose Ignacio Lopez -- 5.3.5 British Midland Tools -- 5.3.6 Solid Oak Software -- 5.3.7 Proctor & Gamble versus Unilever -- 5.3.8 News Corp Versus Vivendi -- 5.3.9 Spying: Was A TI Chip Really Stolen by a French Spy? -- 5.3.10 Confi cker -- 5.4 Cyber Warfare -- Reference -- CHAPTER 6 DISGRUNTLED EMPLOYEES AND SABOTAGE -- 6.1 Introduction and Background -- 6.2 Disgruntled Employee Data Issues -- 6.2.1 Data Tampering -- 6.2.2 Data Destruction -- 6.2.3 Data Made Public -- 6.2.4 Theft Via Data -- 6.3 Disgruntled Employee Software Issues -- 6.3.1 Software Destruction -- 6.4 Disgruntled Employee System Issues -- 6.5 What to Do About Disgruntled Employee Acts -- 6.6 Sabotage -- References -- CHAPTER 7 WHISTLE-BLOWING -- 7.1 A Hypothetical Scenario -- 7.2 Whistle-Blowing and Software Engineering -- 7.3 More Case Studies and Anecdotes -- 7.3.1 Jeffrey Wigand and Brown and Williamson Tobacco -- 7.3.2 A Longitudinal Study of Whistle-Blowing -- 7.3.3 An Even More Pessimistic View -- 7.3.4 Academic Whistle-Blowing -- 7.3.5 The Sum Total of Whistle-Blowing -- References -- APPENDIX TO CHAPTER 7 PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING.

References -- PART 2: VIEWPOINTS ON DARK SIDE ISSUES -- Introduction -- CHAPTER 8 OPINIONS, PREDICTIONS, AND BELIEFS -- 8.1 Automated Crime (Donn B. Parker) -- Information Sources -- 8.2 Let's Play Make Believe (Karl E. Wiegers) -- Reference -- 8.3 Dark, Light, or Just Another Shade of Grey? (Les Hatton) -- 8.4 Rational Software Developers as Pathological Code Hackers (Norman Fenton) -- CHAPTER 9 PERSONAL ANECDOTES -- 9.1 An Offi cer and a Gentleman Confronts the Dark Side (Grady Booch) -- 9.2 Less Carrot and More



Stick (June Verner) -- References -- 9.3 "Them and Us": Dispatches from the Virtual Software Team Trenches (Valentine Casey) -- 9.4 What is it to Lie on a Software Project? (Robert N. Britcher) -- 9.5 "Merciless Control Instrument" and the Mysterious Missing Fax (A. H. (anonymous)) -- 9.6 Forest of Arden (David Alan Grier) -- 9.7 Hard-Headed Hardware Hit Man (Will Tracz) -- 9.8 A Lighthearted Anecdote (Eugene Farmer) -- CONCLUSIONS -- INDEX.

Sommario/riassunto

Betrayal! Corruption! Software Engineering?This is not a book about software project failure, or about prescriptive thinking about how to build software better. This is a book about the evil things that happen on computing and software projects-what the kinds of evil are, how they manifest themselves, and what the good guys can do about them.In this timely report on vice at every level of software project management, industry experts Johann Rost and Robert Glass explore the seamy underbelly of software engineering. Based on the authors' original research and augmented by frank insights from other well-respected figures, The Dark Side of Software Engineering consists of anecdotes about occurrences of the practices, an analysis of research findings in the context of the anecdotes, and some suggestions on what to do about the dark side. Discussions draw from the software and information technology literature and from the management literature specific to these topics.This is a book full of surprises-to be read by both software and computing practitioners and academics. It addresses seven "dark side matters" of software project work that involve dubious management and technologist practices, including:. Subversion. Espionage. Lying. Disgruntled employees and sabotage. Hacking. Whistleblowing. Theft of informationWritten in a quick-reading journalistic style, The Dark Side of Software Engineering goes where other management studies fear to tread-a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.



3.

Record Nr.

UNINA9910955866303321

Titolo

Spirit mediumship and society in Africa / / edited by John Beattie and John Middleton

Pubbl/distr/stampa

London ; ; New York : , : Routledge, , 2004

ISBN

1-136-52772-9

1-136-52765-6

1-315-01719-9

Edizione

[1st ed.]

Descrizione fisica

1 online resource (351 p.)

Collana

Routledge library editions. Anthropology and ethnography. Africa ; ; I

Routledge library editions. Anthropology and ethnography

Altri autori (Persone)

BeattieJohn

MiddletonJohn <1921->

Disciplina

398.4/5

Soggetti

Witchcraft - Africa

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

First published in 1969.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Title Page; Copyright; CONTENTS; FOREWORD; ACKNOWLEDGEMENTS; INTRODUCTION; WEST AFRICA; SPIRIT POSSESSION IN GHANA; TYPES OF SPIRIT POSSESSION IN KALABARI RELIGION; TRANCE AND CONVENTION INNAGO-YORUBA SPIRIT MEDIUMSHIP; CENTRAL AND SOUTH AFRICA; SPIRIT POSSESSION AMONG THE TONGA OF ZAMBIA; SPIRIT MEDIUMS AS MEDIATORS IN VALLEY KOREKORE SOCIETY; SPIRIT POSSESSION AMONG THE ZULU; EAST AFRICA; SPIRIT MEDIUMSHIP IN BUNYORO; THE SHETANI CULT AMONG THE SEGEJU OF TANZANIA; SPIRIT POSSESSION IN NORTHERN SOMALILAND; SPIRIT POSSESSION AMONG THE LUGBARA

SPIRIT POSSESSION AND MEDIUMSHIP AMONG THE ALURTHE THEORY AND PRACTICE OF SUKUMA SPIRIT MEDIUMSHIP; SPIRIT INITIATION IN ANKOLE AND A CHRISTIAN SPIRIT MOVEMENT IN WESTERN KENYA; INDEX

Sommario/riassunto

Gathering together under a single cover material from a wide range of African societies, this volume allows similarities and differences to be easily perceived and suggests social correlates of these in terms of age, sex, marital status, social grading and wealth. It includes material on both traditional and modern cults.