Visual Studio Team System: Better Software Development for Agile Teams
Author: Will Stott
<>Make the Most of Visual Studio Team System in Real-World Agile Development
Visual Studio Team System (VSTS) gives Microsoft development teams a powerful, integrated toolset for Agile development. Visual Studio Team System: Better Software Development for Agile Teams is a comprehensive, start-to-finish guide to making the most of VSTS in real-world Agile environments.
Using a book-length case study, the authors show how to use VSTS to improve every aspect of software development, step by step–from project planning through design and from coding through testing and deployment.
Agile consultant Will Stott and Microsoft development lead James Newkirk carefully integrate theory and practice, offering hands-on exercises, practical insights into core Extreme Programming (XP) techniques, and much more.
Coverage includes
- Using VSTS to support the transition to Agile values and techniques
- Forming Agile teams and building effective process frameworks
- Leveraging Team Foundation Version Control to help teams manage change and share their code effectively
- Implementing incremental builds and integration with Team Foundation Build
- Making the most of VSTS tools for Test-Driven Development and refactoring
- Bringing agility into software modeling and using patterns to model solutions more effectively
- Using the FIT integrated testing framework to make sure customers are getting what they need
- Estimating, prioritizing, and planning Agile projects
Preface
Acknowledgments
Aboutthe Authors
Introduction: Broken Process
Section 1: Apply Sharp Tools and Values
Chapter 1: Introduction to Visual Studio Team System
Chapter 2: Agile Values
Review of Section 1: Sharp Tools and Values
Section 2: Introduce Agile Development
Chapter 3: Overview of Agile Development
Chapter 4: Forming an Agile Team
Chapter 5: Team Foundation Process Frameworks
Chapter 6: Improving Your Process Framework
Review of Section 2: Introduce Agile Development
Section 3: Use Version Control
Chapter 7: Managing Change
Chapter 8: Setting Up TFS Version Control
Chapter 9: Using TFVC in Your Project
Chapter 10: Policing Your Project with TFVC
Review of Section 3: Use Version Control
Section 4: Build and Integrate Often
Chapter 11: Building and Integrating Software
Chapter 12: Working with Team Foundation Build
Review of Section 4: Build and Integrate Often
Section 5: Practice Test-Driven Development
Chapter 13: Introduction to TDD
Chapter 14: Developing Your First Tests
Chapter 15: Learning to Refactor
Chapter 16: Code Coverage and Performance
Chapter 17: Integrating TFP Code with a User Interface
Review of Section 5: Practice Test-Driven Development
Section 6: Explore by Modeling
Chapter 18: Modeling with Agility
Chapter 19: Creating Models
Chapter 20: Using Models in an Agile Project
Chapter 21: Modeling Solutions with Patterns
Review of Section 6: Explore by Modeling
Section 7: Implement Customer Testing
Chapter 22: Involving Customers in Testing
Chapter 23: Creating FIT Fixtures
Chapter 24: Running FIT with Team Foundation Build
Review of Section 7: Implement Customer Testing
Section 8: Estimate, Prioritize, and Plan
Chapter 25: Estimating and Prioritizing Stories
Chapter 26: Agile Planning
Chapter 27: Managing Agile Projects
Review of Section 8: Estimate, Prioritize, and Plan
Section 9: Practice for Deployment
Chapter 28: Moving into Production
Chapter 29: Developing Installation Programs
Chapter 30: Deployment of Distributed Systems
Review of Section 9: Practice for Deployment
Section 10: Provide and Reveal Value
Chapter 31: Producing Technical Reports
Chapter 32: Generating Business Value
Review of Section 10: Provide and Reveal Value
Retrospective: Fixing the Process
Appendixes
Appendix A: Setting Up VSTS for the Exercises
Appendix B: Software Project Environment for a Small Team
Appendix C: Agile Workspace 753 List of Exercises
List of Extreme Programming Practices
Glossary
Bibliography
Resources
Index
This book is for working software developers, architects, testers, and managers in real teams–professionals who are either transitioning to VSTS or considering doing so. It will help you start deriving value from VSTS immediately, as you lay a solid foundation for ongoing process improvement.
Books about: Economics and Contemporary Issues or Japans New Economy
UNIX and Linux Forensic Analysis
Author: Chris Pogu
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The companion DVD provides a simulated or "live" UNIX environment where readers can test the skills they've learned in the book and use custom tools developed by the authors.
The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of Loadable Kernel Modules and Malware. The companion DVD provides a simulated or "live"UNIX environment where readers can test the skills they've learned in the book and use custom tools developed by the authors.
Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. Not only are the tools provided, but the author also provides sample files so that after completing a detailed walk-through, the reader can immediately practice the new-found skills.
* The companion DVD for the book contains significant, unique materials (movies, spreadsheet, code, etc.) not available any place else.
* This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work.
* The authors have the combined experience of Law Enforcement, Military, and Corporate forensics. This unique perspective makes this book attractive to ALL forensic investigators.
Table of Contents:
Ch. 1 Introduction 1
Ch. 2 Understanding Unix 9
Ch. 3 Live Response: Data Collection 39
Ch. 4 Initial Triage and Live Response: Data Analysis 71
Ch. 5 The Hacking Top 10 99
Ch. 6 The /Proc File System 153
Ch. 7 File Analysis 169
Ch. 8 Malware 183
Appendix Implementing Cybercrime Detection Techniques on Windows and *nix 195
Index 229
No comments:
Post a Comment