Upload
mj
View
212
Download
0
Embed Size (px)
Citation preview
September 2001 115
N E W B O O K S
I nformation Hiding: Steganography andWatermarking—Attacks and Counter-
measures, Neil F. Johnson, Zoran Duric,and Sushil Jajodia. The authors reportresearch in three areas: investigation ofdata hiding and labeling techniques,attacks against steganography and water-marked information, and countermea-sures that assist in protecting digitalwatermarking systems. They analyzemethods for hiding information in digi-tal media to uncover their limitations andassess attacks on these techniques to aidin developing countermeasures that assistin protecting digital watermarking sys-tems.
Johnson and colleagues assert thatsystems for uncovering hidden informa-tion and recovering seemingly lost datawill be useful to law enforcementauthorities in computer forensics anddigital traffic analysis.
Kluwer Academic Publishers, Nor-well, Mass.; http://www.wkap.nl; ISBN0-7923-7204-2; 137 pp.; $95.
RISK ANALYSIS WITH USE CASES
A pplying Use Cases: A PracticalGuide, Second Edition, Geri Schnei-
der and Jason P. Winters. A cutting-edgesoftware development technique, use-case analysis defines a system’s outwardfeatures from the user’s viewpoint. Thisnew edition discusses the Unified Mod-eling Language (UML) version 1.3, eval-uates the pros and cons of use-case doc-umentation techniques, and reviews therelationships between modeling ap-proaches and use cases.
The authors demonstrate how toapply use cases to a project’s inception,requirements and risk analysis, systemarchitecture, scheduling, review and test-ing, and documentation. They describesystem interfaces—people, other soft-
ware, hardware devices, data stores, ornetworks—and review use cases for test-ing architectural designs and ensuringaccuracy. The authors identify commonmistakes and suggest possible solutions,then provide documentation templatesand a UML notation guide. They assertthat use-case analysis plays a role in thenew unified software-development pro-cess and that it can apply to realistic pro-jects.
Addison-Wesley, Boston; http://www.awl.com/cseng/; ISBN 0-201-70853-1;245 pp.; $34.95.
BLOCK-BY-BLOCK CHIP BUILDING
V LSI Design, M. Michael Vai. Writingfrom a digital circuit engineer’s per-
spective, Vai presents an overview ofvery large scale integration technologiesranging from complementary metal-oxide semiconductor design, intellectualproperty cores, and silicon-on-a-chipdesigns to leading-edge, application-spe-cific array processors and fault-tolerantarchitectures. He uses a microprocessorand field-programmable gate array todemonstrate top-down design method-ology.
CRC Press, Boca Raton, Fla.; ISBN 0-8493-1876-9; 406 pp.; $89.95.
CUSTOMER-DRIVEN REQUIREMENTS
E ffective Requirements Practices,Ralph R. Young. Using requirements
practices to redirect resources can satisfycustomers’ real business needs, keep pro-jects on track, reduce costs, and improvequality. Young describes this compre-hensive process and identifies key ele-ments for verifying what customersrequire when they request systems andsoftware solutions.
Young provides guidelines for creat-ing teams that combine the expertise ofcustomers and contractors. He discussesthe impact of change on requirementsand offers steps for managing change tomeet the customers’ needs. To deliversystems swiftly and economically, theauthor believes that developers mustinvest more time in the requirementsprocess.
Addison-Wesley, Boston; http://www.awl.com/cseng/series/it; ISBN 0-201-70912-0; 359 pp.; $39.95.
HUMAN BEHAVIOR: SWARM THEORY
S warm Intelligence, James Kennedyand Russell C. Eberhart, with Yuhui
Shi. The authors argue that intelligenthuman cognition derives from interac-tions among individuals in a social worldand that we can effectively apply thesociocognitive view to computationallyintelligent systems. They use the termswarm to describe the social processesthat take place in the human mind and inhigh-dimensional mathematical systems.
The authors describe results of recentexperiments using particle swarm opti-mization algorithms and offer a basicoverview of statistics so that readers cananalyze the results of using the algo-rithms in their own experiments.
Morgan Kaufmann, San Francisco;http://www.mkp.com; ISBN 1-55860-595-9; 512 pp.; $65.95.
Cloaking andUncloaking Data
Editor: Michael J. Lutz, Rochester Institute ofTechnology, Rochester, NY; [email protected]. Send press releases and new booksto Stephanie Kawada, 10662 Los VaquerosCircle, Los Alamitos, CA 90720; fax +1 714821 4010; [email protected].