SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Software Engineering Risk Management

Software Engineering Risk Management
Finding Your Path through the
Jungle
with Dale Karolak
Description | Content | Expert | Pricing and How to Order | System Requirements

----------
Description                                                                                          Main Screen
Welcome to Software Engineering Risk Management (SERIM). As a
professional associated with the development of software, you are
well aware that the software development process can truly be a
jungle, filled with hazards that lie in wait to sabotage your projects.
These hazards (risks) are numerous and often complex. The purpose
of this application is to help you find a safer path through this jungle
by assessing risk factors, analyzing risks from several different
perspectives, and developing focused action plans to manage risks
before they sabotage your projects. I have used the mathematics of
probability to design the formulas to help you assess and manage
risks in the complex software development environment (Complete
information on the SERIM ModelÕs equations is included in this
application.)                                                                                         Description

You can use the SERIM application to monitor risks at any point in the
development cycle. You can perform your SERIM assessments on a
regular schedule for each project, or as indicated by your own
observations. Or you can combine these two strategies to manage
risks as your projects develop. Whatever strategy you choose, the
SERIM approach will help you find a safer path through the jungle! I
wish you success in using this application to manage risks for your
software projects. With best regards from a fellow explorer, Dale
Karolak.
TOP


Content                                                                                 Assessment Organization

This interactive, easy-to-use Windows 95 application gives you an
automated way to determine the risks of your software project. This
unique software tool lets you determine within minutes how risky
your software project is during all stages of development. The product
is based on the SERIM model in the best selling book Software
Engineering Risk Management. Its design is based on proven software
risk management processes and uses metrics that measure software
risks for your project.
The software package:
   q Identifies different risks for technical implementation, cost and
     schedule                                                                             Analytical Perspective:
      q    Predicts risks by software development phases                          Development Phases - Screen 1

      q    Provides a means for corrective action to reduce risks
      q    Identifies the effectiveness of your software risk management
           activities
      q    Measures the risk associated with your software product and


(1 of 4)
Software Engineering Risk Management

           process
      q    Is user friendly and comes with example projects
      q    Handles multiple projects for analyzing software risks The
           SERIM software application contains three modules:
           1. Project Description Within this module, you will enter some
           basic identifying information about your project. When you have
           completed the Project Description, return to the main screen
           and click on the picture of the explorer holding the map to go to
           the next module, Project Assessment.
                                                                                        Analytical Perspective
           2. Project Assessment Within the Project Assessment, you will        Development Phases - Screen 2
           assign ratings on a scale of 0 to 10 ("*" for not applicable) to a
           series of metric questions within ten categories of risk factors.
           You will need to complete the Project Description and Project
           Assessment modules before proceeding to the Analytical
           Perspectives, so that the application can use your assessment
           ratings to calculate your projectÕs risk scores. When your
           Project Assessment is complete, analyze your project's risk by
           choosing any of the five Analytical Perspectives.
           3. Analytical Perspectives Choosing an Analytical Perspective
           provides you with a way to look at your projectÕs risks from
           one of five different points of view. Analyzing your projectÕs
           risks from five different points of view will enable you to focus
           on problem areas, and create action plans to improve your                    Analytical Perspective:
                                                                                Development Phases - Screen 3
           projectÕs potential for success. To choose an Analytical
           Perspective, click on the picture of the animal representing the
           desired perspective. You can work through any or all of the
           perspectives, in any order you choose. As you work through
           each analytical perspective, you will be able to create an action
           plan to raise the score of any individual metric question.
TOP

                 The five perspectives listed below.
                 1. Risk Factors This perspective helps you to
                 analyze how each of the ten risk factors impacts
                 your project.
                                                                                        Analytical Perspective:
                                                                                Development Phases - Screen 4
                 2. Risk Elements This perspective helps you analyze
                 the data from your assessment of the 10 risk
                 factors as they impact Technical Risks, Cost Risks,
                 Schedule Risks.

                 3. Risk Categories This perspective helps you
                 analyze the data from your assessment of the 10
                 risk factors as they impact Process and Product.
                 4. Risk Activities This perspective helps you analyze
                 the data from your assessment of the 10 risk
                 factors as they impact Risk Identification, Risk
                 Strategy and Planning, Risk Assessment, Risk
                 Mitigation and Avoidance, Risk Reporting, and Risk                           Summary Screen
                 Prediction. (Within each activity, risks are
                 considered from the operational, strategic,
                 technical, business, industry, and practitioner points
                 of view.)



(2 of 4)
Software Engineering Risk Management

                  5. Development Phases This perspective helps you
                  analyze the data from your assessment of the 10
                  risk factors as they impact each phase of software
                  development cycle Pre-Requirements,
                  Requirements, Design, Coding, Testing, and
                  Delivery and Maintenance.
TOP




           Expert

           Dr. Dale Walter Karolak is currently an Engineering
           Director at TRW Automotive Electronics. His previous
           positions include Software and System Engineering
           Manager at ITT Aerospace / Communications, and
           Software Engineer at GTE Communications Systems R&D
           Labs. He received his Ph.D. in Software Engineering from
           The Union Institute in Cincinnati, Ohio, his MBA from the
           University of Phoenix, and his BS in Computer Science
           from Central Michigan University.
           Dr. Karolak is the author of the IEEE's best selling book,
           Software Engineering Risk Management. He has
           presented and published over 10 papers in the areas of
           software management, metrics, reliability, quality, testing
           and architecture at IEEE, ACM, NSIA, Association of
           Management, Applied Software Measurement,
           International Software Engineering Research Forum and
           Medical Device conferences and journals. He also holds a
           patent on "Communication Management System
           Architecture," and has three other software architecture
           and communication patents pending. He is a member of
           the IEEE, ACM and SAE societies.
TOP


           Pricing and How to Order
           IEEE Members $180.00
           Non-members $210.00
           Visit IEEE's website for ordering information.
           Refer to Catalog # SW07970 when ordering.
           Includes CD-Rom and Reference Guide November 1997.
           ISBN 0-8186-7970-0.



           System Requirements
              q   DOS 6.0 or higher
              q   Microsoft Windows 95
              q   An IBM-compatible computer with a Pentium 66 or
                  higher processor
              q   Windows-compatible mouse or other pointing device
              q   A standard VGA monitor (SVGA is preferred)



(3 of 4)
Software Engineering Risk Management

           q   Hard disk with at least 30 MB of free storage
           q   16 MB RAM
           q   CD-ROM drive for installation
TOP




(4 of 4)

Mais conteúdo relacionado

Mais procurados

Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk ManagementMinhas Kamal
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product DevelopmentAmandeep Midha
 
risk management
risk managementrisk management
risk managementArti Maggo
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Adnan Naseem
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk ManagementAchmad Solichin
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk managementPractiTest
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk ManagementGlen Alleman
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual EssayPrince Bertrand
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment templateGlen Alleman
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfPriyanshTan
 
Risk Management Plan Analysis PowerPoint Presentation Slides
Risk Management Plan Analysis PowerPoint Presentation Slides Risk Management Plan Analysis PowerPoint Presentation Slides
Risk Management Plan Analysis PowerPoint Presentation Slides SlideTeam
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software IndustryRehan Akhtar
 

Mais procurados (20)

Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk Management
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
risk management
risk managementrisk management
risk management
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk Management
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual Essay
 
Risk assesment
Risk assesmentRisk assesment
Risk assesment
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 
Risk Management Plan Analysis PowerPoint Presentation Slides
Risk Management Plan Analysis PowerPoint Presentation Slides Risk Management Plan Analysis PowerPoint Presentation Slides
Risk Management Plan Analysis PowerPoint Presentation Slides
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software Industry
 
Risk management
Risk managementRisk management
Risk management
 

Destaque

Karolak Recommedaon
Karolak RecommedaonKarolak Recommedaon
Karolak Recommedaonpstead
 
K Field Rec
K Field RecK Field Rec
K Field Recpstead
 
Analysis on Ford’s social media strategy
Analysis on Ford’s social media strategyAnalysis on Ford’s social media strategy
Analysis on Ford’s social media strategyarun_getapp
 
The spiral model
The  spiral  modelThe  spiral  model
The spiral modelphatcom10
 
Spiral model : System analysis and design
Spiral model : System analysis and designSpiral model : System analysis and design
Spiral model : System analysis and designMitul Desai
 
Spiral model explanation
Spiral model  explanationSpiral model  explanation
Spiral model explanationUmar Farooq
 
Spiral model presentation
Spiral model presentationSpiral model presentation
Spiral model presentationSayedFarhan110
 

Destaque (8)

Karolak Recommedaon
Karolak RecommedaonKarolak Recommedaon
Karolak Recommedaon
 
K Field Rec
K Field RecK Field Rec
K Field Rec
 
Analysis on Ford’s social media strategy
Analysis on Ford’s social media strategyAnalysis on Ford’s social media strategy
Analysis on Ford’s social media strategy
 
The spiral model
The  spiral  modelThe  spiral  model
The spiral model
 
Spiral model : System analysis and design
Spiral model : System analysis and designSpiral model : System analysis and design
Spiral model : System analysis and design
 
Spiral model
Spiral modelSpiral model
Spiral model
 
Spiral model explanation
Spiral model  explanationSpiral model  explanation
Spiral model explanation
 
Spiral model presentation
Spiral model presentationSpiral model presentation
Spiral model presentation
 

Semelhante a Software Engineering Risk Management Software Application

Risk-management
 Risk-management Risk-management
Risk-managementUmesh Gupta
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software PlanningMuhammad Alhalaby
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationSonata Software
 
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsThierry Zoller
 
Computer courses in chandigharh - CBitss Technologies
Computer courses in chandigharh - CBitss Technologies Computer courses in chandigharh - CBitss Technologies
Computer courses in chandigharh - CBitss Technologies Cbitss Technologies
 
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxInflectra
 
Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringVijayapriyaP1
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycleEnov8
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Risky projectcloudpresentation
Risky projectcloudpresentationRisky projectcloudpresentation
Risky projectcloudpresentationIntaver Insititute
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptMuhammadKashif703372
 
Elements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDsElements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDsEMMAIntl
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessInvensis Learning
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxYaseenNazir3
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)ShudipPal
 

Semelhante a Software Engineering Risk Management Software Application (20)

Risk-management
 Risk-management Risk-management
Risk-management
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Bai giang-spm-06mar14
Bai giang-spm-06mar14Bai giang-spm-06mar14
Bai giang-spm-06mar14
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
 
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
 
Computer courses in chandigharh - CBitss Technologies
Computer courses in chandigharh - CBitss Technologies Computer courses in chandigharh - CBitss Technologies
Computer courses in chandigharh - CBitss Technologies
 
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Risky projectcloudpresentation
Risky projectcloudpresentationRisky projectcloudpresentation
Risky projectcloudpresentation
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Elements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDsElements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDs
 
Risk management
Risk managementRisk management
Risk management
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Software engineering the product
Software engineering the productSoftware engineering the product
Software engineering the product
 
Software Engineering1-1.pptx
Software Engineering1-1.pptxSoftware Engineering1-1.pptx
Software Engineering1-1.pptx
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 

Mais de guestfea9c55 (10)

14 Kotel
14 Kotel14 Kotel
14 Kotel
 
Nato1968
Nato1968Nato1968
Nato1968
 
Asundi
AsundiAsundi
Asundi
 
03
0303
03
 
Ch1
Ch1Ch1
Ch1
 
9 Nguyen Ly Dem Co Ban
9  Nguyen Ly Dem Co Ban9  Nguyen Ly Dem Co Ban
9 Nguyen Ly Dem Co Ban
 
Culture
CultureCulture
Culture
 
Lecture08
Lecture08Lecture08
Lecture08
 
Thuat Toan
Thuat ToanThuat Toan
Thuat Toan
 
Thuat Toan 2
Thuat Toan 2Thuat Toan 2
Thuat Toan 2
 

Software Engineering Risk Management Software Application

  • 1. Software Engineering Risk Management Software Engineering Risk Management Finding Your Path through the Jungle with Dale Karolak Description | Content | Expert | Pricing and How to Order | System Requirements ---------- Description Main Screen Welcome to Software Engineering Risk Management (SERIM). As a professional associated with the development of software, you are well aware that the software development process can truly be a jungle, filled with hazards that lie in wait to sabotage your projects. These hazards (risks) are numerous and often complex. The purpose of this application is to help you find a safer path through this jungle by assessing risk factors, analyzing risks from several different perspectives, and developing focused action plans to manage risks before they sabotage your projects. I have used the mathematics of probability to design the formulas to help you assess and manage risks in the complex software development environment (Complete information on the SERIM ModelÕs equations is included in this application.) Description You can use the SERIM application to monitor risks at any point in the development cycle. You can perform your SERIM assessments on a regular schedule for each project, or as indicated by your own observations. Or you can combine these two strategies to manage risks as your projects develop. Whatever strategy you choose, the SERIM approach will help you find a safer path through the jungle! I wish you success in using this application to manage risks for your software projects. With best regards from a fellow explorer, Dale Karolak. TOP Content Assessment Organization This interactive, easy-to-use Windows 95 application gives you an automated way to determine the risks of your software project. This unique software tool lets you determine within minutes how risky your software project is during all stages of development. The product is based on the SERIM model in the best selling book Software Engineering Risk Management. Its design is based on proven software risk management processes and uses metrics that measure software risks for your project. The software package: q Identifies different risks for technical implementation, cost and schedule Analytical Perspective: q Predicts risks by software development phases Development Phases - Screen 1 q Provides a means for corrective action to reduce risks q Identifies the effectiveness of your software risk management activities q Measures the risk associated with your software product and (1 of 4)
  • 2. Software Engineering Risk Management process q Is user friendly and comes with example projects q Handles multiple projects for analyzing software risks The SERIM software application contains three modules: 1. Project Description Within this module, you will enter some basic identifying information about your project. When you have completed the Project Description, return to the main screen and click on the picture of the explorer holding the map to go to the next module, Project Assessment. Analytical Perspective 2. Project Assessment Within the Project Assessment, you will Development Phases - Screen 2 assign ratings on a scale of 0 to 10 ("*" for not applicable) to a series of metric questions within ten categories of risk factors. You will need to complete the Project Description and Project Assessment modules before proceeding to the Analytical Perspectives, so that the application can use your assessment ratings to calculate your projectÕs risk scores. When your Project Assessment is complete, analyze your project's risk by choosing any of the five Analytical Perspectives. 3. Analytical Perspectives Choosing an Analytical Perspective provides you with a way to look at your projectÕs risks from one of five different points of view. Analyzing your projectÕs risks from five different points of view will enable you to focus on problem areas, and create action plans to improve your Analytical Perspective: Development Phases - Screen 3 projectÕs potential for success. To choose an Analytical Perspective, click on the picture of the animal representing the desired perspective. You can work through any or all of the perspectives, in any order you choose. As you work through each analytical perspective, you will be able to create an action plan to raise the score of any individual metric question. TOP The five perspectives listed below. 1. Risk Factors This perspective helps you to analyze how each of the ten risk factors impacts your project. Analytical Perspective: Development Phases - Screen 4 2. Risk Elements This perspective helps you analyze the data from your assessment of the 10 risk factors as they impact Technical Risks, Cost Risks, Schedule Risks. 3. Risk Categories This perspective helps you analyze the data from your assessment of the 10 risk factors as they impact Process and Product. 4. Risk Activities This perspective helps you analyze the data from your assessment of the 10 risk factors as they impact Risk Identification, Risk Strategy and Planning, Risk Assessment, Risk Mitigation and Avoidance, Risk Reporting, and Risk Summary Screen Prediction. (Within each activity, risks are considered from the operational, strategic, technical, business, industry, and practitioner points of view.) (2 of 4)
  • 3. Software Engineering Risk Management 5. Development Phases This perspective helps you analyze the data from your assessment of the 10 risk factors as they impact each phase of software development cycle Pre-Requirements, Requirements, Design, Coding, Testing, and Delivery and Maintenance. TOP Expert Dr. Dale Walter Karolak is currently an Engineering Director at TRW Automotive Electronics. His previous positions include Software and System Engineering Manager at ITT Aerospace / Communications, and Software Engineer at GTE Communications Systems R&D Labs. He received his Ph.D. in Software Engineering from The Union Institute in Cincinnati, Ohio, his MBA from the University of Phoenix, and his BS in Computer Science from Central Michigan University. Dr. Karolak is the author of the IEEE's best selling book, Software Engineering Risk Management. He has presented and published over 10 papers in the areas of software management, metrics, reliability, quality, testing and architecture at IEEE, ACM, NSIA, Association of Management, Applied Software Measurement, International Software Engineering Research Forum and Medical Device conferences and journals. He also holds a patent on "Communication Management System Architecture," and has three other software architecture and communication patents pending. He is a member of the IEEE, ACM and SAE societies. TOP Pricing and How to Order IEEE Members $180.00 Non-members $210.00 Visit IEEE's website for ordering information. Refer to Catalog # SW07970 when ordering. Includes CD-Rom and Reference Guide November 1997. ISBN 0-8186-7970-0. System Requirements q DOS 6.0 or higher q Microsoft Windows 95 q An IBM-compatible computer with a Pentium 66 or higher processor q Windows-compatible mouse or other pointing device q A standard VGA monitor (SVGA is preferred) (3 of 4)
  • 4. Software Engineering Risk Management q Hard disk with at least 30 MB of free storage q 16 MB RAM q CD-ROM drive for installation TOP (4 of 4)