|
|
|
|
The Debugger's HandbookFocused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger's Handbook promotes a natural debugging approach to writing code. The author begins by examining and concretely defining just what a bug is, what circumstances are more prone to producing bugs, and how to avoid them from the... | | Official (ISC)® Guide to the CISSP®-ISSEP® CBK®Official (ISC)2Ю Guide to the CISSP-ISSEPЮ CBKЮ provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, it promotes understanding of the four ISSEP domains. It explains ISSE by comparing it to a traditional Systems Engineering model,... | | Application Servers for E-BusinessApplication Servers for E-Business presents a comprehensive overview of the technologies related to application servers in their facilitation of E-business. These technologies includes CORBA, Java, Enterprise Java Beans, Java 2, web servers, and legacy systems. It explores the role these servers play in the modern enterprise IT infrastructure... |
|
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance ImprovesSoftware Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and... | | Complete Guide to CISM CertificationComplete Guide to CISMЮ Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,... | | Service Oriented EnterprisesThis comprehensive resource covers all the components, issues, standards, and technologies that create a service-oriented enterprise. Filled with real-world examples, Service Oriented Enterprises shows IT managers, CIOs, software architects, software developers, innovative and practical service-oriented solutions. Its framework for aligning... |
|
|
Context-Aware Pervasive Systems: Architectures for a New Breed of ApplicationsThe concept of aware systems is one of the most exciting trends in computing today, fueled by recent developments in pervasive computing. This book introduces a new breed of computer applications that are termed "context-aware pervasive systems" and provides architectural blueprints for building context-aware behavior into... | | Wireless Mesh Networking: Architectures, Protocols and StandardsThis is the first book to provide readers a comprehensive technical guide covering recent and open issues in wireless mesh networks. Wireless Mesh Networking: Architectures, Protocols and Standards explores the various key challenges in diverse scenarios as well as emerging standards, including capacity and scalability. It focuses on concepts,... | | Multi-Objective Optimization in Computer Networks Using MetaheuristicsMany new multicast applications emerging from the Internet, such as Voice-over-IP (VoIP), videoconference, TV over the Internet, radio over the Internet, video streaming multipoint, etc., have the following resource requirements: bandwidth consumption, end-to-end delay, delay jitter, packet loss ratio, and so forth. It is therefore necessary to... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 |