Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)

Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and...

Visual Studio 2012 and .NET 4.5 Expert Development Cookbook
Visual Studio 2012 and .NET 4.5 Expert Development Cookbook

Put Visual Studio and .NET together and the results are empowering. With over 40 recipes in this Cookbook you can learn to integrate them both to achieve unparalleled results in applications that are in tune with modern technologies.

Overview

  • Step-by-step instructions to learn the power of .NET...
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Getting Started with SQL Server 2012 Cube Development
Getting Started with SQL Server 2012 Cube Development

Written specifically for SQL Server developers, this is a great primer on Analysis Services and cube development. With lots of practical exercises and real-world scenarios, you'll be up and running in no time.

Overview

  • Learn how to develop a complete business intelligence solution using SQL Server...
FISMA Compliance Handbook: Second Edition
FISMA Compliance Handbook: Second Edition

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Hudson 3 Essentials
Hudson 3 Essentials

Here is a book that makes life easier for Java developers or administrators by teaching you how to automate application testing using Hudson 3. Fast-paced and hands-on, the guide covers everything from installation to writing plugins.

Overview

  • A practical guide that will teach you how to deploy Hudson 3...
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring...

Algorithms from and for Nature and Life: Classification and Data Analysis (Studies in Classification, Data Analysis, and Knowledge Organization)
Algorithms from and for Nature and Life: Classification and Data Analysis (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume provides approaches and solutions to challenges occurring at the interface of research fields such as, e.g., data analysis, data mining and knowledge discovery, computer science, operations research, and statistics. In addition to theory-oriented contributions various application areas are included. Moreover, traditional...

Innovating Analytics: How the Next Generation of Net Promoter Can Increase Sales and Drive Business Results
Innovating Analytics: How the Next Generation of Net Promoter Can Increase Sales and Drive Business Results

How does a CEO, manager, or entrepreneur begin to sort out what defines and drives a good customer experience and how it can be measured and made actionable? If you know how well the customer experience is satisfying your customers and you know how to increase their satisfaction, you can then increase sales, return visits, recommendations,...

Accelerating MATLAB with GPU Computing: A Primer with Examples
Accelerating MATLAB with GPU Computing: A Primer with Examples

Beyond simulation and algorithm development, many developers increasingly use MATLAB even for product deployment in computationally heavy fields. This often demands that MATLAB codes run faster by leveraging the distributed parallelism of Graphics Processing Units (GPUs). While MATLAB successfully provides high-level functions as a simulation...

The Economics of Information Security and Privacy
The Economics of Information Security and Privacy

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and...

Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy