Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Process Improvement with CMMI® v1.2 and ISO Standards
Process Improvement with CMMI® v1.2 and ISO Standards
In this age of globalization, process improvement practitioners must be able to comprehend and work with the different standards and frameworks used around the world. While many systems and software engineering organizations rely on a single standard as the primary driver of process improvement efforts (CMMI®-based process improvement in the...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Manage Software Testing
Manage Software Testing
…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
-Software Testing,
...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
Building Software: A Practitioner's Guide (Auerbach Series on Applied Software Engineering)
Building Software: A Practitioner's Guide (Auerbach Series on Applied Software Engineering)
Novel in its approach to software design, development, and management, Building Software: A Practitioner's Guide shows you how to successfully build and manage a system. The approach the authors recommend is a simple, effective framework known as Solution Engineering Execution (SEE). Through SEE, you create a successful solution by following a...
Defining and Deploying Software Processes
Defining and Deploying Software Processes
I gravitated into the process world several years ago after performing
almost all roles in the software engineering environment — both as a
programmer and in various management positions. That environment
covered both the commercial software development world and the government
contracting software development world. I
...
Essential Software Testing: A Use-Case Approach
Essential Software Testing: A Use-Case Approach
Much has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Focusing on the scientific aspect of network design, Practical Network Design Techniques uses mathematical models to illustrate important networking concepts and show how to solve many common design problems. Taking an inclusive approach, the author examines the cost and performance issues that can also be used by network analysts and designers as...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy