Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Debugger's Handbook
The Debugger's Handbook

Focused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger's Handbook promotes a natural debugging approach to writing code. The author begins by examining and concretely defining just what a bug is, what circumstances are more prone to producing bugs, and how to avoid them from the...

Understanding Broadband over Power Line
Understanding Broadband over Power Line
Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of...

The Art of Software Modeling
The Art of Software Modeling
Using a multidisciplinary approach, The Art of Software Modeling covers model theory, practice, and presentation in detail. This book describes the driving need for model creation and demonstrates how to create system models. Presenting model examples of business workflows, requirements capture, and software architecture documentation, the text...
Antipatterns: Identification, Refactoring, and Management
Antipatterns: Identification, Refactoring, and Management
AntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful...
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Real Process Improvement Using the CMMI
Real Process Improvement Using the CMMI
This book offers non-academic, real-world approaches to implementing CMMI-based process improvement in an organization. The author identifies critical concepts of CMMI, and details how to turn them into real process improvement.

Real Process Improvement Using the CMMI provides real-world concepts and techniques for CMMI-based...

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, including both piconets and scatternets, conducted since 2001. The book provides insights into the performance of Bluetooth networks through an analytical approach based upon...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy