|
|
|
|
| | Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press)SSCP Certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. For anyone who is serious about becoming a leading tactician at the front lines, the (ISC)²® Systems Security Certified Practitioner (SSCP®) Certification is an absolute necessity-demanded by cutting-edge... | | Effective Software Maintenance and Evolution: A Reuse-Based ApproachAlmost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are... |
|
Understanding IPTV (Informa Telecoms & Media)Just when we thought we had mastered modern communications-related acronyms, a new one has appeared. That acronym, IPTV, which is the subject of this book, represents an emerging technology that could change the manner by which we receive home entertainment, obtain training, operate our personal computers, and even use our cell phones. The acronym... | | | | Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... |
|
Information Security Management Handbook, Sixth Edition (Isc2 Press)A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion... | | Applied Software Risk Management: A Guide for Software Project ManagersFew software projects are completed on time, on budget, and to their original specification. Research supports that projects usually fail due to management, rather than technical, mistakes. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software... | | Antipatterns: Identification, Refactoring, and ManagementAntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful... |
|
The Art of Software ModelingUsing a multidisciplinary approach, The Art of Software Modeling covers model theory, practice, and presentation in detail. This book describes the driving need for model creation and demonstrates how to create system models. Presenting model examples of business workflows, requirements capture, and software architecture documentation, the text... | | 802.1X Port-Based AuthenticationWritten to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of... | | Modeling Software with Finite State Machines: A Practical ApproachThis book discusses a topic that is among the central questions of software development. Therefore, we must position ourselves in that area to justify our right to express our opinion on that topic. Saying “we” implies at least one person in the co-author group. We have worked for several years in software development using various... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |