Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reliability Engineering: Theory and Applications (Advanced Research in Reliability and System Assurance Engineering)
Reliability Engineering: Theory and Applications (Advanced Research in Reliability and System Assurance Engineering)

Reliability theory is a multidisciplinary science aimed at developing complex systems that are resistant to failures. Reliability engineering has emerged as a main field not only for scientists and researchers, but also for engineers and industrial managers. This book covers the recent developments in reliability engineering. It...

High-Assurance Design : Architecting Secure and Reliable Enterprise Applications
High-Assurance Design : Architecting Secure and Reliable Enterprise Applications

How to Design for Software Reliability, Security, and Maintainability

Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile. They compensate by investing heavily in workarounds and maintenance, and by employing hordes of...

Enterprise JavaBeans 2.1
Enterprise JavaBeans 2.1

Enterprise JavaBeans (EJB) is a server-side component model for transaction-aware distributed enterprise applications, written in the Java programming language. Enterprise JavaBeans 2.1 details the architecture of the Enterprise JavaBeans component model.

After the authors introduce the component paradigm, they move on to...

Practical Software Testing
Practical Software Testing
Stions of this new direction can be found, for example, in the ‘‘Software
Engineering Body of Knowledge (SWEBOK)’’ and the code of ethics that
have been developed recently through the efforts of joint IEEE/ACM task
forces [1,2]. Licensing procedures for software engineers are also under
development.
...
Designing with Web Standards
Designing with Web Standards

You code. And code. And code. You build only to rebuild. You focus on making your site compatible with almost every browser or wireless device ever put out there. Then along comes a new device or a new browser, and you start all over again.

You can get off the merry-go-round.

...
Pro Oracle SQL (Expert's Voice in Oracle)
Pro Oracle SQL (Expert's Voice in Oracle)

Pro Oracle SQL, Second Edition unlocks the power of SQL in the Oracle database—one of the most potent SQL implementations on the market today. To master it requires a multi-pronged approach: learn the language features, learn how and why the language features work, learn the supporting features that Oracle provides to help...

Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Construction Waterproofing Handbook
Construction Waterproofing Handbook
The Latest Waterproofing Techniques and Technology

Fully updated to include new techniques for mold remediation, Construction Waterproofing Handbook simplifies the critical task of keeping a building's envelope watertight. It begins with a tutorial on basic waterproofing concepts and materials, then moves on to the...

Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy