Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Chemical Analysis of Antibiotic Residues in Food
Chemical Analysis of Antibiotic Residues in Food

An insightful exploration of the key aspects concerning the chemical analysis of antibiotic residues in food

The presence of excess residues from frequent antibiotic use in animals is not only illegal, but can pose serious health risks by contaminating products for human consumption such as meat and milk. Chemical...

Network+ 2005 Q&A
Network+ 2005 Q&A
"Network+ 2005 Q&A" is a straightforward, cut-and-dry guide to preparing for the Network+ exam. Providing 800 questions and answers for the new Network+ exam, this no-fluff guide is designed to encourage self-study. Test your skills as you work through each question and then check your answers at the end of each chapter. You`ll get...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Research Directions in Data and Applications Security XVIII
Research Directions in Data and Applications Security XVIII

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and...

IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)

The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy