Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

PMP Project Management Professional Study Guide (Certification Press)
PMP Project Management Professional Study Guide (Certification Press)

This book shows you not only what, but how to study for the PMP exam. With 100% complete coverage of all exam objectives and simulated questions, this guide covers project initiation, scope management, quality assurance, and more.

Get the book that shows you not only what—but how—to study

...
MRI in Clinical Practice
MRI in Clinical Practice

"MRI in Clinical Practice" provides an easily accessible source of reference material to supplement existing texts, distilling a wide breadth of theoretical and practical information into a pocket-sized manual. The book covers the basic Physics behind MRI, quality assurance, up-to-date safety guidelines and a useful gallery of image...

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
Configuration Management Principles and Practice
Configuration Management Principles and Practice

Configuration management (CM) is an important, but often neglected, practice that allows application developers and project managers to better identify potential problems, manage changes, and track the progress of software projects. An effective CM strategy—one that adheres to the practice's complexity while harnessing its depth—can...

Enterprise-Scale Agile Software Development (Applied Software Engineering Series)
Enterprise-Scale Agile Software Development (Applied Software Engineering Series)

Enterprise-Scale Agile Software Development is the collective sum of knowledge accumulated during the full-scale transition of a 1400-person organization to agile development—considered the largest implementation of agile development and Scrum ever attempted anywhere in the world.

Now James Schiel, a...

Design Controls for the Medical Device Industry
Design Controls for the Medical Device Industry

This reference provides real-world examples, strategies, and templates for the implementation of effective design control programs that meet current ISO 9000 and FDA QSR standards and regulations-offering product development models for the production of safe, durable, and cost-efficient medical devices and systems.

Details
...

Lessons in Project Management
Lessons in Project Management

Most of the project management books on the market are basically textbooks. They are dry to begin with, and don't focus on the practical advice that most people need to run their projects. Lessons in Project Management, Second Edition does not assume that you are a project manager building a nuclear reactor or sending a...

Testing SAP R/3: A Manager's Step-by-Step Guide
Testing SAP R/3: A Manager's Step-by-Step Guide

Destined to become your essential SAP R/3 desktop reference

Testing SAP R/3: A Manager′s Step–by–Step Guide demystifies this powerful software to enable professionals to implement a disciplined, efficient, and proven approach for testing SAP R/3. Providing much needed industry guidance for...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Written by experienced process improvement professionals who have developed and implemented computer based systems in organizations around the world, Interpreting the CMMIÒ: A Process Improvement Approach, Second Edition provides you with specific techniques for performing process...
Software Product Quality Control
Software Product Quality Control

Quality is not a fixed or universal property of software; it depends on the context and goals of its stakeholders. Hence, when you want to develop a high-quality software system, the first step must be a clear and precise specification of quality. Yet even if you get it right and complete, you can be sure that it will become invalid over...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy