Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

MEMS and Microstructures in Aerospace Applications
MEMS and Microstructures in Aerospace Applications

The promise of MEMS for aerospace applications has been germinating for years, and current advances bring the field to the very cusp of fruition. Reliability is chief among the challenges limiting the deployment of MEMS technologies in space, as the requirement of zero failure during the mission is quite stringent for this burgeoning field....

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Handbook of Autopsy Practice
Handbook of Autopsy Practice

In Handbook of Autopsy Practice, Third Edition, Jurgen Ludwig, MD, has painstakingly updated and expanded his recognized "masterpiece" to create an indispensable and invaluable source of classic and innovative procedures for successful autopsy diagnosis and documentation. The section on autopsy methods has been modernized with...

Software Performance and Scalability: A Quantitative Approach
Software Performance and Scalability: A Quantitative Approach

Praise from the Reviewers:

"The practicality of the subject in a real-world situation distinguishes this book from others available on the market."
Professor Behrouz Far, University of Calgary

"This book could replace the computer organization texts now in use that every CS and CpE...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Process Quality Assurance for UML-Based Projects
Process Quality Assurance for UML-Based Projects

Software quality, by its very nature, is elusive. Add to that the issue of ever-changing user requirements and the vagaries of software project management and "quality" can easily become a mere word on a distant horizon. This highly acclaimed book demonstrates how the Unified Modeling Language (UML) can be used within a process...

Performance Testing With JMeter 2.9
Performance Testing With JMeter 2.9

Performance testing with JMeter 2.9 is critical to the success of any software product launch and continued scalability. Irrespective of the size of the application’s user base, it’s vital to deliver the best user experience to consumers. Apache JMeter is an excellent testing tool that provides an insight into how applications...

Software for Dependable Systems: Sufficient Evidence?
Software for Dependable Systems: Sufficient Evidence?
Critical systems are often subject to certiication: a formal assurance that the system has met relevant technical standards designed to ensure it will not unduly endanger the public and can be depended upon to deliver its intended service safely and securely. Today, certiication1 of the dependability of a software-based system usually relies more...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy