Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Handbook of Autopsy Practice
Handbook of Autopsy Practice

In Handbook of Autopsy Practice, Third Edition, Jurgen Ludwig, MD, has painstakingly updated and expanded his recognized "masterpiece" to create an indispensable and invaluable source of classic and innovative procedures for successful autopsy diagnosis and documentation. The section on autopsy methods has been modernized with...

Software Performance and Scalability: A Quantitative Approach
Software Performance and Scalability: A Quantitative Approach

Praise from the Reviewers:

"The practicality of the subject in a real-world situation distinguishes this book from others available on the market."
Professor Behrouz Far, University of Calgary

"This book could replace the computer organization texts now in use that every CS and CpE...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Process Quality Assurance for UML-Based Projects
Process Quality Assurance for UML-Based Projects

Software quality, by its very nature, is elusive. Add to that the issue of ever-changing user requirements and the vagaries of software project management and "quality" can easily become a mere word on a distant horizon. This highly acclaimed book demonstrates how the Unified Modeling Language (UML) can be used within a process...

Performance Testing With JMeter 2.9
Performance Testing With JMeter 2.9

Performance testing with JMeter 2.9 is critical to the success of any software product launch and continued scalability. Irrespective of the size of the application’s user base, it’s vital to deliver the best user experience to consumers. Apache JMeter is an excellent testing tool that provides an insight into how applications...

Software for Dependable Systems: Sufficient Evidence?
Software for Dependable Systems: Sufficient Evidence?
Critical systems are often subject to certiication: a formal assurance that the system has met relevant technical standards designed to ensure it will not unduly endanger the public and can be depended upon to deliver its intended service safely and securely. Today, certiication1 of the dependability of a software-based system usually relies more...
Implementing Quality in Laboratory Policies and Processes: Using Templates, Project Management, and Six Sigma
Implementing Quality in Laboratory Policies and Processes: Using Templates, Project Management, and Six Sigma

The credibility of a laboratory’s reputation is directly affected by its quality assurance program. The key to a successful quality assurance program is the manuals, and associated documents define the program and its various components. Therefore, by extension, a laboratory’s credibility is directly related to its operational and...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Multimedia on Symbian OS: Inside the Convergence Device (Symbian Press)
Multimedia on Symbian OS: Inside the Convergence Device (Symbian Press)
Multimedia on Symbian OS is the only book available to discuss multimedia on Symbian OS at this level. It covers key areas of multimedia technology, with information about APIs and services provided by Symbian OS. Other key features include details of UI platform-specific APIs from S60 and UIQ.

This pioneering book covers each of...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy