Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Usability: Turning Technologies into Tools
Usability: Turning Technologies into Tools
"The book contains much insight." --B. Hazeltine, Computing Reviews

"Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of
...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring presents in one volume the broad spectrum of monitoring tools, both available and under development, and provides an assessment of their potential for underpinning environmental management and legislation. The book explores screening methods in the context of water policies;...
php architect's Guide to PHP Security|
php architect's Guide to PHP Security|
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.

Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on...

Systems Approach to Engineering Design (Artech House Telecommunications Library)
Systems Approach to Engineering Design (Artech House Telecommunications Library)
This comprehensive resource shows how to incorporate systems thinking & systems engineering techniques into every stage of the design process from concept inception, testing, & quality assurance, to implementation, delivery, & upgrading

As high-tech engineering organizations learn to do more with less, they
...
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Test-Driven JavaScript Development (Developer's Library)
Test-Driven JavaScript Development (Developer's Library)

For JavaScript developers working on increasingly large and complex projects, effective automated testing is crucial to success. Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript...

Flow Cytometry in Hematopathology: A Visual Approach to Data Analysis and Interpretation (Current Clinical Pathology)
Flow Cytometry in Hematopathology: A Visual Approach to Data Analysis and Interpretation (Current Clinical Pathology)

Flow cytometry immunophenotyping of hematopoietic disorders is a complex and demanding exercise that requires a good understanding of cell lineages, developmental pathways, and physiological changes, as well as broad experience in hematopathology. The process includes several interrelated stages, from the initial medical decision regarding...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy