Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)

Tensor Product Model Transformation in Polytopic Model-Based Control offers a new perspective of control system design. Instead of relying solely on the formulation of more effective LMIs, which is the widely adopted approach in existing LMI-related studies, this cutting-edge book calls for a systematic modification and...

CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

Usability: Turning Technologies into Tools
Usability: Turning Technologies into Tools
"The book contains much insight." --B. Hazeltine, Computing Reviews

"Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of
...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring presents in one volume the broad spectrum of monitoring tools, both available and under development, and provides an assessment of their potential for underpinning environmental management and legislation. The book explores screening methods in the context of water policies;...
php architect's Guide to PHP Security|
php architect's Guide to PHP Security|
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.

Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on...

Systems Approach to Engineering Design (Artech House Telecommunications Library)
Systems Approach to Engineering Design (Artech House Telecommunications Library)
This comprehensive resource shows how to incorporate systems thinking & systems engineering techniques into every stage of the design process from concept inception, testing, & quality assurance, to implementation, delivery, & upgrading

As high-tech engineering organizations learn to do more with less, they
...
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy