Complete Guide to CISMЮ Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...
The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...
Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...
Rapid Chemical and Biological Techniques for Water Monitoring presents in one volume the broad spectrum of monitoring tools, both available and under development, and provides an assessment of their potential for underpinning environmental management and legislation. The book explores screening methods in the context of water policies;...
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.
Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on...
This comprehensive resource shows how to incorporate systems thinking & systems engineering techniques into every stage of the design process from concept inception, testing, & quality assurance, to implementation, delivery, & upgrading
As high-tech engineering organizations learn to do more with less, they...
Digital forensics deals with the acquisition, preservation, examination,
analysis and presentation of electronic evidence. Networked computing,
wireless communications and portable electronic devices have expanded
the role of digital forensics beyond traditional computer crime investigations.
Practically every type of crime now...
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...
For JavaScript developers working on increasingly large and complex projects, effective automated testing is crucial to success. Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript...
Flow cytometry immunophenotyping of hematopoietic disorders is a complex and demanding exercise that requires a good understanding of cell lineages, developmental pathways, and physiological changes, as well as broad experience in hematopathology. The process includes several interrelated stages, from the initial medical decision regarding...
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
A superior primer on software testing and quality assurance, from integration to execution and automation
This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...