Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)

What makes this book unique is how easy it makes it for you to learn. The author brings you a guide that takes you through a natural sequence of lessons, step-by-step, carefully explaining each concept and staying away from unnecessary technical jargon whilst defining the terms you need to learn. This one-step-at-a-time approach allows anyone...

Practical Software Testing
Practical Software Testing
Stions of this new direction can be found, for example, in the ‘‘Software
Engineering Body of Knowledge (SWEBOK)’’ and the code of ethics that
have been developed recently through the efforts of joint IEEE/ACM task
forces [1,2]. Licensing procedures for software engineers are also under
development.
...
Instant Selenium Testing Tools Starter
Instant Selenium Testing Tools Starter

A short, fast, and focused guide to Selenium Testing tools that delivers immediate results

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Learn to create web tests using Selenium Tools
  • Learn to use Page Object...
Critical Testing Processes: Plan, Prepare, Perform, Perfect
Critical Testing Processes: Plan, Prepare, Perform, Perfect

"Rex Black has done it again!...Critical Testing Processes is a book that all software testers will want to read from cover to cover and then retain for frequent reference."

—From the Foreword by Rick Craig, software test manager, author, lecturer, and consultant

In today's...

The CISM Prep Guide: Mastering the Five Domains of Information Security Management
The CISM Prep Guide: Mastering the Five Domains of Information Security Management

There is no better way for you to stand out from the crowd of IT professionals than to get your Certified Information Security Manager (CISM) certification from the Information Systems Audit and Control Association (ISACA). Written by the bestselling authors of the CISSP Prep Guide, this comprehensive test guide provides you with all...

Model-Driven Architecture in Practice: A Software Production Environment Based on Conceptual Modeling
Model-Driven Architecture in Practice: A Software Production Environment Based on Conceptual Modeling
Formal specification languages, object-oriented methods, CASE tools, component-based software production, agent-oriented, aspect-oriented ... During the last two decades many techniques have been proposed from both research and industry in order to generate a correct software product from a higher-level system specification. Nevertheless, the many...
Forensic Chemistry
Forensic Chemistry

As the number of forensic science and forensic chemistry degree programs has increased over the last few years, Forensic Chemistry was the first book to specifically address this rapidly growing field. It introduces the principal areas of study from the perspective of analytical chemistry, addressing the legal context in which forensic...

The Art of Application Performance Testing: Help for Programmers and Quality Assurance
The Art of Application Performance Testing: Help for Programmers and Quality Assurance
This practical book provides a step-by-step approach to testing mission-critical applications for scalability and performance before they're deployed -- a vital topic to which other books devote one chapter, if that. Businesses today live and die by network applications and web services. Because of the increasing complexity of these programs, and...
Computer Security: Art and Science
Computer Security: Art and Science
"This is an excellent text that should be read by every computer security professional and student." —Dick Kemmerer, University of California, Santa Barbara.

"This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!"

—Marvin
...
Internal Audit: Efficiency Through Automation
Internal Audit: Efficiency Through Automation
Internal Audit

Efficiency through Automation

Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly...

Designing with Web Standards
Designing with Web Standards

You code. And code. And code. You build only to rebuild. You focus on making your site compatible with almost every browser or wireless device ever put out there. Then along comes a new device or a new browser, and you start all over again.

You can get off the merry-go-round.

...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy