Home | Amazing | Today | Tags | Publishers | Years | Search 
Experience and Knowledge Management in Software Engineering
Experience and Knowledge Management in Software Engineering

Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Core Concepts of Accounting Information Systems
Core Concepts of Accounting Information Systems

Information technologies impact every aspect of accounting, including financial reporting, managerial accounting, auditing, and tax. The nature of the work done by accountants continues to evolve as these technologies advance. For example, less than 30 years ago, accountants could have spent much of their day footing ledgers and making...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing addresses the challenge for today’s software professionals who are faced with real schedule deadlines and need to introduce, manage, and perform automated testing on a project. The book addresses automated testing within a client-server or Web environment.

The focus of this book is
...
Pharmaceutical Process Scale-Up, Second Edition (Drugs and the Pharmaceutical Sciences)
Pharmaceutical Process Scale-Up, Second Edition (Drugs and the Pharmaceutical Sciences)
Scale-up is generally defined as the process of increasing batch size. Scale-up of a process can also be viewed as a procedure for applying the same process to different output volumes. There is a subtle difference between these two definitions: batch size enlargement does not always translate into a size increase of the...
Chemistry: An Industry-Based Laboratory Manual
Chemistry: An Industry-Based Laboratory Manual
Have you ever sat down and had an open discussion over coffee with an industrial chemist or chemical technician about his or her work? Have you ever “shadowed” a chemist or a chemical technician for a day as he or she went about the daily routine in an industrial or government laboratory? If you have done these things,...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy