Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solar Resources Mapping: Fundamentals and Applications (Green Energy and Technology)
Solar Resources Mapping: Fundamentals and Applications (Green Energy and Technology)
This book presents methods for optimising the spatial and network configuration of solar radiation measuring stations. Various physical and mathematical models are demonstrated, which together with high quality measurements, provide the essential tools to generate and validate solar resource estimates to improve the mapping of solar...
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect...
Successful Software Development (2nd Edition)
Successful Software Development (2nd Edition)

A systematic approach to consistently successful software development.

In the age of the Internet, where software is more mission-critical than ever, it's no longer enough for your development projects to succeed some of the time. You need to deliver excellence, consistently—and you must do it faster than ever.

...

Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking)
Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking)
In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely...
Testing and Quality Assurance for Component-Based Software (Artech House Computer Library.)
Testing and Quality Assurance for Component-Based Software (Artech House Computer Library.)
The widespread development and reuse of software components is regarded
by many as one of the next biggest phenomena for software. Reusing
high-quality software components in software development has the potential
for drastically improving the quality and development productivity of
component-based software. However, the
...
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Managing Risk In Information Systems (Information Systems Security & Assurance Series)
Managing Risk In Information Systems (Information Systems Security & Assurance Series)

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery...

A Project Guide to UX Design: For user experience designers in the field or in the making (2nd Edition)
A Project Guide to UX Design: For user experience designers in the field or in the making (2nd Edition)

User experience design is the discipline of creating a useful and usable Web site or application that’s easily navigated and meets the needs of the site owner and its users. There’s a lot more to successful UX design than knowing the latest Web technologies or design trends: It takes diplomacy, management skills, and business...

Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
High-Assurance Design : Architecting Secure and Reliable Enterprise Applications
High-Assurance Design : Architecting Secure and Reliable Enterprise Applications

How to Design for Software Reliability, Security, and Maintainability

Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile. They compensate by investing heavily in workarounds and maintenance, and by employing hordes of...

Expert Python Programming
Expert Python Programming

Expert Python Programming shows how Python development should be done with best practices and expert design tips. This book is for Python developers who are already building applications, but want to build better ones by applying best practices and new development techniques to their projects. The reader is expected to have a sound background...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy