Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption is written for members of boards of directors and audit committees, senior executives, those who advise or report to them, and those responsible for managing fraud and corruption risks. It describes in plain English terms a proactive fraud and corruption risk...
Alfresco 3 Enterprise Content Management Implementation
Alfresco 3 Enterprise Content Management Implementation

How to customize, use, and administer this powerful, Open Source Java-based Enterprise CMS

  • Manage your business documents with version control, library services, content organization, and advanced search.
  • Create collaborative web sites using document libraries, wikis, blogs, forums, calendars, discussions,...
Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics

Key Features

  • This easy-to-follow guide takes you through every step of the data wrangling process in the best possible way
  • Work with different types of datasets, and reshape the layout of your data to make it easier for analysis
  • Get simple examples and real-life data...
Transact-SQL Cookbook (O'Reilly Windows)
Transact-SQL Cookbook (O'Reilly Windows)
This cookbook contains a wealth of solutions to problems that SQL programmers face all the time. Recipes inside range from how to perform simple tasks, like importing external data, to ways of handling issues that are more complicated, like set algebra. Each recipe includes a discussion that explains the logic and concepts underlying the...
Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

Governance of the Extended Enterprise: Bridging Business and IT Strategies
Governance of the Extended Enterprise: Bridging Business and IT Strategies
Discover how to implement an effective IT governance structure for the long-term success of an extended enterprise

IT is no longer an enabler of corporate strategy, it is now the key element of corporate strategy. Governance of the Extended Enterprise explores how some of the world's most successful enterprises have integrated information...

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Internal Audit: Efficiency Through Automation
Internal Audit: Efficiency Through Automation
Internal Audit

Efficiency through Automation

Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy