 |
|
|
|
 Handbook of Software Quality AssuranceThe industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more... |  |  Corporate Resiliency: Managing the Growing Risk of Fraud and CorruptionCorporate Resiliency: Managing the Growing Risk of Fraud and Corruption is written for members of boards of directors and audit committees, senior executives, those who advise or report to them, and those responsible for managing fraud and corruption risks. It describes in plain English terms a proactive fraud and corruption risk... |  |  Alfresco 3 Enterprise Content Management Implementation
How to customize, use, and administer this powerful, Open Source Java-based Enterprise CMS
-
Manage your business documents with version control, library services, content organization, and advanced search.
-
Create collaborative web sites using document libraries, wikis, blogs, forums, calendars, discussions,...
|
|
|
 Transact-SQL Cookbook (O'Reilly Windows)This cookbook contains a wealth of solutions to problems that SQL programmers face all the time. Recipes inside range from how to perform simple tasks, like importing external data, to ways of handling issues that are more complicated, like set algebra. Each recipe includes a discussion that explains the logic and concepts underlying the... |  |  Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... |  |  |
|
 Governance of the Extended Enterprise: Bridging Business and IT StrategiesDiscover how to implement an effective IT governance structure for the long-term success of an extended enterprise
IT is no longer an enabler of corporate strategy, it is now the key element of corporate strategy. Governance of the Extended Enterprise explores how some of the world's most successful enterprises have integrated information... |  |  Mac OS X, iPod, and iPhone Forensic Analysis DVD ToolkitThis book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic... |  |  Internal Audit: Efficiency Through AutomationInternal Audit
Efficiency through Automation
Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 |