Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Debugger's Handbook
The Debugger's Handbook

Focused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger's Handbook promotes a natural debugging approach to writing code. The author begins by examining and concretely defining just what a bug is, what circumstances are more prone to producing bugs, and how to avoid them from the...

Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of...

Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Understanding Broadband over Power Line
Understanding Broadband over Power Line
Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing...
The Handbook of Mobile Middleware
The Handbook of Mobile Middleware

The Handbook of Mobile Middleware provides an exhaustive overview of recent developments in the various fields related to how software supports mobile computing. This advanced reference authored by internationally recognized experts integrates the valuable insight gained from actual deployments into a full compendium. It begins by presenting...

TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
Service Oriented Enterprises
Service Oriented Enterprises

This comprehensive resource covers all the components, issues, standards, and technologies that create a service-oriented enterprise. Filled with real-world examples, Service Oriented Enterprises shows IT managers, CIOs, software architects, software developers, innovative and practical service-oriented solutions. Its framework for aligning...

Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, with a particular emphasis on state-of-the-art techniques, trends, and improvement that have emerged over the last decade. After a brief introduction to the modern physical design problem, basic algorithmic...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy