Home | Amazing | Today | Tags | Publishers | Years | Search 
Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Structure of Enteric Neurons (Advances in Anatomy, Embryology and Cell Biology)
Structure of Enteric Neurons (Advances in Anatomy, Embryology and Cell Biology)
In this context, it is less important that Langley excluded the striated part of the oesophagus from his definition of the enteric nervous system (ENS). Much more remarkable seems to be that for Langley, a physiologist, structural reasonswere the most decisive for taking the nervous system within the wall of the gastrointestinal...
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Program Management Leadership: Creating Successful Team Dynamics (Best Practices and Advances in Program Management)
Program Management Leadership: Creating Successful Team Dynamics (Best Practices and Advances in Program Management)

This is not another how-to guide for program managers or another reiteration of the Project Management Institute’s standards for program management. Instead, Program Management Leadership: Creating Successful Team Dynamics examines various leadership approaches and illustrates the value of effective leadership styles in...

Software Maintenance Success Recipes
Software Maintenance Success Recipes

Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Software Project Management: A Process-Driven Approach
Software Project Management: A Process-Driven Approach

To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project...

Applying Guiding Principles of Effective Program Delivery (Best Practices and Advances in Program Management Series)
Applying Guiding Principles of Effective Program Delivery (Best Practices and Advances in Program Management Series)

While today’s programs continue to grow in size and complexity, at the same time, their success rates remain low. To manage programs effectively in this environment, project managers and program managers must take a "consultative approach" that applies a core set of guiding principles across every function of the program....

The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Wi-Fi Enabled Healthcare
Wi-Fi Enabled Healthcare

Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it...

Agile Strategy Management: Techniques for Continuous Alignment and Improvement (ESI International Project Management Series)
Agile Strategy Management: Techniques for Continuous Alignment and Improvement (ESI International Project Management Series)

Your strategic initiatives are constantly under fire due to the evolving nature of markets, technology, laws, and government. To ensure your strategy succeeds, it must remain flexible while confronting these shifting challenges. Agile Strategy Management: Techniques for Continuous Alignment and Improvement explains how to achieve this...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy