|
|
|
|
Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... | | Information Security Management Handbook, Sixth Edition, Volume 2A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of... | | Software Testing and Continuous Quality Improvement, Third Edition
Numerous textbooks address software testing in a structured development environment.
By “structured” is meant a well-defined development cycle in which discretely
defined steps provide measurable outputs at each step. It is assumed that
software testing activities are based on clearly defined requirements and software... |
|
| | WiMAX: A Wireless Technology RevolutionThe demand for broadband connectivity is growing rapidly, but cannot be met effectively by existing wireline technology. WiMAX has the potential to provide widespread Internet access that can usher in economic growth, better education and healthcare, and improved entertainment services. Examining the technology's global development and deployment... | | |
|
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |