Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design

How to Find and Fix the Killer Software Bugs that Evade Conventional Testing

 

In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today’s most serious, well-hidden software...

Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Computing Information Technology: The Human Side
Computing Information Technology: The Human Side
From the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to...
Word Origins
Word Origins
The average English speaker knows around 50,000 words. That represents an astonishing diversity – nearly 25 times more words than there are individual stars visible to the naked eye in the night sky. And even 50,000 seems insignificant beside the half a million recorded in the Oxford English Dictionary. But looked at from an...
Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

Neurosurgery: A Case-Based Approach
Neurosurgery: A Case-Based Approach

This book describes neurosurgical cases following the format of the clinical handover. Each case has a one line summary and differential diagnosis, appropriate interpretation of illustrated radiological studies, further ancillary tests, and management options. When appropriate, scoring/scaling systems and detailed anatomy are...

Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
This book outlines an integrative framework for business-model innovation in the paradigm of the Internet of Things. It elaborates several tools and methodologies for the quantitative, qualitative, analytical and effectual evaluation, and analyzes their applicability and efficiency for several phases of the business-model innovation process. As...
Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
* From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart!
* Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues
...
Algorithm Design
Algorithm Design
Algorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the...
Recommender Systems: An Introduction
Recommender Systems: An Introduction

“Which digital camera should I buy? What is the best holiday for me and my family? Which is the best investment for supporting the education of my children? Which movie should I rent? Which web sites will I find interesting? Which book should I buy for my next vacation? Which degree and university are the best for my...

Troubleshooting SQL Server - A Guide for the Accidental DBA
Troubleshooting SQL Server - A Guide for the Accidental DBA
I've spent much of the last six years of my working life trying to help people solve SQL Server-related performance problems, either hands-on, at client sites in my capacity as a consultant, or on various online community forums, answering people's questions.

Over that time I've been exposed to a few weird
...
Essential Anesthesia: From Science to Practice (Cambridge Medicine)
Essential Anesthesia: From Science to Practice (Cambridge Medicine)

Essential Anesthesia is a concise, accessible introduction to anesthetic practice. Now in its second edition, it provides a thorough overview of the science and practice of anesthesia. Part I describes the evaluation of the patient, the different approaches to anesthesia, and the post-operative care of the patient in pain. Part II introduces...

unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy