Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

Oracle Database 10g SQL
Oracle Database 10g SQL

In this comprehensive book, you’ll learn to write Structured Query Language (SQL) statements to access an Oracle database and use PL/SQL (Procedural Language/SQL) to write programs containing SQL statements. Developed in compliance with the new SQL2003 specification, this definitive resource explains how to use the latest Oracle...

Microsoft Exchange Server 2013 Inside Out Mailbox and High Availability
Microsoft Exchange Server 2013 Inside Out Mailbox and High Availability

With a focus on mailbox and high availability features, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Tony Redmond, a Microsoft MVP and award-winning author, you will:

  • Understand major changes to Exchange Server architecture
  • ...
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers

"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015

The H-1B visa is the gateway for the world’s best and...

Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Microsoft Exchange Server 2013 Pocket Consultant Databases, Services, & Management
Microsoft Exchange Server 2013 Pocket Consultant Databases, Services, & Management

Portable and precise, this pocket-sized guide delivers ready answers for managing databases and services in Exchange Server 2013. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done-whether at your desk or in the field.

...

Getting Started with Oracle SOA B2B Integration: A Hands-On Tutorial
Getting Started with Oracle SOA B2B Integration: A Hands-On Tutorial

Enterprises engaging in B2B communications with their trading partners are facing increased pressure to increase automation and reduce costs. Increased compliance requirements and globalization of economies is fueling B2B adoption in every industry. Gateway solutions in Oracle SOA B2B enable these enterprises to connect easily with external...

Management of Acute Coronary Syndromes (Contemporary Cardiology)
Management of Acute Coronary Syndromes (Contemporary Cardiology)

In this second edition of his highly acclaimed book, Christopher P. Cannon, MD, and a team of preeminent clinical investigators have thoroughly revised and expanded every chapter to reflect the recent explosion of clinical trials on the management of acute coronary syndromes (ACS). This includes: the newer tests, such as C reactive protein; a...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy