Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Component-Based Software Testing with UML
Component-Based Software Testing with UML

Component-based software development regards software construction in terms of conventional engineering disciplines where the assembly of systems from readily-available prefabricated parts is the norm. Because both component-based systems themselves and the stakeholders in component-based development projects are different from traditional...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Database Programming with Visual Basic .NET and ADO.NET: Tips, Tutorials, and Code (Waite Group)
Database Programming with Visual Basic .NET and ADO.NET: Tips, Tutorials, and Code (Waite Group)
The topic combination of VB .NET and ADO.NET is unbeatable. VB .NET is the most popular language in which to code. And, every developer needs to understand ADO.NET to allow data to be accessed from a Web site. In this book Developers will be shown numerouse code examples that will illustr4ate how to program database driven applications within...
Contemporary Issues in Ethics and Information Technology
Contemporary Issues in Ethics and Information Technology
Information technology has produced new ethical challenges and concerns in dealing with issues about privacy, security, piracy and professional ethics. Contemporary Issues in Ethics and Information Technology discusses these issues as well as other important ethical issues such as the outsourcing of high-level jobs and the value of IT itself. The...
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Ethereum for Architects and Developers
    Ethereum for Architects and Developers
    Explore the Ethereum ecosystem step by step with extensive theory, labs, and live use cases. This book takes you through BlockChain concepts; decentralized applications; Ethereum’s architecture; Solidity smart contract programming with examples; and testing, debugging, and deploying smart contracts on...
    The Simple Truths About Leadership: Creating a People-Centric Culture
    The Simple Truths About Leadership: Creating a People-Centric Culture

    In the middle of the last decade, businesses have suffered serious harm due to the world-wide economic slowdown/great recession, geopolitical tensions and conflicts, and the very unpredictable nature of our government. In the process of staying the course, many business leaders have made a number of decisions and have taken a number...

    Learning ASP.NET 3.5
    Learning ASP.NET 3.5
    With this book, you will learn how to create engaging and interactive web applications using the latest version of the world's most popular web development platform: ASP.NET with AJAX, built on the productivity-enhancing features of Visual Studio 2008. All you need to get started is a basic knowledge of HTML and a desire to produce professional...
    Firms in Open Source Software Development: Managing Innovation Beyond Firm Boundaries
    Firms in Open Source Software Development: Managing Innovation Beyond Firm Boundaries

    In open innovation scenarios, firms are able to profit from technological developments that take place beyond the legal boundaries. However, in the absence of contract-based vertical command chains, such as in the case of open source software (OSS), it is difficult for firms to obtain control over the innovation project's trajectory. In...

    Building Contract Dictionary
    Building Contract Dictionary

    Building Contract Dictionary provides a succinct, but authoritative reference to words, phrases and terms encountered in, and in connection with, building contracts.

    For the new edition all entries have been reconsidered and updated in light of case law and legislation and the book has been substantially enlarged since the last...

    Illustrated C# 2008 (Windows.Net)
    Illustrated C# 2008 (Windows.Net)
    The unique, visual format of Illustrated C# 2008 has been specially created by author, and teacher of development methods, Daniel Solis. The concise text, use of tables to clarify language features, frequent figures and diagrams, as well as focused code samples all combine to create a unique approach that will help you...
    unlimited object storage image
    Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy