|
|
|
|
Value-Based Software EngineeringThe IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,... | | Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -... | | |
|
Wireless Security HandbookThis book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this... | | Patterns for e-businessGet an inside look at how successful businesses build their e-business architectures. In this book, four IBM e-business experts capture years of experience into easy-to-follow guidelines. Deliberately focusing on Business patterns, Integration patterns, and Application patterns, the authors share with you proven architectural patterns that can help... | | The CISSP Prep Guide: Mastering the Ten Domains of Computer SecurityA one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination
The CISSP Prep Guide
From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can... |
|
|
|
|
Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 |