Home | Amazing | Today | Tags | Publishers | Years | Search 
Retirementology: Rethinking the American Dream in a New Economy
Retirementology: Rethinking the American Dream in a New Economy

Looking ahead to retirement? Depending on your circumstances and your age, you may no longer have any margin for error. And your emotions and irrational behavior could be perpetuating a dangerous cycle of overspending and rising debt that may shatter whatever vision of retirement you still have. Welcome to the world of...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

Evaluating User Experience in Games: Concepts and Methods
Evaluating User Experience in Games: Concepts and Methods

User Experience has become a major research area in human-computer interaction. The area of game design and development has been focusing on user experience evaluation for the last 20 years, although a clear definition of user experience is still to be established.

The contributors to this volume explore concepts that enhance the...

Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial
Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial

This fully illustrated step-by-step tutorial is based on proven training content that has been highly praised by hundreds of developers in product training courses given as part of the BPM Suite 11g rollout. You will learn how to build a business process application project iteratively with each chapter introducing new technology components...

Pro Oracle Database 11g RAC on Linux
Pro Oracle Database 11g RAC on Linux

Pro Oracle Database 11g RAC on Linux provides full-life-cycle guidance on implementing Oracle Real Application Clusters in a Linux environment. Real Application Clusters, commonly abbreviated as RAC, is Oracle’s industry-leading architecture for scalable and fault-tolerant databases. RAC allows you to scale up and down by...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

Alfresco 3 Web Content Management
Alfresco 3 Web Content Management

Alfresco provides a robust, easy to use, and scalable web content framework for managing multiple websites leveraging a common web infrastructure. If you are interested in configuring and building a new website quickly, determined to create a scalable infrastructure to stage multiple websites, and want to secure and control the content being...

Software Pipelines and SOA: Releasing the Power of Multi-Core Processing
Software Pipelines and SOA: Releasing the Power of Multi-Core Processing

Build Breakthrough Performance into Any SOA or Advanced Computing Application

To meet unprecedented demand, IT organizations must improve application performance by an order of magnitude. Improving performance is even more crucial in SOA environments, which demand far more computing power than older architectures.
...

Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy