Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

PRINCE2 Study Guide: 2017 Update
PRINCE2 Study Guide: 2017 Update

Everything you need to pass the PRINCE2 with flying colors

The PRINCE2 Study Guide, Second Edition, offers comprehensive preparation for the latest PRINCE2 exam. Covering 100 percent of the exam objectives, this guide provides invaluable guidance that will help you master both the material and its applications;...

Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network From Perimeter to Data
In this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defense in Depth" model for protecting any Windows networkno matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security...
Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Network Security Architectures
Network Security Architectures

Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to...

Inter-Organizational Information Systems in the Internet Age
Inter-Organizational Information Systems in the Internet Age

Since the U.S. Department of Defense initiated the development of networked computers in 1969, Internet technologies have rapidly advanced and revolutionized the way we communicate and conduct business. The second wave of the technological revolution came with intranet technology in the mid-1990s. With the intranet,...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
UML Demystified
UML Demystified
There’s no easier, faster, or more practical way to learn the really tough subjects

UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,...

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Result Page: 35 34 33 32 31 30 29 28 27 26 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy