 |
|
|
|
 Handbook of Software Quality AssuranceThe industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more... |  |  PRINCE2 Study Guide: 2017 Update
Everything you need to pass the PRINCE2 with flying colors
The PRINCE2 Study Guide, Second Edition, offers comprehensive preparation for the latest PRINCE2 exam. Covering 100 percent of the exam objectives, this guide provides invaluable guidance that will help you master both the material and its applications;... |  |  Protect Your Windows Network From Perimeter to DataIn this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defense in Depth" model for protecting any Windows networkno matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security... |
|
 Using Docker: Developing and Deploying Software with Containers
Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development... |  |  Network Security ArchitecturesWritten by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to... |  |  Inter-Organizational Information Systems in the Internet AgeSince the U.S. Department of Defense initiated the development of networked computers in 1969, Internet technologies have rapidly advanced and revolutionized the way we communicate and conduct business. The second wave of the technological revolution came with intranet technology in the mid-1990s. With the intranet,... |
|
 |  |  UML DemystifiedThere’s no easier, faster, or more practical way to learn the really tough subjects
UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,... |  |  Web Hacking: Attacks and Defense"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems... |
|
 |  |  |  |  Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... |
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 |