Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Current Practice in Environmental Reporting: The Chemicals Industry
Current Practice in Environmental Reporting: The Chemicals Industry

Environmental reporting is still in its infancy, having emerged only in the latter part of the 1980s. Companies are under increasing pressure to be transparent and accountable in the whole spectrum of their business. In recent years, a number of companies have seen the need to introduce environmental reporting, placing environmental...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

Learn cocos2d Game Development with iOS 5 (Learn Apress)
Learn cocos2d Game Development with iOS 5 (Learn Apress)

Did you ever imagine yourself writing a computer game and being able to make money selling it? With Apple’s iTunes App Store and the accompanying mobile devices iPhone, iPod touch, and iPad, it’s now easier than ever. Of course, that doesn’t mean it’s easy— there’s still a lot to learn about game...

Building Hypermedia APIs with HTML5 and Node
Building Hypermedia APIs with HTML5 and Node

This book’s primary focus is on designing hypermedia APIs. That may seem a bit strange to some readers. There are many books on programming languages, data storage systems, web frameworks, etc. This is not one of those books. Instead, this book covers the nature of the messages passed between client and server, and how to improve...

Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)
Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)

THE “CLOUD” IS ONE OF THE MOST tossed-around words these days in any IT conversation. But what does it mean? And what are the implications of the cloud for SharePoint? In fact, there are many implications for SharePoint with the cloud, ranging from extending existing solutions to use code or services that are deployed to the...

Digital Libraries and Archives: 7th Italian Research Conference, IRCDL 2011, Pisa, Italy,January 20-21, 2011
Digital Libraries and Archives: 7th Italian Research Conference, IRCDL 2011, Pisa, Italy,January 20-21, 2011

IRCDL is a yearly event for Italian researchersworking onDigital Libraries-related topics. This year the focus of IRCDL was on information access and interoperability. In fact Digital Library systems are starting to be mature, but it is time to give a more effective and personalized access to information to users and to improve...

Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing

Ongoing economic challenges are affecting and impacting business and society in nearly every industry and geographical region. Taking decisive action to reprioritize the way we are doing business is a key focus for companies. Around the world, companies are taking the necessary measures that will enable us to adjust to today’s reality...

Model Checking Software: 17th International SPIN Workshop, Enschede, The Netherlands
Model Checking Software: 17th International SPIN Workshop, Enschede, The Netherlands

This volume contains the proceedings of the 17th International SPIN Workshop on Model Checking Software (SPIN 2010). The workshop was organized by and held at the University of Twente, The Netherlands, on 27–29 September 2010. The workshop was co-located with the 5th International Conference on Graph Transformation (ICGT 2010)...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Result Page: 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy