Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Towards a Service-Based Internet: Third European Conference, ServiceWave 2010
Towards a Service-Based Internet: Third European Conference, ServiceWave 2010

The ServiceWave conference series is committed to being the premier European forum for researchers, educators and industrial practitioners to present and discuss the most recent innovations, trends, experiences and concerns in software services (or the “Future of the Internet of Service”) and related underlying infrastructure...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques
Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques
"I wish I'd had this book ten years ago; it would have saved me an awful lot of time. It's the kind of eminently practical guide that I really appreciate, and the case studies are excellent. I highly recommend it!"
--Steve Krug, author of Don't Make Me Think! A Common Sense Approach to Web Usability

"Courage and
...
Requirements Analysis: From Business Views to Architecture
Requirements Analysis: From Business Views to Architecture
The complete guide to requirements analysis for every system analyst and project team member.

Thousands of software projects are doomed from the start because they're based on a faulty understanding of the business problem that must be solved. The solution is effective requirements analysis. In Requirements Analysis: From Business Views to...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
Introduction to Social Media Investigation: A Hands-on Approach
Introduction to Social Media Investigation: A Hands-on Approach

If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share...

New World Witchery: A Trove of North American Folk Magic
New World Witchery: A Trove of North American Folk Magic

Explore Nearly 500 Samples of Folk Magic, Stories, Artifacts, Rituals, and Beliefs

One of the most comprehensive collections of witchcraft and folk magic ever written, New World Witchery shows you how to integrate folk traditions into your life and deepen your understanding of magic. Folklore...

Geocomputation
Geocomputation

GeoComputation (GC) is a follow-on revolution that is occurring after the introduction of geographical information systems (GIS). It is expected to gather speed and momentum in the first decade of the 21st century. The rationale behind this latest revolution is quite simple. When we have finished creating our GIS databases, set up our...

Knowledge Management Strategies for Business Development
Knowledge Management Strategies for Business Development
As economies continue to evolve, knowledge is being recognized as a business asset and considered a crucial component of business strategy. The ability to manage knowledge is increasingly important for securing and maintaining organizational success and surviving in the knowledge economy. Knowledge Management Strategies for Business...
Patterns for Effective Use Cases
Patterns for Effective Use Cases

Use cases have become an integral part of modeling software requirements, but many software developers are discovering that writing effective use cases is more difficult than they had anticipated. An understanding of the basic principles of use cases is not enough. Software developers need a source of objective criteria by...

Applied Software Project Management
Applied Software Project Management
What makes software projects succeed? It takes more than a good idea and a team of talented programmers. A project manager needs to know how to guide the team through the entire software project. There are common pitfalls that plague all software projects and rookie mistakes that are made repeatedly--sometimes by the same people! Avoiding these...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy