 |
|
|
|
|
|
|
 Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  SFML Game Development by Example
Create and develop exciting games from start to finish using SFML
About This Book
-
Familiarize yourself with the SFML library and explore additional game development techniques
-
Craft, shape, and improve your games with SFML and common game design elements
-
A practical guide...
|  |  Value-Based Software EngineeringThe IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,... |
|
|
Result Page: 58 57 56 55 54 53 52 51 50 49 |