Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Collaborative Networks and Their Breeding Environments: IFIP TC 5 WG 5. 5 Sixth IFIP Working Conference
Collaborative Networks and Their Breeding Environments: IFIP TC 5 WG 5. 5 Sixth IFIP Working Conference
Progress in collaborative networks continues showing a growing number of manifestations and has led to the acceptance of Collaborative Networks (CN) as a new scientific discipline.  Contributions to CN coming from multiple reference disciplines has been extensively investigated.  In fact developments in CN have benefited from...
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Web Site Design Is Communication Design (Document Design Companion Series, V. 2)
Web Site Design Is Communication Design (Document Design Companion Series, V. 2)
This title is based on a series of case studies of the website design processes in smaller and larger organizations. It offers a thorough analysis of the activities undertaken, in conbination with practical experiences of website designers and producers. It pays attention to the often complicated organizational context that web deigners and...
Applying Computational Intelligence: How to Create Value
Applying Computational Intelligence: How to Create Value

The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines...

Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

American Criminal Courts: Legal Process and Social Context
American Criminal Courts: Legal Process and Social Context

American Criminal Courts: Legal Process and Social Context provides a complete picture of both the theory and day-to-day reality of criminal courts in the United States. The book begins by exploring how democratic processes affect criminal law, the documents that define law, the organizational structure of courts at the federal...

Biology: The Dynamic Science
Biology: The Dynamic Science

Learn how to think and engage like a scientist! BIOLOGY: THE DYNAMIC SCIENCE, Second Edition, provides you with a deep understanding of the core concepts in Biology, building a strong foundation for additional study. In a fresh presentation, the authors explain complex ideas clearly and describe how biologists collect and interpret evidence...

Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
Pride and Power: A Modern History of Iraq
Pride and Power: A Modern History of Iraq
The story of Iraq is one of resistance. In this groundbreaking study, Johan Franzen offers a contextual modern history of the country, its creation and its struggle for sovereignty.

Iraq's contemporary history is a tale of a diverse people thrown together into a nation-state by imperialist statecraft. From the...
The Unified Modeling Language User Guide
The Unified Modeling Language User Guide

Introduced in 1997, the Unified Modeling Language (UML) has rapidly been accepted throughout the software industry as the standard graphical language for specifying, constructing, visualizing, and documenting software-intensive systems. The UML provides anyone involved in the production, deployment, and maintenance of software with a standard...

Model-Driven Testing: Using the UML Testing Profile
Model-Driven Testing: Using the UML Testing Profile
Model-driven development has become the most important new paradigm in software development and has already demonstrated considerable impact in reducing time to market and improving product quality. However, the development of high-quality systems not only requires systematic development processes but also systematic test processes.

This book...

unlimited object storage image
Result Page: 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy