The story of software engineering has been the story of increasing the
level of abstraction at which we as programmers work, from logic encoded
in hardware to toggle switches representing binary digits, through machine
code, assembly language, low-level languages, and high-level languages
both procedural and functional. More recently,...
CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...
Are you a software developer? Are you interested in how build systems work?
You’re reading this book; so there’s a good chance you answered “Yes” to both
questions. On the other hand, many software developers aren’t interested in
how their program is compiled. Most people just want to press a button and...
One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One...
Welcome to the world of CRM! This chapter introduces you to
the concepts of customer relationship management (CRM)
without getting into many of the specifics about Dynamics
CRM. If you are a long-time Dynamics CRM administrator, then you can
focus on the XRM section of this chapter. If you have administered or
used other CRM...
Recent trends in computer architecture make concurrency and parallelism an essential ingredient of efficient program execution. The actor model of concurrency allows you to express real-world concurrency in a natural way using concurrent processes that communicate via asynchronous messages.
Scala is a programming language for the Java...
Audit and Trace Log Management: Consolidation and Analysis
is both a timely and much needed compilation of useful information around a topic
that is becoming more and more critical to not only IT professionals and
security practitioners, but to many other departments, such as legal, risk,
and compliance, as well as auditors and...
What is the theory of computation all about? The theory of computation embodies
the principle by which computers have become the basis of modern digital technology,
which makes a computer perform as desired, and which, consequently, has
led to the prosperity of our advanced information society (just as physical sciences
constitute the...
According to the TIOBE Programming Community Index, PHP is the most popular programming
language after C/C++ and Java.1 Gartner predicts that dynamic programming languages will be
critical to the success of many next-generation application development efforts and sees PHP as one
of the strongest representatives of this type of...
Apache Open For Business (Apache OFBiz) is an enterprise resource planning (ERP) system that provides a common data model and an extensive set of business processes. But without proper guidance on developing performance-critical applications, it is easy to make the wrong design and technology decisions. The power and promise of Apache OFBiz...
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...