Home | Amazing | Today | Tags | Publishers | Years | Search 
Modular Compiler Verification: A Refinement-Algebraic Approach Advocating Stepwise Abstraction
Modular Compiler Verification: A Refinement-Algebraic Approach Advocating Stepwise Abstraction

After 40 years of practice and theory in compiler construction and 30 years of experience and teaching in software engineering we still observe that safetycritical high-level language programs are certified only together with the corresponding machine code. The reason is that certification institutions do not trust any compiler. And they are...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

DNS and BIND on IPv6
DNS and BIND on IPv6

I’m sorry for writing this ebook.

Well, that’s not quite accurate. What I mean is, I’m sorry I didn’t have time to update DNS and BIND to include all this new IPv6 material. DNS and BIND deserves a sixth edition, but I’m afraid my schedule is so hectic right now that I just don’t have time to...

Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)
Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)

The world of business and commerce is changing. As technology advances at a rate of knots and the geography of global working becomes less and less relevant, so the need to run an effective business becomes more and more important. Businesses grow at an alarming rate, often overnight. Interest in particular field can explode resulting...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Twitterville: How Businesses Can Thrive in the New Global Neighborhoods
Twitterville: How Businesses Can Thrive in the New Global Neighborhoods

Twitter is the most rapidly adopted communication tool in history, going from zero to ten million users in just over two years. On Twitter, word can spread faster than wildfire. Companies no longer have the option of ignoring the conversation.

Unlike other hot social media spaces, Twitterville is dominated by professionals,
...

Automated Database Applications Testing: Specification Representation for Automated Reasoning
Automated Database Applications Testing: Specification Representation for Automated Reasoning

This book introduces SpecDB, an intelligent database created to represent and host software specifications in a machine-readable format, based on the principles of artificial intelligence and unit testing database operations. SpecDB is demonstrated via two automated intelligent tools. The first automatically generates database constraints...

Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution

The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information systems running today in many organizations were developed many years ago with technologies that are now obsolete. These old systems, known as legacy...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Writing and Querying MapReduce Views in CouchDB
Writing and Querying MapReduce Views in CouchDB

If you are reading this book, then you likely have already installed CouchDB, explored the Futon web administration console, and created a few documents using the cURL command-line tool. You may even have created a CouchApp or other type of application that accesses documents stored in a CouchDB database. However, to use CouchDB for...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy