Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Engineering: Theory and Practice (4th Edition)
Software Engineering: Theory and Practice (4th Edition)
Software engineering has come a long way since 1У6Х. when the term was first used at a NATO conference. And software itself has entered our lives in ways that few had anti cipated, even a decade ago. So a firm grounding in software engineering theory and practice is essential for understanding how to build good software and...
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)

CD FEATURES More Than 200 PRACTICE QUESTIONS

 

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for...

Pharmaceutical Project Management, Second Edition (Drugs and the Pharmaceutical Sciences)
Pharmaceutical Project Management, Second Edition (Drugs and the Pharmaceutical Sciences)
This second edition of Pharmaceutical Project Management is published one decade after the first edition. What has changed over the past decade in drug development? Actually, a lot. The move to outsourcing has intensified and the successful management of relationships between sponsor and contractor is recognized to be a...
Earthquake Engineering: From Engineering Seismology to Performance-Based Engineering
Earthquake Engineering: From Engineering Seismology to Performance-Based Engineering
Earthquake engineering (EE) is an integration of multidisciplinary knowledge in several areas of basic sciences and science-based engineering with the ultimate goal of reducing the seismic risks to socioeconomically acceptable levels.

In the U.S., the first comprehensive book covering various aspects of EE was
...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
The evolution of managing Cloud Computing Services in principles and practices provided by the best practices IT Service Management framework provides the more holistic guidance needed for an industry that continues to mature and develop at a rapid pace.

Many organizations and individuals who had previously struggled
...
Oracle 11g Anti-Hacker's Cookbook
Oracle 11g Anti-Hacker's Cookbook
When I first became aware of Adrian Neagu's intent to author a book on Oracle security, I sent him a congratulatory note. This is an important subject area, and I felt a special need to pass on my best wishes. His first book IBM DB2 9.7 Advanced Administration Cookbook, Packt Publishing, had a chapter devoted to database...
Programming Google App Engine
Programming Google App Engine
On the Internet, popularity is swift and fleeting. A mention of your website on a popular blog can bring 300,000 potential customers your way at once, all expecting to find out who you are and what you have to offer. But if you’re a small company just starting out, your hardware and software aren’t...
Human Factors and Ergonomics in Consumer Product Design: Methods and Techniques (Handbook of Human Factors in Consumer Product Design)
Human Factors and Ergonomics in Consumer Product Design: Methods and Techniques (Handbook of Human Factors in Consumer Product Design)

Every day we interact with thousands of consumer products. We not only expect them to perform their functions safely, reliably, and efficiently, but also to do it so seamlessly that we don’t even think about it. However, with the many factors involved in consumer product design, from the application of human factors and ergonomics...

The Engaging Leader: Winning with Today's Free Agent Workforce
The Engaging Leader: Winning with Today's Free Agent Workforce
During the summer of 1999, I was reading about the collapse of the Colorado Rockies baseball team under manager Jim Leyland. Leyland came to Colorado as a high-priced savior, but he and the team never meshed. Things got so bad that he announced his resignation before the first season was over. This came as a mystery to the...
Area-Wide Control of Insect Pests: From Research to Field Implementation
Area-Wide Control of Insect Pests: From Research to Field Implementation
The world population is still growing at an alarming rate, requiring ever increasing productivity and less waste in agriculture to cope with the increasing demands to satisfy food security for all humans. Alleviation of poverty is in many countries hampered by a myriad of insect pests that cause enormous economic...
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy