Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration
Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration

Product verifiable, defensible, and achievable software estimates

Based on data collected by the International Software Benchmarking Standards Group (ISBSG), Practical Software Project Estimation explains how to accurately forecast the size, cost, and schedule of software projects. Get expert advice on generating accurate...

Glitch: The Hidden Impact of Faulty Software
Glitch: The Hidden Impact of Faulty Software

Don’t Let Software Failures Destroy Your Business

  • The growing impact of software failures on brands, customers, and business performance
  • How to govern software more effectively, prepare for glitches, and...
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies

This book is a first sketch of what the overall field of performance could look like as a modern scientific field but not its stylistically differentiated practice, pedagogy, and history. Musical performance is the most complex field of music. It comprises the study of a composition’s expression in terms of...

Business in the Cloud: What Every Business Needs to Know About Cloud Computing
Business in the Cloud: What Every Business Needs to Know About Cloud Computing

A close look at cloud computing's transformational role in business

Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland
Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland

BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences on business information systems. The BIS conference series has been recognized by professionals from the very beginning as a forum for the exchange and dissemination of topical research in the development, implementation, application and...

Design of Image Processing Embedded Systems Using Multidimensional Data Flow
Design of Image Processing Embedded Systems Using Multidimensional Data Flow

With the availability of chips offering constantly increasing computational performance and functionality, design of more and more complex applications becomes possible. This is particularly true for the domain of image processing, which is characterized by huge computation efforts. Unfortunately, this evolution risks to be stopped by...

Internet-based Control Systems: Design and Applications (Advances in Industrial Control)
Internet-based Control Systems: Design and Applications (Advances in Industrial Control)

The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.

Internet-based Control Systems...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy