Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scaling Software Agility: Best Practices for Large Enterprises (The Agile Software Development Series)
Scaling Software Agility: Best Practices for Large Enterprises (The Agile Software Development Series)
Agile development practices, while still controversial in some circles, offer undeniable benefits: faster time to market, better responsiveness to changing customer requirements, and higher quality. However, agile practices have been defined and recommended primarily to small teams. In Scaling Software Agility, Dean...
Beginning OpenOffice 3: From Novice to Professional
Beginning OpenOffice 3: From Novice to Professional
Office suites are one of the most popular types of software, and most computer users will, at some point, find themselves staring at the user interface of a word processor, spreadsheet, or presentation package. Traditionally, office suites have been quite expensive packages, but thanks to the generosity of Sun Microsystems and a massive community...
TestGoal: Result-Driven Testing
TestGoal: Result-Driven Testing
Software testing is traditionally seen as a difficult and time consuming activity that is hard to embed in the software development process. This book provides a different view. It explains to stakeholders how testing can add value to software development and doing business, and provides the tester with practical information.

TestGoal is not...

TestComplete Cookbook
TestComplete Cookbook

Novice tester or expert, the 110+ recipes in this book are structured to be useful across all levels. Use them to increase your knowledge of TestComplete and ultimately master this incredibly versatile tool.

Overview

  • Learn to produce easily modifiable and maintainable scripts
  • Customize...
The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Software Testing (2nd Edition)
Software Testing (2nd Edition)
Software Testing is the book for new or aspiring software testers interested in learning about this crucial part of the software development process. The complexity and size of today's software makes writing bug-free code extremely difficult, even for highly experienced programmers. Couple that with our increasing reliance on software for...
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design

How to Find and Fix the Killer Software Bugs that Evade Conventional Testing

 

In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today’s most serious, well-hidden software...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Safety of Electromedical Devices: Law - Risks - Opportunities
Safety of Electromedical Devices: Law - Risks - Opportunities

The book discusses the legal and technical requirements for manufacturers, designers and testers of electromedical devices. It describes which obstacles must be overcome to introduce a medical device on the European market, but also informs readers as to pitfalls and opportunities, and in which way safety can be achieved and product liability...

How Google Tests Software
How Google Tests Software

 

Software development is hard. Testing that software is hard, too. And when you talk about development and testing at the scale of the entire web, you are talking about Google. If you are interested in how one of the biggest names in the Internet handles such large-scale testing, then you have found the right
...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy