Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Extreme Programming Explained: Embrace Change
Extreme Programming Explained: Embrace Change

Software development projects can be fun, productive, and even daring. Yet they can consistently deliver value to a business and remain under control.

Extreme Programming (XP) was conceived and developed to address the specific needs of software development conducted by small teams in the face of vague and changing requirements. This...

.NET Test Automation Recipes: A Problem-Solution Approach (Expert's Voice in .NET)
.NET Test Automation Recipes: A Problem-Solution Approach (Expert's Voice in .NET)
This book presents practical techniques for writing lightweight software test automation in a .NET environment. If you develop, test, or manage .NET software, you should find this book useful. Before .NET, writing test automation was often as difficult as writing the code for the application under test itself. With .NET, you can...
Game Design, Second Edition
Game Design, Second Edition
Game design is a highly collaborative art. Each of us who works in the industry is
a game designer, whether he knows it or not. From testers and producers to programmers,
artists, marketers, and executives, we all shape the games that pass
through our hands. The product that appears on the shelves is the sum of all our efforts....
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Testing Computer Software, 2nd Edition
Testing Computer Software, 2nd Edition

This book will teach you how to test computer software under real-world conditions. The authors have all been test managers and software development managers at well-known Silicon Valley software companies. Successful consumer software companies have learned how to produce high-quality products under tight time and budget constraints. The...

Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration
Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration

Developing software with testable requirements is the theme of this book. A testable requirement is one with an acceptance test. Acceptance tests drive the development of the software. As many development groups have experienced, creating acceptance tests prior to implementing requirements decreases defects and...

Instant Wireshark Starter
Instant Wireshark Starter

Wireshark is by far the most popular network traffic analyzing tool.

It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book...

SoapUI Cookbook
SoapUI Cookbook

Boost your SoapUI capabilities to test RESTful and SOAP APIs with over 65 hands-on recipes

About This Book

  • Quickly gain simple-to-use building blocks to power up your SoapUI toolkit
  • Use Groovy scripting and open source technologies to add the SoapUI functionality you need to successfully...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Testing Applications on the Web: Test Planning for Internet-Based Systems
Testing Applications on the Web: Test Planning for Internet-Based Systems

A software testing survival guide for those who work in Internet time With Internet applications spreading like wildfire, the field of software testing is increasingly challenged by the brave new networked world of e-business. This book brings you up to speed on the technologies, testing concepts, and tools youll need to run e-business...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy