Home | Amazing | Today | Tags | Publishers | Years | Search 
Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration
Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration

Developing software with testable requirements is the theme of this book. A testable requirement is one with an acceptance test. Acceptance tests drive the development of the software. As many development groups have experienced, creating acceptance tests prior to implementing requirements decreases defects and...

Testing IT: An Off-the-Shelf Software Testing Process
Testing IT: An Off-the-Shelf Software Testing Process

Why is astronomy considered a science while astrology is considered only a pseudoscience? In other words, how can we prove that a theory faithfully describes reality, and that this theory can then be used to predict unknown facts? Karl Popper, the well-known philosopher, studied these problems and summarized his conclusions in one...

Building Robots with LEGO Mindstorms NXT
Building Robots with LEGO Mindstorms NXT

LEGO has been a part of my life since I was about four years old. My first sets were basic LEGO SYSTEM sets. However, I soon lumped to the early TECHNIC sets that were beginning to appear on the market. Because I was one of those kids who had to take everything apart to figure out how it worked, TECHNIC seemed like a good fit for me....

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
The Accessibility Handbook
The Accessibility Handbook
Many people ask me how a developer who was working on the back-end for websites got involved in accessibility. After all, it wasn’t technically a part of my job description. It wasn’t going to make our sites faster (though I later found out it could have that side affect). I didn’t have a...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Perspective Drawing in Adobe Illustrator CS5
Perspective Drawing in Adobe Illustrator CS5
This book is intended for users of Adobe Illustrator CS5. It describes the basics of linear perspective and discusses in detail the feature set available in Illustrator CS5 for drawing a scene in perspective.

Adobe Illustrator CS5 offers a completely new form of vector drawing— perspective or
...
DevOps for Developers
DevOps for Developers

DevOps for Developers delivers a practical, thorough introduction to approaches, processes and tools to foster collaboration between software development and operations. Efforts of Agile software development often end at the transition phase from development to operations. This book covers the delivery of software, this means...

Pro Application Lifecycle Management with Visual Studio 2012 (Professional Apress)
Pro Application Lifecycle Management with Visual Studio 2012 (Professional Apress)

You can have the best coders in the world working in your teams, but if your project management isn’t up to scratch, your project is almost certain to be delayed, to come in over budget, and in some cases to fail entirely. By taking precise control of your application development process, you can make changes, both large and small,...

Selenium 2 Testing Tools: Beginner's Guide
Selenium 2 Testing Tools: Beginner's Guide
Selenium WebDriver is the most used tool for browser automation. This book shows developers and testers how to create automated tests using a browser. You will learn how to be able to use Selenium IDE for quick throwaway tests. Or if you want to create tests to last, learn to use Selenium WebDriver.

You will learn to use
...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy