Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Testing and Continuous Quality Improvement, Second Edition
Software Testing and Continuous Quality Improvement, Second Edition
Numerous textbooks address software testing in a structured development
environment. By “structured” is meant a well-defined development cycle in
which discretely defined steps provide measurable outputs at each step. It
is assumed that software testing activities are based on clearly defined
requirements and
...
Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
Reducing Risk with Software Process Improvement
Reducing Risk with Software Process Improvement
This book describes observations made over a period of ten years in
projects and organizations involved in the field of Information Technology
(IT), focusing on the areas of software development and maintenance. It
highlights the most frequently encountered problems because of poor
processes, the term process being defined as
...
Defining and Deploying Software Processes
Defining and Deploying Software Processes
I gravitated into the process world several years ago after performing
almost all roles in the software engineering environment — both as a
programmer and in various management positions. That environment
covered both the commercial software development world and the government
contracting software development world. I
...
Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols

This book describes how to build wireless sensor networks, from the layers of communication protocols through the design of network nodes. It summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses...

The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

Creating Components
Creating Components
This text describes how concurrency works, how to more effectively deploy it in program components, and how to reuse these components to improve program design, quality, and performance.

Concurrency is a powerful technique for developing efficient and lightning- fast software. For instance, concurrency can be used in common applications...

Investigator's Guide to Steganography
Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...

Software Engineering Measurement
Software Engineering Measurement

The product of many years of practical experience and research in the software measurement business, Software Engineering Measurement lays the basis for measurement standards so that software engineers and system developers can begin to share experimental results in a more meaningful way. This technical reference helps you select what...

Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Embedded Linux System Design and Development
Embedded Linux System Design and Development

Embedded Linux System Design and Development contains a full development roadmap for embedded Linux systems. It facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling...

The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy