Аниме | Preacher | Joaquim de Almeida
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the...

Software Testing and Continuous Quality Improvement, Second Edition
Software Testing and Continuous Quality Improvement, Second Edition
Numerous textbooks address software testing in a structured development
environment. By “structured” is meant a well-defined development cycle in
which discretely defined steps provide measurable outputs at each step. It
is assumed that software testing activities are based on clearly defined
requirements and
...
Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Manage Software Testing
Manage Software Testing
…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
-Software Testing,
...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Wireless Mesh Networks
Wireless Mesh Networks
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking...
Information Security Management Handbook, Sixth Edition, Volume 2
Information Security Management Handbook, Sixth Edition, Volume 2
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of...
Service-Oriented Architecture: SOA  Strategy, Methodology, and Technology
Service-Oriented Architecture: SOA Strategy, Methodology, and Technology
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage. Service-Oriented Architecture (SOA): Strategy, Methodology, and Technology guides you through the challenges of deploying SOA. It demonstrates conclusively that...
Six Sigma Software Development, Second Edition
Six Sigma Software Development, Second Edition
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy