Jak poznałem waszą matkę / ... | Death Parade | Disneys Große Pause
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lean Auditing: Driving Added Value and Efficiency in Internal Audit
Lean Auditing: Driving Added Value and Efficiency in Internal Audit

"How can you argue with the core principles of Lean, that you focuson what provides value to your customer and eliminate work that isnot necessary (muda)? Internal auditors need to understandnot  only who their primary customers are, but what isvaluable to them - which in most cases is assurance that the risksthat matter to the...

Instant Selenium Testing Tools Starter
Instant Selenium Testing Tools Starter

A short, fast, and focused guide to Selenium Testing tools that delivers immediate results

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Learn to create web tests using Selenium Tools
  • Learn to use Page Object...
The Agile Enterprise: Building and Running Agile Organizations
The Agile Enterprise: Building and Running Agile Organizations

Discover how to implement and operate in an Agile manner at every level of your enterprise and at every point from idea to delivery. Learn how Agile-mature organizations adapt nimbly to microchanges in market conditions. Learn cutting-edge practices and concepts as you extend your implementation of Agile through the entire enterprise to meet...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

Software Error Detection through Testing and Analysis
Software Error Detection through Testing and Analysis

An in-depth review of key techniques in software error detection

Software error detection is one of the most challenging problems in software engineering. Now, you can learn how to make the most of software testing by selecting test cases to maximize the probability of revealing latent errors. Software Error Detection through...

Configuration Management Principles and Practice
Configuration Management Principles and Practice

Configuration management (CM) is an important, but often neglected, practice that allows application developers and project managers to better identify potential problems, manage changes, and track the progress of software projects. An effective CM strategy—one that adheres to the practice's complexity while harnessing its depth—can...

The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise

Achieve streamlined, rapid production with enterprise-level DevOps

Awarded DevOps 2017 Book of the Year, The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique...

Python Geospatial Analysis Cookbook
Python Geospatial Analysis Cookbook

Over 60 recipes to work with topology, overlays, indoor routing, and web application analysis with Python

About This Book

  • Explore the practical process of using geospatial analysis to solve simple to complex problems with reusable recipes
  • Concise step-by-step instructions to teach you...
Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy