You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This informative book is designed to help professionals involved with development of software or systems manage process improvement initiatives within their company by explaining the history, method and psychology behind AFA.
From the basics to the most advanced quality of service (QoS) concepts, this all encompassing, first-of-its-kind book offers an in-depth understanding of the latest technical issues raised by the emergence of new types, classes and qualities of Internet services. The book provides end-to-end QoS guidance for real time multimedia communications over the Internet. It offers you a multiplicity of hands-on examples and simulation script support, and shows you where and when it is preferable to use these techniques for QoS support in networks and Internet traffic with widely varying characteristics and demand profiles. This practical resource discusses key standards and protocols, including real-...
••A must-read for software testers from a noted software testing guru•Examples, specifics, and a running case study bring the content to life•Separates software test processes into three categories: routing, highly-visible, and mission-critical
It was our great pleasure to extend a welcome to all who participated in SERA 2003, the ?rst world-classs International Conference on Software Engineering Research and Applications, which was held at Crowne Plaza Union Square Hotel, San Francisco, California, USA. The conference was sponsored by the International Association for Computer and Information Science (ACIS), in cooperation with the Software Engine- ing and Information Technology Institute at Central Michigan University. This conference was aimed at discussing the wide range of problems encountered in present and future high technologies. In this conference, we had keynote speeches by Dr. Barry Boehm and Dr. C.V. Ramamoorthy and invited talks by Dr. RaymondYeh, Dr. Raymond Paul, Dr. Mehmet S ̧ahinoglu, which were fruitful to all who participated in SERA 2003. We would like to thank the publicity chairs and the members of our program c- mittees for their work on this conference. We hope that SERA 2003 was enjoyable for all participants.
Taking you beyond the Capability Maturity Model- to the integrated world of systems and software, this comprehensive resource presents CMMI- Version 1.2 in a manner that is easy to comprehend by higher-level managers and practitioners alike. Written by a world-renowned expert in the field, the book offers a clear picture of the activities an organization would be engaged in if their systems and software engineering processes were based on CMMI-."
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Written by a leading expert in the field, this unique volume contains current test design approaches and focuses only on software test design. Copeland illustrates each test design through detailed examples and step-by-step instructions.
Radu, an electrical engineer who works as a consultant for payment systems and telecom operations in Belgium, has written a thorough description of EMV chip card technology. Following a description of chip migration with EMV and its use for debit and credit cards, Radu details the processing of such cards, including remote card payments, with attention to various formats. A lengthy section of appendices details the technology's security framework, threats, services, mechanisms, and risk management. Annotation copyrighted by Book News, Inc., Portland, OR
This book is a clearly written, well structured hands-on guide for the professional software developer and engineer who needs to build secure applications with CORBA. It offers guidance securing CORBA applications, integrating security infastructure with COBRA applications, evaluating the security effectiveness of distributed applications, and MICOSec CORBA security implementation. Professionals get a comprehensive study of CORBA security architecture, providing a better understanding of its goals and limitations. It serves as a complete reference for understanding security in distributed systems. The book generously illustrates the usage of the MICOSec CORBA security services implementation, including important information on the installation and configuration of MICOSec, usage of two different kinds of application-facing interfaces, and the configuration of CORBA security not containing any security-related modifications.