The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-sellin
The papers presented in this book reflects the substantial research efforts taking place at SEI focusing on the development, deployment, and evolution of component-based software systems. The book exp
A guide to software engineering. It focuses on widely used software engineering methods and will de-emphasize or completely eliminate discussion of secondary methods, tools and techniques.
Two software security experts show developers how to eliminate design vulnerabilities from the startSoftware design errors can lead to the worst security flaws and the most expensive to remedy. This h
Development within RFID (Radio-Frequency Identification) is expanding rapidly with applications ranging from secure Internet payment systems to industrial automation, access control and supply chain m
The architects of the Software Factories method provide a detailed look at this faster, less expensive, and more reliable approach to application development. Software Factories significantly increase
Gain the skills to effectively plan software applications and systems using the latest version of UML UML 2 represents a significant update to the UML specification, from providing more robus
Emphasizing concepts and principles, this book provides readers with an accessible approach to software design. It presents several examples of commercial and research systems throughout the chapters
EMPHASIZES CONCEPTS. Focusing on big-picture concepts and the nature of scientific inquiry, Animal Behavior: Concepts, Methods, and Applications gives students the tools that they need in order to und
Safety Health and Security in Wastewater Systems,?Sixth Edition offers comprehensive coverage of critical information necessary for regulatory compliance, reduction of liability, reduction of costs, a
DIGITAL MEDIA, CONCEPTS AND APPLICATIONS, 3E prepares students for the workplace by teaching them to use business-standard software applications to complete projects and solve problems. The non-softwa
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
Software As Capital looks at software development through the eyes of a capital theorist, an economist fascinated by the constant evolution of new and better tools and processes. It asks, what is real
Reflects exact and heuristic methods of scheduling techniques suitable for creating customized sequencing and scheduling systems for flexible manufacturing, project management, group and cellular manu
Deals constructively with recognized software problems. Focuses on the unreliability of computer programs and offers state-of-the-art solutions. Covers?software development, software testing, structur
As a co-founder of Symbian and former executive of Psion Software, David Wood has been actively involved in well over 100 smartphone development projects worldwide. Over the time spent on these projec
This book provides invaluable guidance on moving an organization from the chaotic environment of free-form software development towards a more controlled and documented process. It discusses how IEEE
"“The definitive tool to learn what’s proper for Microsoft Windows systems. Roberta’s excellent guidance will easily help you build secure, resiliant systems.” --Steve Riley, Security Business and Tec
This authoritative book takes a comprehensive look at Executive Information Systems (EIS), covering what EIS is, how it differs from other applications, and how EIS will be used in the future.
Overviews Internet security for organizations, without getting into micro-level details of implementation. Shows how to analyze a company's systems in terms of security risks, and explains how to des
Design and develop Java-based, data-driven applications using Spring and Hibernate technology Spring 4 and Hibernate 4: Agile Java Design and Development covers real-world applications for developing
Now in its sixth edition, this bestselling reference focuses on the basic materials and methods used in building construction. Emphasizing common construction systems such as light wood frame, masonry
This unique reference source, edited by the world's most respected expert on molecular interaction field software, covers all relevant principles of the GRID force field and its applications in medici
Covering all aspects of the Certified Information Systems Security Professional (CISSP) exam, a professional handbook furnishes a detailed overview of the latest security trends and methodologies; dis
This book provides radiological technicians, radiologists, technicians, developers and sales engineers with a unique display of the methods and applications used in radiography. Building on the physic
Market-leading Organization Development and Change blends theory, concepts and applications in a comprehensive and clear presentation. The authors work from a strong theoretical foothold and apply beh
The final volume of this encyclopedia addresses such general aspects as methods for the analysis of polymer properties and technical processing. It also provides an overview of special applications in
* Basic power quality strategies and methods to protect electronic systems* Nearly twice the size of the last edition--new chapters on distributed generation and benchmarking--over 200 pages of new ma
Neural Network Learning and Expert Systems is the first book to present a unified and in-depth development of neural network learning algorithms and neural network expert systems. Especially suitable
This book presents the twin topics of singular perturbation methods and time scale analysis to problems in systems and control. The heart of the book is the singularly perturbed optimal control syste
This monograph is an attempt to develop further and refine methods based on input -output descriptions for analyzing feedback systems. Contrary to previous work in this area, the treatment heavily emp
Mello draws on years of experience in product development, hardware engineering, software development, and marketing, in creating this text for executives and new-product professionals. She presents
Packed with more than 200 colour illustrations, Visual Research explores a range of research methods that can be used by graphic designers and visual communicators in the development of clear and purp
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
Experience from the DARPA Urban Challenge provides details of the types of systems, software and processes that were used to develop the complex unmanned vehicles that participated in the DARPA Urban
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow