IT eBooks
Download, Read, Use
Security Metrics
Security Metrics

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. ...
Continuous Delivery
Continuous Delivery

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing process, and improved collaboration between developers, testers, and operations, delivery teams can get changes released in a matter of hours - sometimes even minutes–no matter what the size of a project or the complexity of its code base. ...
BIRT: A Field Guide, 3rd Edition
BIRT: A Field Guide, 3rd Edition

More than ten million people have downloaded BIRT (Business Intelligence and Reporting Tools) from the Eclipse web site, and more than one million developers are estimated to be using BIRT. Built on the open source Eclipse platform, BIRT is a powerful report development system that provides an end-to-end solution - from creating and deploying reports to integrating report capabilities in enterprise applications. This book is an essential resource for users who want to create presentation-quality reports quickly. The extensive examples, step-by-step instructions, and abundant illustrations help new users develop report design skills. Power users can find the information they need to make the most of the product's rich set of features to build sophisticated and compelling reports. ...
Crackproof Your Software
Crackproof Your Software

This essential resource for software developers highlights the weak points in "well-protected" software, shows how crackers break common protection schemes, and how to defend against crackers. Includes in-depth discussions of anti-debugging and anti-disassembling. ...
Hacking VoIP
Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...
Hacking, 2nd Edition
Hacking, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. ...
Realm of Racket
Realm of Racket

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language. In Realm of Racket, you'll learn to program by creating increasingly complex games. Your journey begins with the Guess My Number game and coverage of some basic Racket etiquette. Next you'll dig into syntax and semantics, lists, structures, and conditionals, and learn to work with recursion and the GUI as you build the Robot Snake game. After that it's on to lambda and mutant structs (and an Orc Battle), and fancy loops and the Dice of Doom. Finally, you'll explore laziness, AI, distributed games, and the Hungry Henry game. ...
Tools for Signal Compression
Tools for Signal Compression

This book presents tools and algorithms required to compress / uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc. In a first rather theoretical part, this book presents the standard tools used in compression systems: scalar and vector quantization, predictive quantization, transform quantization, entropy coding. In particular we show the consistency between these different tools. The second part explains how these tools are used in the latest speech and audio coders. The third part gives Matlab programs simulating these coders. ...
Game Invaders
Game Invaders

Presenting a holistic and thoroughly practical investigation of the true nature of computer games that arms readers with a small yet powerful set of theories for developing unique approaches to understanding games. Game Invaders fully integrates genre theory, new media aesthetics, perceptual opportunities, and semiotics into a practical DIY toolkit for games analysis—offering detailed guidance for how to conduct in-depth critiques of game content and gameplay. Featuring an informal and witty writing style, the book devotes a number of chapters to specific games from all eras, clearly demonstrating the practical application of the theories to modern, large-scale computer games. ...
Loop-shaping Robust Control
Loop-shaping Robust Control

The loop-shaping approach consists of obtaining a specification in relation to the open loop of the control from specifications regarding various closed loop transfers, because it is easier to work on a single transfer (in addition to the open loop) than on a multitude of transfers (various loopings such as set point/error, disturbance / error, disturbance / control, etc.). The simplicity and flexibility of the approach make it very well adapted to the industrial context. This book presents the loop-shaping approach in its entirety, starting with the declension of high-level specifications into a loop-shaping specification. It then shows how it is possible to fully integrate this approach for the calculation of robust and efficient correctors with the help of existing techniques, which have already been industrially tried and tested, such as H-infinity synthesis. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025