70 resultater (0,55340 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Genetic Engineering - - Bog - Apple Academic Press Inc. - Plusbog.dk

Leveraging the Wisdom of the Crowd in Software Testing - Rajini Padmanaban - Bog - Apple Academic Press Inc. - Plusbog.dk

Leveraging the Wisdom of the Crowd in Software Testing - Rajini Padmanaban - Bog - Apple Academic Press Inc. - Plusbog.dk

Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much attention lately. While there are a few online resources that explain what crowdsourced testing is all about, there’s been a need for a book that covers best practices, case studies, and the future of this technique. Filling this need, Leveraging the Wisdom of the Crowd in Software Testing shows you how to leverage the wisdom of the crowd in your software testing process. Its comprehensive coverage includes the history of crowdsourcing and crowdsourced testing, implementation practices, and future trends. The book discusses best practices in implementation—explaining what, when, and how to crowdsource in a testing effort. It also includes case studies that illustrate how both product and service companies have successfully applied crowdsourcing in their testing programs. Explaining how to use the combined advantages of crowdsourcing and cloud computing for software testing, the book examines various engagement models in which you could implement crowdsourced testing. It addresses effective defect management in crowdsourced testing and considers both the business and engineering aspects of crowdsourced testing. The book explores the challenges, limitations, and situations when crowdsourced testing will not work and provides powerful best practices for mitigating the constraints and challenges, including how to build a crowdsourcing platform to test software products. Covering career opportunities for crowd testers, the book concludes by taking a look at the need to build a crowdsourced testing ecosystem, who the players of such an ecosystem would be, and who would need to champion such an effort.

DKK 625.00
1

Algal Genetic Resources - - Bog - Apple Academic Press Inc. - Plusbog.dk

Algal Genetic Resources - - Bog - Apple Academic Press Inc. - Plusbog.dk

This book focuses on the current and potential applications of microalgae and cyanobacteria in pharmaceuticals, nutraceuticals, and cosmeceuticals. The book deals with the very recent and advanced techniques and technologies in algal cultivation and extraction for its application. The chapters discuss the biological importance, properties, and uses of algal metabolites and microalgae-based compounds in drug development, in food nutrition enhancement, and in the development of cosmetics with medicinal properties. The chapter authors cover a range of diverse topics on algal biological resources, such as: - algae as a nutraceutical and functional food ingredient - the extraction of food bioactive compounds from microalgae - spirulina-derived nutraceuticals and their applications in the food industry - anticancer compounds from freshwater microalgae - cosmetic applications of microalgal and cyanobacterial pigments - and more This unique book, Algal Genetic Resources: Cosmeceuticals, Nutraceuticals, and Pharmaceuticals from Algae , will enlighten readers on the vast usefulness of microalgae and cyanobacteria as an important resource for the cosmeceutical, pharmaceutical and nutraceutical industries for their broad biotechnological potential industrial applications. The volume will be a valuable reference for scientists and researchers in these areas as well as for advanced students and faculty in ecology, phycology, botany, agriculture, biotechnology, microbiology, environmental biotechnology, plant science, and life sciences.

DKK 819.00
1

Conducting Network Penetration and Espionage in a Global Environment - Bruce Middleton - Bog - Apple Academic Press Inc. - Plusbog.dk

Conducting Network Penetration and Espionage in a Global Environment - Bruce Middleton - Bog - Apple Academic Press Inc. - Plusbog.dk

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks—using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton’s decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you’ve learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today’s networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

DKK 1022.00
1

Chromic Materials - Aravin Prince Periyasamy - Bog - Apple Academic Press Inc. - Plusbog.dk

Multicomponent Polymeric Materials - - Bog - Apple Academic Press Inc. - Plusbog.dk

Global Biodiversity - - Bog - Apple Academic Press Inc. - Plusbog.dk

Global Biodiversity - - Bog - Apple Academic Press Inc. - Plusbog.dk

Plant Biotechnology, Volume 2 - - Bog - Apple Academic Press Inc. - Plusbog.dk

Bioethanol - - Bog - Apple Academic Press Inc. - Plusbog.dk

Omics in Clinical Practice - - Bog - Apple Academic Press Inc. - Plusbog.dk

Plant OMICS and Crop Breeding - - Bog - Apple Academic Press Inc. - Plusbog.dk

Agroecosystems - K. R. Krishna - Bog - Apple Academic Press Inc. - Plusbog.dk

Global Biodiversity - - Bog - Apple Academic Press Inc. - Plusbog.dk

DKK 835.00
1

Bioremediation and Phytoremediation Technologies in Sustainable Soil Management - - Bog - Apple Academic Press Inc. - Plusbog.dk

Bioremediation and Phytoremediation Technologies in Sustainable Soil Management - - Bog - Apple Academic Press Inc. - Plusbog.dk

This 4-volume set focuses on the use of microbial bioremediation and phytoremediation to clean up pollutants in soil, such as pesticides, petroleum hydrocarbons, metals, and chlorinated solvents, which reduce the soil''s fertility and renders it unfit for plant growth. The volumes cover the many diverse eco-friendly microbial bioremediation and phytoremediation techniques for sustainable soil management. Volume 4: Degradation of Pesticides and Polychlorinated Biphenyls addresses pesticide degradation, PCBs degradation, and genetic interventions. It begins by describing environmental pesticide degradation, mechanisms and sustainability, microbes and microbial enzymes, plant microbe interactions, organophosphorus degradations and endosulfan degradation. It then goes on to discuss PCBs and degradation, cypermethrin, degradation by Phanerochaete chrysosporium , and carvone and surfactants for degradation of PCBs. The book also advocates for genetic systems for degradation of PCBs and pesticides, with discussion of the different advantages and disadvantages for each strategy and the various techniques. Other volumes in the 4-volume set: • Volume 1: Fundamental Aspects and Contaminated Sites • Volume 2: Microbial Approaches and Recent Trends • Volume 3: Inventive Techniques, Research Methods, and Case Studies Together, these four volumes provide in-depth coverage of the mechanisms, advantages, and disadvantages of the bioremediation and phytoremediation technologies for safe and sustainable soil management.

DKK 835.00
1

Childhood Obesity - - Bog - Apple Academic Press Inc. - Plusbog.dk

The Chemical Century - Richard J. Sundberg - Bog - Apple Academic Press Inc. - Plusbog.dk

The Chemical Century - Richard J. (university Of Virginia Sundberg - Bog - Apple Academic Press Inc. - Plusbog.dk

Official (ISC)2 Guide to the CISSP CBK - - Bog - Apple Academic Press Inc. - Plusbog.dk

Official (ISC)2 Guide to the CISSP CBK - - Bog - Apple Academic Press Inc. - Plusbog.dk

As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape. The domain names have been updated as follows: CISSP Domains, Effective April 15, 2015 1) Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) 1) Asset Security (Protecting Security of Assets) 1) Security Engineering (Engineering and Management of Security) 1) Communications and Network Security (Designing and Protecting Network Security) 1) Identity and Access Management (Controlling Access and Managing Identity) 1) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) 1) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) 1) Software Development Security (Understanding, Applying, and Enforcing Software Security) Some candidates may be wondering how these updates affect training materials for the CISSP credential. As part of the organization’s comprehensive education strategy and certifying body best practices, (ISC)² training materials do not teach directly to its credential examinations. Rather, (ISC)² Education is focused on teaching the core competencies relevant to the roles and responsibilities of today’s practicing information security professional. It is designed to refresh and enhance the knowledge of experienced industry professionals.

DKK 699.00
1

Protective Armor Engineering Design - Magdi El Messiry - Bog - Apple Academic Press Inc. - Plusbog.dk

Protective Armor Engineering Design - Magdi El Messiry - Bog - Apple Academic Press Inc. - Plusbog.dk

There is increasing interest in the area of protective vests, either for protection against bullets or protection from the most realistic threats within domestic frontline operations: edged weapon, knives, and medical needles. This volume addresses that need. This new book provides an in-depth survey of the state-of-the-art research and practical techniques in the area of protected fabrics, especially stab-resistant and bulletproof fabrics. The book covers: • The history of protective armor: the long history of the art of protective armor manufacturing. • Materials used for body armor: the design and materials used for soft armor to increase its perforation-resistance utilizing high-performance fibers. • Anti-stab and anti-bullet armor design: the different design parameters required for the design of flexible armor in order to stop high-velocity projectiles. • The comfort of the body armor design: the flexibility, thermal resistivity, and evaporative moisture resistivity through the fabric. • Methods of testing the flexible body armors: testing the components of flexible body armor, according to the level of the protection required, such as NIJ Standards, HOSDB Body Armour Standards for UK Police, and the German SK1 Standard, among others. Written by an expert in textile composite material engineering, this volume fills an important gap in the area of protective fabric against stabbing or bullets and provides invaluable practical knowledge for body armor design.

DKK 835.00
1

Metastatic Diseases - - Bog - Apple Academic Press Inc. - Plusbog.dk

Data Structure and Software Engineering - - Bog - Apple Academic Press Inc. - Plusbog.dk

New Microbial Technologies for Advanced Biofuels - - Bog - Apple Academic Press Inc. - Plusbog.dk

Epigenetics and Pathology - - Bog - Apple Academic Press Inc. - Plusbog.dk