11 resultater (0,19712 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Leveraging the Wisdom of the Crowd in Software Testing - Rajini Padmanaban - Bog - Apple Academic Press Inc. - Plusbog.dk

Leveraging the Wisdom of the Crowd in Software Testing - Rajini Padmanaban - Bog - Apple Academic Press Inc. - Plusbog.dk

Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much attention lately. While there are a few online resources that explain what crowdsourced testing is all about, there’s been a need for a book that covers best practices, case studies, and the future of this technique. Filling this need, Leveraging the Wisdom of the Crowd in Software Testing shows you how to leverage the wisdom of the crowd in your software testing process. Its comprehensive coverage includes the history of crowdsourcing and crowdsourced testing, implementation practices, and future trends. The book discusses best practices in implementation—explaining what, when, and how to crowdsource in a testing effort. It also includes case studies that illustrate how both product and service companies have successfully applied crowdsourcing in their testing programs. Explaining how to use the combined advantages of crowdsourcing and cloud computing for software testing, the book examines various engagement models in which you could implement crowdsourced testing. It addresses effective defect management in crowdsourced testing and considers both the business and engineering aspects of crowdsourced testing. The book explores the challenges, limitations, and situations when crowdsourced testing will not work and provides powerful best practices for mitigating the constraints and challenges, including how to build a crowdsourcing platform to test software products. Covering career opportunities for crowd testers, the book concludes by taking a look at the need to build a crowdsourced testing ecosystem, who the players of such an ecosystem would be, and who would need to champion such an effort.

DKK 625.00
3

Official (ISC)2 Guide to the CISSP CBK - - Bog - Apple Academic Press Inc. - Plusbog.dk

Official (ISC)2 Guide to the CISSP CBK - - Bog - Apple Academic Press Inc. - Plusbog.dk

As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape. The domain names have been updated as follows: CISSP Domains, Effective April 15, 2015 1) Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) 1) Asset Security (Protecting Security of Assets) 1) Security Engineering (Engineering and Management of Security) 1) Communications and Network Security (Designing and Protecting Network Security) 1) Identity and Access Management (Controlling Access and Managing Identity) 1) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) 1) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) 1) Software Development Security (Understanding, Applying, and Enforcing Software Security) Some candidates may be wondering how these updates affect training materials for the CISSP credential. As part of the organization’s comprehensive education strategy and certifying body best practices, (ISC)² training materials do not teach directly to its credential examinations. Rather, (ISC)² Education is focused on teaching the core competencies relevant to the roles and responsibilities of today’s practicing information security professional. It is designed to refresh and enhance the knowledge of experienced industry professionals.

DKK 699.00
1

Employer's Guide to Medical Tourism Benefit Design - Maria K. Todd - Bog - Apple Academic Press Inc. - Plusbog.dk

Employer's Guide to Medical Tourism Benefit Design - Maria K. Todd - Bog - Apple Academic Press Inc. - Plusbog.dk

Health travel, domestic and international, for the group health benefit sector is an established cost containment option that was for years, used primarily by reinsurers and case management firms and limited to rare, high-cost, tertiary care. Through the use of cost-saving benefit design incentives, employers are testing the receptiveness of plan participants and encouraging plan members to consider a narrow network of high-performance healthcare providers in targeted locations that may be located further from home. In addition to foreign medical tourism, this has given rise to another emerging market - domestic medical tourism. Unlike foreign medical tourism, patients don''t leave the country. Instead they travel to another city with the U.S. to have procedures for upt to 75% less than they would pay if they were treated closer to home. Large employers such as Wal-Mart, Lowe''s and Pepsi Co are offering employees and dependents heart, spine and transplant surgeries at large medical facilities such as John Hopkins and the Cleveland Clinic, regardless of where they are located in the U.S. This book addresses how to design and launch a health travel benefit pilot program, plan funding options, quality, safety and logistic considerations, provider selection criteria, and bundled case rate contracting in the USA and abroad. The author also includes many worksheets, checklists and forms to use when designing a health travel benefit program.

DKK 538.00
1

DOE Simplified - Mark J. (stat Ease Inc Anderson - Bog - Apple Academic Press Inc. - Plusbog.dk

DOE Simplified - Mark J. (stat Ease Inc Anderson - Bog - Apple Academic Press Inc. - Plusbog.dk

Offering a planned approach for determining cause and effect, DOE Simplified: Practical Tools for Effective Experimentation, Third Edition integrates the authors’ decades of combined experience in providing training, consulting, and computational tools to industrial experimenters. Supplying readers with the statistical means to analyze how numerous variables interact, it is ideal for those seeking breakthroughs in product quality and process efficiency via systematic experimentation. Following in the footsteps of its bestselling predecessors, this edition incorporates a lively approach to learning the fundamentals of the design of experiments (DOE). It lightens up the inherently dry complexities with interesting sidebars and amusing anecdotes. The book explains simple methods for collecting and displaying data and presents comparative experiments for testing hypotheses. Discussing how to block the sources of variation from your analysis, it looks at two-level factorial designs and covers analysis of variance. It also details a four-step planning process for designing and executing experiments that takes statistical power into consideration. This edition includes a major revision of the software that accompanies the book (via download) and sets the stage for introducing experiment designs where the randomization of one or more hard-to-change factors can be restricted. Along these lines, it includes a new chapter on split plots and adds coverage of a number of recent developments in the design and analysis of experiments. Readers have access to case studies, problems, practice experiments, a glossary of terms, and a glossary of statistical symbols, as well as a series of dynamic online lectures that cover the first several chapters of the book.

DKK 643.00
1

Leveraging Lean in Outpatient Clinics - George Mayzell - Bog - Apple Academic Press Inc. - Plusbog.dk

Leveraging Lean in Outpatient Clinics - George Mayzell - Bog - Apple Academic Press Inc. - Plusbog.dk

This book is part of a series of titles that are a spin-off of the Shingo Prize-winning book Leveraging Lean in Healthcare: Transforming Your Enterprise into a High Quality Patient Care Delivery System. Each book in the series focuses on a specific aspect of healthcare—including emergency departments, medical laboratories, outpatient clinics, ancillary services, and surgical services—that has demonstrated significant process and quality improvements after a Lean implementation. Because ambulatory care settings play a significant role in the healthcare delivery system, it is important to understand how Lean concepts and tools can be used to deliver high-quality, cost-effective care. Leveraging Lean in Outpatient Clinics: Creating a Cost Effective, Standardized, High Quality, Patient-Focused Operation provides a functional understanding of Lean processes and quality improvement techniques in an outpatient clinic environment. This book is an ideal guide for healthcare executives, leaders, process improvement team members, and inquisitive frontline workers who want to implement and leverage Lean in outpatient clinical settings. Supplying detailed descriptions of Lean tools and methodologies, it identifies powerful Lean solutions specific to the needs of outpatient facilities. The first section provides an overview of Lean concepts, tools, methodologies, and applications. The second section focuses on the application of Lean in the outpatient clinic environment. It presents illustrative examples of Lean deployments in primary care, GI, and preadmission testing clinics. The examples provide broad content which can be readily transferable to other outpatient clinic settings. Illustrating leadership’s role in achieving departmental goals, this book will provide you with a well-rounded understanding of how Lean can be applied to achieve significant improvements throughout the complete continuum of care.

DKK 571.00
1

Android Malware and Analysis - Tim Strazzere - Bog - Apple Academic Press Inc. - Plusbog.dk

Android Malware and Analysis - Tim Strazzere - Bog - Apple Academic Press Inc. - Plusbog.dk

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis. In Android Malware and Analysis , Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static. This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how you can apply static analysis to break apart the application/malware using reverse engineering tools and techniques to recreate the actual code and algorithms used. The book presents the insights of experts in the field, who have already sized up the best tools, tactics, and procedures for recognizing and analyzing Android malware threats quickly and effectively. You also get access to an online library of tools that supplies what you will need to begin your own analysis of Android malware threats. Tools available on the book’s site include updated information, tutorials, code, scripts, and author assistance. This is not a book on Android OS, fuzz testing, or social engineering. Instead, it is about the best ways to analyze and tear apart Android malware threats. After reading the book, you will be able to immediately implement the tools and tactics covered to identify and analyze the latest evolution of Android threats. Updated information, tutorials, a private forum, code, scripts, tools, and author assistance are available at AndroidRisk.com for first-time owners of the book.

DKK 625.00
1