47 resultater (0,78641 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Leveraging the Wisdom of the Crowd in Software Testing - Rajini Padmanaban - Bog - Apple Academic Press Inc. - Plusbog.dk

Leveraging the Wisdom of the Crowd in Software Testing - Rajini Padmanaban - Bog - Apple Academic Press Inc. - Plusbog.dk

Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much attention lately. While there are a few online resources that explain what crowdsourced testing is all about, there’s been a need for a book that covers best practices, case studies, and the future of this technique. Filling this need, Leveraging the Wisdom of the Crowd in Software Testing shows you how to leverage the wisdom of the crowd in your software testing process. Its comprehensive coverage includes the history of crowdsourcing and crowdsourced testing, implementation practices, and future trends. The book discusses best practices in implementation—explaining what, when, and how to crowdsource in a testing effort. It also includes case studies that illustrate how both product and service companies have successfully applied crowdsourcing in their testing programs. Explaining how to use the combined advantages of crowdsourcing and cloud computing for software testing, the book examines various engagement models in which you could implement crowdsourced testing. It addresses effective defect management in crowdsourced testing and considers both the business and engineering aspects of crowdsourced testing. The book explores the challenges, limitations, and situations when crowdsourced testing will not work and provides powerful best practices for mitigating the constraints and challenges, including how to build a crowdsourcing platform to test software products. Covering career opportunities for crowd testers, the book concludes by taking a look at the need to build a crowdsourced testing ecosystem, who the players of such an ecosystem would be, and who would need to champion such an effort.

DKK 625.00
3

Conducting Network Penetration and Espionage in a Global Environment - Bruce Middleton - Bog - Apple Academic Press Inc. - Plusbog.dk

Conducting Network Penetration and Espionage in a Global Environment - Bruce Middleton - Bog - Apple Academic Press Inc. - Plusbog.dk

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks—using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton’s decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you’ve learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today’s networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

DKK 1022.00
1

Chemical Analysis - Modern Materials Evaluation and Testing Methods - Bog - Paperback

Chromic Materials - Aravin Prince Periyasamy - Bog - Apple Academic Press Inc. - Plusbog.dk

The Role of the Internet of Things (IoT) in Biomedical Engineering - - Bog - Apple Academic Press Inc. - Plusbog.dk

Multicomponent Polymeric Materials - - Bog - Apple Academic Press Inc. - Plusbog.dk

Analytical Methods for Milk and Milk Products - Bog - Hardback