14 results (1,38563 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

The Total CISSP Exam Prep Book Practice Questions Answers and Test Taking Tips and Techniques

GBP 160.00
1

PMI-PBA Exam Practice Test and Study Guide

PMI-PBA Exam Practice Test and Study Guide

The PMI-PBA® Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions. The systematic use of memory maps helps aid in the efficient recall of information and can boost confidence during the exam. Well-crafted practice questions are fantastic study aids that can be used to track your progress as you learn new concepts introduce you to the complex sentence structure that is likely to appear on the exam and concentrate your studies by domain essentially preparing you to pass the very challenging PMI-PBA® Exam in the allotted four hours. In addition to study hints and exam topics this book provides references to tools and techniques that should be incorporated into your work immediately. For each of the five domains outlined in the PMI Professional in Business Analysis (PMI-PBA)® Examination Content Outline 2013 (the ECO) twenty practice questions test your knowledge. Also included is a challenging 200-question practice exam which is representative of the actual exam. To enhance your studies a timed online simulated exam is also provided. At the end of the simulated exam you can see your score per the number of questions you answered correctly. These exam questions are crafted to foster learning and reinforce content; they are not obscure or overly complicated but rather are representative of the actual exam. Knowing what to do must be translated into doing what you know. This book helps you prepare for the PMI-PBA® exam by instilling knowledge and encouraging critical thinking. As a result the skills attained can lead to improved project success and outcomes and you’ll have a much stronger understanding of the material along with the tools and techniques of business analysis. PMI-PBA® is a registered trademark of the Project Management Institute.

GBP 42.99
1

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test or ethical hack from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools which are required to complete a penetration test. The book covers a wide range of tools including Backtrack Linux Google reconnaissance MetaGooFil dig Nmap Nessus Metasploit Fast Track Autopwn Netcat and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools it details a four-step methodology for conducting an effective penetration test or hack. Providing an accessible introduction to penetration testing and hacking the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

GBP 170.00
1

Information Technology Control and Audit Fifth Edition

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

As we get caught up in the quagmire of Big Data and analytics it remains critically important to be able to reflect and apply insights experience and intuition to your decision-making process. In fact a recent research study at Tel Aviv University found that executives who relied on their intuition were 90 percent accurate in their decisions. Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making focuses on this intuition-based decision making. The book does not discount data-based decision making especially for decisions that are important and complex. Instead it emphasizes the importance of applying intuition gut feel spirituality experiential learning and insight as key factors in the executive decision-making process. Explaining how intuition is a product of past experience learning and ambient factors the text outlines methods that will help to enhance your data-driven decision-making process with intuition-based decision making. The first part of the book the Research Track presents contributions from leading researchers worldwide on the topic of intuition-based decision making as applied to management. In the second part of the book the Practice Track global executives and senior managers in industry government universities and not-for-profits present vignettes that illustrate how they have used their intuition in making key decisions. The research part of the book helps to frame the problem and address leading research in intuition-based decision making. The second part then explains how to apply these intuition-based concepts and issues in your own decision-making process. | Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

GBP 56.99
1

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing.

GBP 56.99
1

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Software Testing A Craftsman’s Approach Fifth Edition

Healthcare Informatics Improving Efficiency through Technology Analytics and Management

Healthcare Informatics Improving Efficiency through Technology Analytics and Management

Healthcare Informatics: Improving Efficiency through Technology Analytics and Management supplies an understanding of the different types of healthcare service providers corresponding information technologies analytic methods and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals healthcare systems ACOs and patient analytics including hot spotting risk stratification and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies data and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information including Business Intelligence Six Sigma Data and Text Mining. | Healthcare Informatics Improving Efficiency through Technology Analytics and Management

GBP 44.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

Database Design Using Entity-Relationship Diagrams

Database Design Using Entity-Relationship Diagrams

Essential to database design entity-relationship (ER) diagrams are known for their usefulness in data modeling and mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams Third Edition database designers developers and students preparing to enter the field can quickly learn the ins and outs of data modeling through ER diagramming. Building on the success of the bestselling first and second editions this accessible text includes a new chapter on the relational model and functional dependencies. It also includes expanded chapters on Enhanced Entity-Relationship (EER) diagrams and reverse mapping. It uses cutting-edge case studies and examples to help readers master database development basics and defines ER and EER diagramming in terms of requirements (end user requests) and specifications (designer feedback to those requests) facilitating agile database development. This book Describes a step-by-step approach for producing an ER diagram and developing a relational database from it Contains exercises examples case studies bibliographies and summaries in each chapter Details the rules for mapping ER diagrams to relational databases Explains how to reverse engineer a relational database back to an entity-relationship model Includes grammar for the ER diagrams that can be presented back to the user facilitating agile database development The updated exercises and chapter summaries provide the real-world understanding needed to develop ER and EER diagrams map them to relational databases and test the resulting relational database. Complete with a wealth of additional exercises and examples throughout this edition should be a basic component of any database course. Its comprehensive nature and easy-to-navigate structure make it a resource that students and professionals will turn to throughout their careers.

GBP 56.99
1

The Web Accessibility Project Development and Testing Best Practices

The Web Accessibility Project Development and Testing Best Practices

Approximately 15% of the global population is affected by some sort of disability according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design development and extensive accessibility testing which are essential for most of the customer-facing websites. In a fast-paced world incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit accessibility functional tests and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book developers can help their organizations rise to a whole new level of accessibility adherence innovation and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users. | The Web Accessibility Project Development and Testing Best Practices

GBP 66.99
1