IT-eBooks.directory Facebook Icon Image IT-eBooks.directory Google Plus Icon Image IT-eBooks.directory Twitter Icon Image
IT-eBooks.directory Logo Image

Download Free CRC Press eBooks


Software and Systems Architecture in Action Image

Software and Systems Architecture in Action

Aug 17 2016  Modern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance, and evolution of these architectures.Software and Systems Architecture in Action explores practices that can be helpful in the development of architectures of large-scale systems in which software is a major component. Examining the synergies that exist between the disciplines of software and system...

Ready Technology Image

Ready Technology

Aug 17 2016  Companies understand that their ability to compete is tied directly to their ability to leverage the very latest technology advances. Fortunately, deploying new technology has never been easier, primarily due to early maturity and cloud delivery. One approach that is helping companies rapidly pilot and affordably deploy new technologies is ready technology, a new category of information technology (IT). This book explains the ready technology adoption process in detail, enabling companies to exploit new technology immediately and effectively. In this book, the author challenges the traditiona...

Practical Cryptography Image

Practical Cryptography

Aug 17 2016  Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptogra...

Multilevel Security for Relational Databases Image

Multilevel Security for Relational Databases

Aug 17 2016  Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype...

Leveraging the Wisdom of the Crowd in Software Testing Image

Leveraging the Wisdom of the Crowd in Software Testing

Aug 15 2016  Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much attention lately. While there are a few online resources that explain what crowdsourced testing is all about, theres been a need for a book that covers best practices, case studies, and the future of this technique.Filling this need, Leveraging the Wisdom of the Crowd in Software Testing shows you how to leverage the wisdom of the crowd in your software testing process. Its comprehensive coverage includes the history of crowdsourcing and crowdsourced testing, imp...

IT-eBooks.directory