Preface xxv CHAPTER 1 SOFTWARE AND SOFTWARE ENGINEERING 1 1.1 The Nature of Software 3 1.1.1 Defining Software 4 1.1.2 Software Application Domains 7 1.1.3 Legacy Software 9 1.2 The Unique Nature of WebApps 10 1.3 Software Engineering 12 1.4 The Software Process 14 1.5 Software Engineering Practice 17 1.5.1 The Essence of Practice 17 1.5.2 General Principles 19 1.6 Softw…
Daftar isi: Pendahuluan Pengenal Rekayasa Perangkat Lunak Mengapa harus belajar RPL Definisi Lingkup RPL Setelah Paham RPL,Lalu Apa Ringkasan Pertanyaan Pengembangan Hingga sejauh ini Siklus Hidup Dan Proses Perangkat Lunak Antara Proses dan Siklus Hidup Siklus hidup Proses prangkat lunak Ringkasan Pertanyaan pengembangan Hingga sejauh ini Perencanaan Perangkat Lunak Peren…
Contents PART 1 Manager’s Guide to Implementing a Quality System 1 Defining Software Quality 1.1 Why bother with Quality? 1.2 Quality – What is it? 2 Managing a Quality Company 2.1 Dedication to Customer Satisfaction 2.2 Emphasis on Continuous Improvement 2.3 Treating Suppliers as Business Partners 2.4 Communication and Teamwork 2.5 Empowering Employees 2.6 Commitment by T…
Contents Part I: Stories of agile success in government Chapter 1: Case study at the UK ministry of defence Chapter 2: Case study at the US department of veterans affairs Chapter 3: Case study at the FBI Chapter 4: Case study in queensland, Australia Chapter 5: Case study at the UK met office Part II: The 9 agile leadership behaviors Chapter 6: The agile manifesto and its principles…
Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …
Table of contents: 1.Introduction 2.Basic TCP Sockets 3.Of Names and Address Families 4.Using UDP Sockets 5.Sending and Receiving Data 6.Beyond Basic Socket Programming 7.Under the Hood 8.Socket Programming in C++
Contents: 1. Introduction 2. Security vocabulary 3. Software testing and changes in the security landscape 4. All trust is misplaced 5. Security testing considerations 6. Threat modeling and risk assessment processes 7. Personas and testing 8. Security test planning 9. Sample security considerations 10. Vulnerability case study : brute force browsing 11. Vulnerability case study : bu…
ABSTRAK Buku ini mengkaji dan memaparkan tentang perlindungan lisensi copyleft terhadap open source software di Indonesia. Perkembangan open source software diikuti dengan perkembangan model perjanjian lisensi salah satunya lisensi copyleft, yang di dominasi oleh GNU General Public Lisence yang diterbitkan oleh free software foundation. Tetapi tidak semua lisensi yang ada dapat menjamin kebera…
Termasuk bibliografi dan indeks. CONTENS: 1. Getting to know storyline 2 2. Creating new projects 3. Scenes and slides 4. Scenes and slides 5. Working with text 6. Adding graphics 7. Object properties 8. Arranging objects 9. Working with media 10. States & layers 11. Triggers 12. Advanced triggers & variables 13. Q…
Termasuk bibliografi dan indeks. CONTENS: 1. Getting to know articulate studio