The tools are grouped by the testing activities or areas that are supported by a set of tools, for example, tools that support management activities tools to support static testing, etc. A tool that measures some aspect of software may have few unexpected side-effects also on that-software. Like, for example, a tool that measures timings for perform…
A Simplified Approach to Data Structures is the book for those who not only want to learn but also to understand the concepts of structuring the data in computer's memory. A simplified approach using examples and diagrams is provided so that the students get thorough knowledge of data structures. MCQs included at the end of each chapter lead the stu…
A Simplified Approach to Data Structures is the book for those who not only want to learn but also to understand the concepts of structuring the data in computer's memory. A simplified approach using examples and diagrams is provided so that the students get thorough knowledge of data structures. MCQs included at the end of each chapter lead the stu…
Updated to follow the recommendations put forth by the ACM/SIGCSE 2001 task force, Analysis of Algorithms: An Active Learning Approach, Second Edition raises readers' awareness of the effects that algorithms have on the efficiency of a program, and helps students develop the skills necessary to analyze the algorithms used in effective programming. B…
This book starts with a chapter on data structure for two reasons. First, one has an intuitive feeling that data precede algorithms: you must have some objects before you can perform operations on them. Second, and this is the more immediate reason, this book assumes that the reader is familiar with the basic notions of computer programming. Traditi…
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is int…
This book aims to provide comprehensive knowledge of network security to students without a technical background who will need this knowledge to be effective managers.
Clarification and Implication Notes
Clarification and Implication Notes highlight important ideas throughout the text.
From the Trenches
Providing students with insights i…
This book has been the authoritative text on the subject. While building on its classic strengths, the text continues to find new ways to make the Information current and relevant to students.
New Features:
* A new section-Added on the important emerging topic of Revenue Management
* All Excel Coverage-Updated for Excel 2007
* New Proble…
This book covers the fundamentals of Object-Oriented Programming with Java at both basic and advanced levels. Replete with numerous exercises and practical problems, it offers a balanced treatment of theory and practice for developing desktop, enterprise, and web applications.
Salient Features
* Coverage of advanced topics like Socket Programm…
Java 8 in Action is a clearly written guide to the new features of Java 8. It begins with a practical introduction to lambdas, using real-world Java code. Next, it covers the new Streams API and shows how you can use it to make collection-based code radically easier to understand and maintain. It also explains other major Java 8 features including d…