Angebote zu "Applied" (35 Treffer)

User Stories Applied
€ 34.99 *
ggf. zzgl. Versand

Learn to build robust software that more closely meets the customer´s needs through applying the concept of user stories. A clear explanation of the most agile means of gathering software requirements Thoroughly reviewed and eagerly anticipated by the agile software development community Allows the reader to save time and resources by gathering the proper requirements BEFORE coding begins The concept of user stories has its roots as one of the main tenets of Extreme Programming. In simple terms, user stories represent an effective means of gathering requirements from the customer (roughly akin to use cases). This book describes user stories and demonstrates how they can be used to properly plan, manage, and test software development projects. The book highlights both successful and unsuccessful implementations of the concept, and provides sets of questions and exercises that drive home its main points. After absorbing the lessons in this book, readers will be able to introduce user stories in their organizations as an effective means of determining precisely what is required of a software application. Product Description Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software. The best way to build software that meets users´ needs is to begin with ´´user stories´´: simple, clear, brief descriptions of functionality that will be valuable to real users. In User Stories Applied , Mike Cohn provides you with a front-to-back blueprint for writing these user stories and weaving them into your development lifecycle. You´ll learn what makes a great user story, and what makes a bad one. You´ll discover practical ways to gather user stories, even when you can´t speak with your users. Then, once you´ve compiled your user stories, Cohn shows how to organize them, prioritize them, and use them for planning, management, and testing. User role modeling: understanding what users have in common, and where they differ Gathering stories: user interviewing, questionnaires, observation, and workshops Working with managers, trainers, salespeople and other ´´proxies´´ Writing user stories for acceptance testing Using stories to prioritize, set schedules, and estimate release costs Includes end-of-chapter practice questions and exercises User Stories Applied will be invaluable to every software developer, tester, analyst, and manager working with any agile method: XP, Scrum... or even your own home-grown approach. Features + Benefits Learn to build robust software that more closely meets the customer´s needs through applying the concept of user stories. ° A clear explanation of the most agile means of gathering software requirements ° Thoroughly reviewed and eagerly anticipated by the agile software development community ° Allows the reader to save time and resources by gathering the proper requirements BEFORE coding begins Backcover Agile requirements: discovering what your users really want. With this book, you will learn to: Flexible, quick and practical requirements that work Save time and develop better software that meets users´ needs Gathering user stories -- even when you can´t talk to users How user stories work, and how they differ from use cases, scenarios, and traditional requirements Leveraging user stories as part of planning, scheduling, estimating, and testing Ideal for Extreme Programming, Scrum, or any other agile methodology ---------------------------------------------------------------------------------------------------------- Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software. The best way to build software that meets users´ needs is to begin with user stories: simple, clear, brief descriptions of functionality that will be valuable to real users. In User Stories Applied , Mike Cohn provides you with a front-to-back blueprint for writing these user stories and weaving them into your development lifecycle. You´ll learn what makes a great user story, and what makes a bad one. You´ll discover practical ways to gather user stories, even when you can´t speak with your users. Then, once you´ve compiled your user stories, Cohn shows how to organize them, prioritize them, and use them for planning, management, and testing. User role modeling:

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Applied Oracle Security: Developing Secure Data...
€ 46.99 *
ggf. zzgl. Versand

Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today´s IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Einführung in Automatentheorie, Formale Sprache...
€ 49.95 *
ggf. zzgl. Versand

In dieser Neuauflage des Standardwerks Einführung in Automatentheorie, Formale Sprachen und Berechenbarkeit vermittelt das Autorenteam John Hopcroft, Rajeev Motwani und Jeffrey D. Ullman das Fundament der Theoretischen Informatik. Klar gegliedert und gut strukturiert präsentiert das Lehrbuch das grundlegende Wissen zu den Themenbereichen Formale Sprachen, Automaten- und Komplexitätstheorie sowie Berechenbarkeit einschließlich Unentscheidbarkeit - unter besonderer Berücksichtigung auch der praktischen Anwendungen. Viele anschauliche Beispiele, Illustrationen und ergänzende Erläuterungen erleichtern das Verstehen dieses für Studierende schwierigen Lehrstoffs. Umfangreiche Übungsaufgaben am Ende der einzelnen Abschnitte ermöglichen die unmittelbare Überprüfung des gelernten Stoffes. Die vielen inhaltlichen Verbesserungen und zusätzlichen Hinweise mit Anpassung an die hiesige Lehre bilden für die Studierenden eine ideale Voraussetzung, sich dieses Thema auch im Rahmen des Selbststudiums anzueignen. Das Buch eignet sich sowohl als Nachschlagewerk als auch zum Einsatz in der Lehre an Hochschulen und Universitäten. In dieser Neuauflage des Standardwerks Einführung in Automatentheorie, Formale Sprachen und Berechenbarkeit vermittelt das Autorenteam John Hopcroft, Rajeev Motwani und Jeffrey D. Ullman das Fundament der Theoretischen Informatik. Klar gegliedert und gut strukturiert präsentiert das Lehrbuch das grundlegende Wissen zu den Themenbereichen Formale Sprachen, Automaten- und Komplexitätstheorie sowie Berechenbarkeit einschließlich Unentscheidbarkeit - unter besonderer Berücksichtigung auch der praktischen Anwendungen. Viele anschauliche Beispiele, Illustrationen und ergänzende Erläuterungen erleichtern das Verstehen dieses für Studierende schwierigen Lehrstoffs. Umfangreiche Übungsaufgaben am Ende der einzelnen Abschnitte ermöglichen die unmittelbare Überprüfung des gelernten Stoffes. Die vielen inhaltlichen Verbesserungen und zusätzlichen Hinweise mit Anpassung an die hiesige Lehre bilden für die Studierenden eine ideale Voraussetzung, sich dieses Thema auch im Rahmen des Selbststudiums anzueignen. Das Buch eignet sich sowohl als Nachschlagewerk als auch zum Einsatz in der Lehre an Hochschulen und Universitäten. AIS DEM INHALT: Automaten: Die Grundlagen und Methoden Endliche Automaten Reguläre Ausdrücke und Sprachen Eigenschaften regulärer Sprachen Kontextfreie Grammatiken und Sprachen Keller-Automaten Eigenschaften kontextfreier Sprachen Einführung in Turing-Maschinen Unentscheidbarkeit Nicht-handhabbare Probleme Zusätzliche Problemklassen ÜBER DIE AUTOREN: John E. Hopcroft wirkt als IBM Professor of Engineering and Applied Mathematics am Department of Computer Science, Cornell University. Rajeev Motwani war Professor am Department of Computer Science der Stanford University. Jeffrey D. Ullman ist dort als Stanford W. Ascherman Professor of Computer Science (Emeritus) . ÜBER DEN FACHLEKTOR: Walter Hower erhielt den Lehrpreis 2006 des Landes Baden-Württemberg und lehrt dort als Professor Informatikgrundlagen wie Theoretische Informatik, Algorithmik und Diskrete Mathematik. Er fungiert ehrenamtlich als Vertrauensdozent der Gesellschaft für Informatik sowie als MINT-Botschafter. AUF DER COMPANION-WEBSITE: Für Dozenten Ausgearbeiteter Foliensatz für den Einsatz in der Lehre Für Studenten Lösungshinweise zu gekennzeichneten Aufgaben In dieser Neuauflage des Standardwerks Einführung in Automatentheorie, Formale Sprachen und Berechenbarkeit vermittelt das Autorenteam John Hopcroft, Rajeev Motwani und Jeffrey D. Ullman das Fundament der Theoretischen Informatik. Klar gegliedert und gut strukturiert präsentiert das Lehrbuch das grundlegende Wissen zu den Themenbereichen Formale Sprachen, Automaten- und Komplexitätstheorie sowie Berechenbarkeit einschließlich Unentscheidbarkeit - unter besonderer Berücksichtigung auch der praktischen Anwendungen. Viele anschauliche Beispiele, Illustrationen und ergänzende Erläuterungen erleichtern das Verstehen dieses für Studierende schwierigen Lehrstoffs. Umfangreiche Übungsaufgaben am Ende der einzelnen Abschnitte ermöglichen die unmittelbare Überprüfung des gelernten Stoffes. Die vielen inhaltlichen Verbesserungen und zusätzlichen Hinweise mit Anpassung an die hiesige Lehre bilden für die Studierenden eine ideale Voraussetzung, sich dieses Thema auch im Rahmen des Selbststudiums anzueignen. Das Buch eignet sich sowohl als Nachschlagewerk als auch zum Einsatz in der Lehre an Hochschulen

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Data Virtualization for Business Intelligence S...
€ 52.99 *
ggf. zzgl. Versand

Explains how data virtualization servers work, what techniques to use to optimize access to various data sources and how these products can be applied in different projects. This title outlines the advantages and disadvantages of data virtualization and illustrates how data virtualization should be applied in data warehouse environments.

Anbieter: buecher.de
Stand: Oct 15, 2018
Zum Angebot
Security and Trust Management
€ 46.99 *
ggf. zzgl. Versand

This book constitutes the proceedings of the 14th International Workshop on Security and Trust Management, STM 2018, held in Barcelona, Spain, in September 2018, and co-located with the 23rd European Symposium Research in Computer Security, ESORICS 2018. The 8 full papers were carefully reviewed and selected from 28 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; modeling and risk assessment; and trust computing.

Anbieter: buecher.de
Stand: Oct 7, 2018
Zum Angebot
CERT (R) C Coding Standard, Second Edition
€ 44.99 *
ggf. zzgl. Versand

This book is an essential desktop reference for the CERT C coding standard. The CERT C Coding Standard is an indispensable collection of expert information. The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Algebraic Cryptanalysis
€ 130.99 *
ggf. zzgl. Versand

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. Topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics or practitioners working for security and communications companies.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Understanding Cryptography
€ 29.99 *
ggf. zzgl. Versand

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today´s designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book´s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Anbieter: buecher.de
Stand: Oct 18, 2018
Zum Angebot
Software Product Line Engineering
€ 47.99 *
ggf. zzgl. Versand

This textbook addresses students, professionals, lecturers and researchers interested in software product line engineering. With more than 100 examples and about 150 illustrations, the authors describe in detail the essential foundations, principles and techniques of software product line engineering.The authors are professionals and researchers who significantly influenced the software product line engineering paradigm and successfully applied software product line engineering principles in industry. They have structured this textbook around a comprehensive product line framework.Software product line engineering has proven to be the paradigm for developing a diversity of software products and software-intensive systems in shorter time, at lower cost, and with higher quality. It facilitates platform-based development and mass customisation. The authors elaborate on the two key principles behind software product line engineering: (1) the separation of software development in two distinct processes, domain and application engineering; (2) the explicit definition and management of the variability of the product line across all development artefacts.As a student, you will find a detailed description of the key processes, their activities and underlying techniques for defining and managing software product line artefacts. As a researcher or lecturer, you will find a comprehensive discussion of the state of the art organised around the comprehensive framework. As a professional, you will find guidelines for introducing this paradigm in your company and an overview of industrial experiences with software product line engineering.

Anbieter: buecher.de
Stand: Oct 4, 2018
Zum Angebot
Mining Lurkers in Online Social Networks
€ 50.99 *
ggf. zzgl. Versand

This SpringerBrief brings order to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs) lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale online social networks (OSNs) are characterized by a participation inequality principle, i.e., the crowd of an OSN does not actively contribute, rather it takes on a silent role. Silent users are also referred to as lurkers, since they gain benefit from others´ information without significantly giving back to the community. Nevertheless, lurkers acquire knowledge from the OSN, therefore a major goal is to encourage them to more actively participate. Lurking behavior analysis has been long studied in social science and human-computer interaction fields, but it has also matured over the last few years in social network analysis and mining. While the main target audience corresponds to computer, network, and web data scientists, this brief might also help increase the visibility of the topic by bridging different closely related research fields. Practitioners, researchers and students interested in social networks, web search, data mining, computational social science and human-computer interaction will also find this brief useful research material .

Anbieter: buecher.de
Stand: Sep 28, 2018
Zum Angebot