Unisciti a noi in un viaggio nel mondo dei libri!
Aggiungi questo libro allo scaffale
Grey
Scrivi un nuovo commento Default profile 50px
Grey
Iscriviti per leggere l'intero libro o leggi le prime pagine gratuitamente!
All characters reduced
Application Lifecycle Management in Practice - Definitive Reference for Developers and Engineers - cover

Application Lifecycle Management in Practice - Definitive Reference for Developers and Engineers

Richard Johnson

Casa editrice: HiTeX Press

  • 0
  • 0
  • 0

Sinossi

"Application Lifecycle Management in Practice"In "Application Lifecycle Management in Practice," readers are guided through the full spectrum of ALM concepts, methods, and tools needed to navigate today’s complex software environments. Beginning with a comprehensive overview of ALM fundamentals, the book traces the journey from traditional software development lifecycles to cutting-edge, integrated ALM frameworks. It unpacks essential paradigms such as Agile, DevOps, and Lean, and delves into the roles, responsibilities, and challenges encountered in the modern software delivery ecosystem.The book stands out for its holistic and practical approach, demystifying both foundational and advanced topics. Readers will find invaluable insights into requirements engineering, end-to-end traceability, architecture, and collaborative design—enhanced by robust coverage of implementation, version control, quality assurance, and automated testing. Each chapter emphasizes real-world application, from managing legacy systems and scaling global collaboration to embedding security, compliance, and risk management into every phase of the lifecycle.With a sharp focus on the present and future of ALM, this work explores AI-driven automation, platform extensibility, and innovations like low-code and citizen development. The final sections offer a forward-looking perspective on the evolving landscape, equipping both practitioners and leaders with the knowledge and strategies needed to drive continuous improvement, foster organizational agility, and harness the full power of contemporary application lifecycle management practices.
Disponibile da: 29/05/2025.
Lunghezza di stampa: 250 pagine.

Altri libri che potrebbero interessarti

  • Freakonomics Rev Ed - A Rogue Economist Explores the Hidden Side of Everything - cover

    Freakonomics Rev Ed - A Rogue...

    Anonimo

    • 0
    • 0
    • 0
    The legendary bestseller that encouraged millions of readers to look at the hidden side of everything 
    Which is more dangerous: a gun or a swimming pool? Why do drug dealers still live with their moms? What do real estate agents and the KKK have in common? 
    These may not sound like typical questions for an economist to ask. But Steven D. Levitt is not a typical economist. He is a much-heralded scholar who studies the riddles of everyday life—from cheating and crime to sports and child-rearing—and whose conclusions turn conventional wisdom on its head. Freakonomics is a groundbreaking collaboration between Levitt and Stephen J. Dubner, an award-winning author and journalist. Some of these questions concern life-and-death issues; others have an admittedly freakish quality. Thus the new field of study contained in this book: freakonomics. 
    Through forceful storytelling and wry insight, Levitt and Dubner show that economics is, at root, the study of incentives—how people get what they want, or need, especially when other people want or need the same thing. In Freakonomics, they explore the hidden side of everything. The inner workings of a crack gang. The myths of campaign finance. The telltale marks of a cheating schoolteacher. What unites all these stories is a belief that the modern world, despite a great deal of complexity and downright deceit, is not impenetrable, is not unknowable, and—if the right questions are asked—is even more intriguing than we think. All it takes is a new way of looking. Freakonomics establishes this unconventional premise: If morality represents how we would like the world to work, then economics represents how it actually does work. It is true that readers of this book will be armed with enough riddles and stories to last a thousand cocktail parties. But Freakonomics can provide more than that. It will literally redefine the way we view the modern world. 
    This revised and expanded edition of the book contains a smattering of bonus material, including selected Freakonomics columns from The New York Times Magazine; a Q&A with Steven Levitt, Stephen Dubner, and Angela Duckworth; and the New York Times Magazine profile Dubner wrote about Levitt that started it all.
    Mostra libro
  • Little Deaths All in a Row - Essays on Sex and Death - cover

    Little Deaths All in a Row -...

    Elizabeth Earley

    • 0
    • 0
    • 0
    “What do you think happens after we die?” has been Elizabeth Earley’s favorite conversation starter since the motorcycle accident that almost killed her. In Little Deaths All in a Row: Essays on Sex and Death, Earley delves into memories of past lovers and offers vivid portraits of the hospice patients she has worked with after recovering from her own near-fatal injuries. Tracing the many connections—philosophical, scientific, ethical, and spiritual—between sex and death, these lyric essays ponder the afterlife, pain and pleasure, quantum entanglement and love, and the “strange and painful goodness of being alive.”
    Mostra libro
  • Tyrannosaurus Rex The: The History of the World’s Most Famous Dinosaur - cover

    Tyrannosaurus Rex The: The...

    Editors Charles River

    • 0
    • 0
    • 0
    The massively popular 1990 novel Jurassic Park by Michael Crichton and its subsequent movie adaptations led to a huge resurgence in interest in dinosaurs and the prehistoric world. That interest continues to the present day, even though most of the dinosaurs in Jurassic Park weren’t actually from the Jurassic period. Triceratops, Velociraptor, Tyrannosaurus Rex and the huge sauropods such as Brachiosaurus that feature in the book and movies all actually belong to the Late Cretaceous period, more than 40 million years after the end of the Jurassic. Regardless, certain kinds of dinosaurs remain instantly recognizable, and among them, the “king” is undoubtedly the Tyrannosaurus.  
    	The first discovery of a Tyrannosaurus was made in 1902 and the largest carnivorous dinosaur ever found at the time quickly gripped the popular imagination. Even its name was dramatic - Tyrannosaurus Rex means “King of the Tyrant Lizards.” The T-Rex as it quickly became known didn’t appear until the last age of the Late Cretaceous period, the Maastrichtian, but when it did, it was the biggest and most terrifying of all the theropod predators. The T-Rex was around 13 feet tall at the hips (its tallest point since it isn’t believe to have stood upright), it was over 35 feet long, and it weighed about nine metric tons. Like most therapods, it had very powerful hind legs and much smaller fore legs, so the front legs look almost comically small. This dinosaur also had a large and powerful tail to counterbalance its very large head (some T-Rex skulls are nearly five feet long). Within the skull was a massive jaw lined with teeth up to a foot long. A reconstructive study has estimated that a T-Rex jaw was capable of exerting a pressure of over 55,000 Newtons; the equivalent of almost six tons of pressure. It was fast too, possibly capable of moving at speeds of up to 25 miles per hour. 
    Mostra libro
  • Social Engineering for Beginners - Strategies Tactics and Ethical Boundaries for Mastering Social Engineering - cover

    Social Engineering for Beginners...

    Daniel Green

    • 0
    • 0
    • 0
    In the ever-evolving landscape of cybersecurity, where technology meets the human element, "Social Engineering for Beginners" serves as your indispensable guide to understanding, navigating, and defending against one of the most potent threats in the digital age. 
    Unveiling the secrets behind the subtle dance of influence, this book delves into the psychology of human behavior, laying bare the cognitive biases and heuristics that make individuals susceptible to manipulation. From historical perspectives to the contemporary battleground of cyberspace, the narrative unfolds, illustrating the evolution of social engineering and its pervasive impact on our interconnected world. 
    Explore the pillars of social engineering — from the intricacies of pretexting and the deceptive allure of phishing to the art of impersonation. Learn the craft of reconnaissance and information gathering, leveraging the power of open-source intelligence and the goldmine that is social media to craft comprehensive profiles for targeted exploits. 
    Within these pages, discover the art of building trust and rapport, unraveling the techniques that enable the manipulation of human trust in technology. Whether it's exploiting cognitive load or utilizing social media for precise attacks, this book arms you with the knowledge to recognize and defend against these insidious tactics. 
    "Social Engineering for Beginners" is your passport to a comprehensive understanding of this dynamic field — a journey that combines technical expertise with ethical consciousness in the relentless pursuit of securing the human element. Whether you're a cybersecurity professional, a business leader, or a concerned individual navigating the digital realm, this book is your indispensable companion in the ongoing battle for cybersecurity. 
      
     
    Mostra libro
  • Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services - cover

    Ultimate Linux Network Security...

    Adarsh Kant

    • 0
    • 0
    • 0
    "Level Up Your Security Skills with Linux Expertise!"
    Key Features
    - Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats.
    - Hands-on exercises to reinforce your understanding and gain practical experience in implementing cybersecurity strategies.
    - Gain valuable insights from industry best practices to effectively address emerging threats and protect your organization's digital assets within the evolving landscape of Linux network security.
    Book Description
    TheUltimate Linux Network Security for Enterprisesis your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems.
    The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization’s networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role.
    From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization’s digital assets.
    What you will learn
    - Perform thorough vulnerability assessments on Linux networks to pinpoint network weaknesses.
    - Develop and deploy resilient security incident response plans.
    - Configure and oversee sophisticated firewall and packet filtering rules.
    - Employ cryptography techniques to ensure secure data transmission and storage.
    - Implement efficient Intrusion Detection and Prevention Systems (IDS/IPS).
    - Enforce industry-leading best practices to bolster Linux network security defenses.
    Table of Contents
    1. Exploring Linux Network Security Fundamentals
    2. Creating a Secure Lab Environment
    3. Access Control Mechanism in Linux
    4. Implementing Firewalls And Packet Filtering
    5. Mastering Cryptography for Network Security
    6. Intrusion Detection System and Intrusion Prevention System
    7. Conducting Vulnerability Assessment with Linux
    8. Creating Effective Disaster Recovery Strategies
    9. Robust Security Incident Response Plan
    10. Best Practices for Linux Network Security ProfessionalsIndex
    Mostra libro
  • Rewire Your Brain 20 - Five Healthy Factors to a Better Life 2nd Edition - cover

    Rewire Your Brain 20 - Five...

    PhD John B. Arden

    • 0
    • 0
    • 0
    Not long ago, it was thought that the brain you were born with was the brain you would die with, and that the brain cells you had at birth were the most you would ever possess. Your brain was thought to be hardwired to function in predetermined ways. It turns out that's not true. Your brain is not hardwired; it's "softwired" by experience. This book shows you how you can rewire parts of the brain to feel more positive about your life, remain calm during stressful times, and improve your social relationships. 
     
     
     
    Written by a leader in the field of Brain-Based Therapy, it teaches you how to activate the parts of your brain that have been underactivated and calm down those areas that have been hyperactivated, so that you feel positive about your life and remain calm during stressful times. You will also learn to improve your memory, boost your mood, have better relationships, and get a good night's sleep. 
     
     
     
    Rewire Your Brain reveals how cutting-edge developments in neuroscience and evidence-based practices can be used to improve your everyday life. Explaining exciting new developments in neuroscience and their applications to daily living, this audiobook will guide you through the process of changing your brain so you can change your life and be free of self-imposed limitations.
    Mostra libro