@ Risk Software

Tamed Agility: Pragmatic Contracting and Collaboration in Agile Software Projects  eBooks & eLearning

Posted by interes at Nov. 24, 2016
Tamed Agility: Pragmatic Contracting and Collaboration in Agile Software Projects

Tamed Agility: Pragmatic Contracting and Collaboration in Agile Software Projects by Matthias Book and Volker Gruhn
English | 2016 | ISBN: 3319414763 | 334 pages | PDF | 9 MB

The Essentials of Risk Management (2nd edition) (Repost)  eBooks & eLearning

Posted by insetes at Feb. 16, 2016
The Essentials of Risk Management (2nd edition) (Repost)

The Essentials of Risk Management (2nd edition) By Michel Crouhy, Dan Galai
2014 | 672 Pages | ISBN: 0071818510 | PDF | 12 MB

The Essentials of Risk Management, 2nd edition  eBooks & eLearning

Posted by happy4all at Jan. 7, 2016
The Essentials of Risk Management, 2nd edition

The Essentials of Risk Management, 2nd edition By Michel Crouhy, Dan Galai
2014 | 672 Pages | ISBN: 0071818510 | PDF | 7 MB

Software Cost Estimation, Benchmarking, and Risk Assessment  eBooks & eLearning

Posted by hill0 at March 22, 2017
Software Cost Estimation, Benchmarking, and Risk Assessment

Software Cost Estimation, Benchmarking, and Risk Assessment: The Software Decision-Makers' Guide to Predictable Software Development (The Fraunhofer IESE Series on Software and Systems Engineering) by Adam Trendowicz
English | 20 Dec. 2012 | ISBN: 3642307639 | 350 Pages | EPUB (True) | 4.74 MB

Software effort estimation is a key element of software project planning and management. Yet, in industrial practice, the important role of effort estimation is often underestimated and/or misunderstood.
Risk-Driven Agile Testing: A primer on how risk-based thinking drives lean and effective software testing [Kindle Edition]

Risk-Driven Agile Testing: A primer on how risk-based thinking drives lean and effective software testing by Martin Ivison
English | 6 Mar. 2017 | ASIN: B06XGL4CDL | 92 Pages | AZW3 | 1.71 MB

The Fundamental Rules of Risk Management (repost)  eBooks & eLearning

Posted by arundhati at Feb. 8, 2017
The Fundamental Rules of Risk Management (repost)

Nigel Da Costa Lewis, "The Fundamental Rules of Risk Management"
English | ISBN: 1439816182 | 2012 | 240 pages | PDF | 2 MB

Engineering Safe and Secure Software Systems (Repost)  eBooks & eLearning

Posted by DZ123 at Feb. 6, 2017
Engineering Safe and Secure Software Systems (Repost)

C. Warren Axelrod, "Engineering Safe and Secure Software Systems"
English | 2012 | ISBN: 1608074722 | PDF | pages: 349 | 2.3 mb

Implementing Value at Risk(Repost)  eBooks & eLearning

Posted by Nice_smile) at Feb. 5, 2017
Implementing Value at Risk(Repost)

Implementing Value at Risk by Philip Best
English | 1999 | ISBN: 0471972053 | 222 Pages | PDF | 8.99 MB
Reduce Risk and Improve Security on IBM Mainframes: Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Mainframe Subsystem and Application Security by IBM Redbooks
English | Nov. 2, 2015 | ISBN: 0738441023 | 200 Pages | PDF | 8 MB

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.
Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security by IBM Redbooks
English | 2015 | ISBN: 0738440949 | 188 Pages | PDF | 8 MB

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.