Es gelten die Anforderungen von EN 9100 zuzüglich der folgenden Präzisierung für Software. Diese Europäische Norm ergänzt die Normanforderungen von EN 9100 bezüglich der mitgelieferten Software und enthält Anforderungen des Qualitätsmanagements
This document provides requirements and recommendations for human-centred design principles and activities throughout the life cycle of computer-based interactive systems. It is intended to be used by those managing design processes, and is concerned with ways in which both hardware and...
This Recommendation contains a method for predicting basic transmission loss in the frequency range 125 MHz to 15.5 GHz for aeronautical and satellite services. It provides a step-by-step method to compute the basic transmission loss. The only data needed for this method are the distance between...
This Recommendation specifies the functional requirements of deep packet inspection (DPI) for future networks (e.g., software defined networking, network function virtualization, etc.). The scope of this Recommendation includes: a) General requirements of deep packet inspection for future...
Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features * Gain insights into the latest antivirus evasion techniques * Set up a complete pentesting environment using Metasploit and virtual machines * Discover a variety of tools and techniques...
Your one stop guide to automating infrastructure security using DevOps and DevSecOps Key Features * Secure and automate techniques to protect web, mobile or cloud services * Automate secure code inspection in C++, Java, Python, and JavaScript * Integrate security testing with automation...
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in...
The definitive Sybex guide to A+ certification, fully updated for the latest exams The CompTIA A+ Complete Study Guide, Fourth Edition is your ultimate preparation guide for Exams 220-1001 and 220-1002. Covering 100 percent of the objectives for both exams, this book gets you up to speed on...
Master malware analysis to protect your systems from getting infected Key Features * Set up and model solutions, investigate malware, and prevent it from occurring in future * Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more * A practical guide to...
"Explore the new and improved Jira 8 features such as agile board and advanced search for efficient project management Key Features * Work on agile projects in Jira from both the administrator and end user's perspective * Explore the improved Scrum and Kanban board and backlog * Work through...
Improve your Delphi programming skills by building robust applications for Android, iOS, and Windows platform Key Features * Build responsive user interfaces (UIs) for desktop and mobile with FireMonkey * Implement a microservices architecture using the Rapid Application Development(RAD)...
A comprehensive step-by-step review for A+ certification, revised for the latest exams The CompTIA A+ Complete Review Guide: Exam 220-1001 and Exam 220-1002, Fourth Edition is an ideal preparation tool to help you ace the exam and get certified. The must-have companion to the CompTIA A+ Complete...
PURPOSE AND SCOPE INTRODUCTION This document contains the technical Profiles of the Internet Engineering Task Force (IETF) Request for Comments (RFC) series of documents addressing relevant Application, Transport, Network, Addressing and Naming, Security, Mobility, and Multilink communication...
Convert Android to a powerful pentesting platform. Key Features * Get up and running with Kali Linux NetHunter * Connect your Android device and gain full control over Windows, OSX, or Linux devices * Crack Wi-Fi passwords and gain access to devices connected over the same network collecting...
Write maintainable, fault-tolerant, and cleaner game codes by understanding the standard development patterns and battle-tested practices. Key Features * Gain expertise in Industry Standard design patterns. * Get your hands on popular patterns such as Observer, Singleton, State, and Factory. *...
Discover the tools and techniques of mobile forensic investigations and make sure your mobile autopsy doesn't miss a thing, all through powerful practical recipes About This Book • Acquire in-depth knowledge of mobile device acquisition using modern forensic tools • Understand...
Wolfgang Engel's GPU Pro 360 Guide to Image Space gathers all the cutting-edge information from his previous seven GPU Pro volumes into a convenient single source anthology that covers various algorithms that operate primarily in image space. This volume is complete with 15 articles by leading...
Wolfgang Engel's GPU Pro 360 Guide to 3D Engine Design gathers all the cutting-edge information from his previous seven GPU Pro volumes into a convenient single source anthology that covers the design of a 3D engine. This volume is complete with articles by leading programmers that focus on various...
Build optimized, efficient, and real-time applications that are production-ready using Unreal Engine's Material Editor Key Features * Create stunning visual effects for 3D games and high-quality graphics * Design efficient Shaders for mobile platforms without sacrificing their realism *...