Home | Amazing | Today | Tags | Publishers | Years | Search 
Experiences of Test Automation: Case Studies of Software Test Automation
Experiences of Test Automation: Case Studies of Software Test Automation

Software test automation has moved beyond a luxury to become a necessity. Applications and systems have grown ever larger and more complex, and manual testing simply cannot keep up. As technology changes, and more organizations move into agile development, testing must adapt—and...

Fundamentals of Database Systems (6th Edition)
Fundamentals of Database Systems (6th Edition)

This book introduces the fundamental concepts necessary for designing, using, and implementing database systems and database applications. Our presentation stresses the fundamentals of database modeling and design, the languages and models provided by the database management systems, and database...

Hacker's Delight (2nd Edition)
Hacker's Delight (2nd Edition)

In Hacker’s Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren’s hacks...

C by Dissection: The Essentials of C Programming
C by Dissection: The Essentials of C Programming

This significantly revised edition has been carefully designed to meet the needs of readers new to C. The reader moves easily through the fundamentals of C and on to its latest applications by means of a time-tested explanatory tool called dissection, first developed by the authors in 1984. Dissection, a pedagogical method similar to a...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Essential Skills for the Agile Developer: A Guide to Better Programming and Design
Essential Skills for the Agile Developer: A Guide to Better Programming and Design

Agile has become today’s dominant software development paradigm, but agile methods remain difficult to measure and improve. Essential Skills for the Agile Developer fills this gap from the bottom up, teaching proven techniques for assessing and optimizing both individual and team agile practices.

...

C++ Primer (5th Edition)
C++ Primer (5th Edition)

Bestselling Programming Tutorial and Reference Completely Rewritten for the New C++11 Standard

Fully updated and recast for the newly released C++11 standard, this authoritative and comprehensive introduction to C++ will help you to learn the language fast, and to use it in modern, highly effective ways....

Introduction to the Design and Analysis of Algorithms (2nd Edition)
Introduction to the Design and Analysis of Algorithms (2nd Edition)

Based on a new classification of algorithm design techniques and a clear delineation of analysis methods, Introduction to the Design and Analysis of Algorithms, 2e presents the subject in a truly innovative manner.  Written in a reader-friendly style, the book encourages broad problem-solving skills while thoroughly covering the...

UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design (2nd Edition)
UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design (2nd Edition)

"This book manages to convey the practical use of UML 2 in clear and understandable terms with many examples and guidelines. Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and...

Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
This book was written to provide students, engineers, and scientists involved in pattern recognition, digital image processing, and artificial intelligence with a comprehensive introduction to the concepts and tech- niques of syntactic pattern recognition.

Syntactic pattern recognition is concerned with the
...
CMMI for Acquisition: Guidelines for Improving the Acquisition of Products and Services (2nd Edition)
CMMI for Acquisition: Guidelines for Improving the Acquisition of Products and Services (2nd Edition)

CMMI® for Acquisition (CMMI-ACQ) describes best practices for the successful acquisition of products and services. Providing a practical framework for improving acquisition processes, CMMI-ACQ addresses the growing trend in business and government for organizations to purchase or outsource required products and...

Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Embedded software is ubiquitous. It forms a core component of an enormous range of systems, from aircraft, passenger cars and medical equipment, to children’s toys, video recorders and microwave ovens. This book provides a complete and coherent set of software patterns to support the development of this type of application. ...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy