Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile Principles, Patterns, and Practices in C# (Robert C. Martin Series)

Buy

With the award-winning book Agile Software Development: Principles, Patterns, and Practices, Robert C. Martin helped bring Agile principles to tens of thousands of Java and C++ programmers. Now .NET programmers have a definitive guide to agile methods with this completely updated volume from Robert C. Martin and Micah Martin, Agile Principles, Patterns, and Practices in C#.

This book presents a series of case studies illustrating the fundamentals of Agile development and Agile design, and moves quickly from UML models to real C# code. The introductory chapters lay out the basics of the agile movement, while the later chapters show proven techniques in action. The book includes many source code examples that are also available for download from the authors' Web site.

Readers will come away from this book understanding

  • Agile principles, and the fourteen practices of Extreme Programming

  • Spiking, splitting, velocity, and planning iterations and releases

  • Test-driven development, test-first design, and acceptance testing

  • Refactoring with unit testing

  • Pair programming

  • Agile design and design smells

  • The five types of UML diagrams and how to use them effectively

  • Object-oriented package design and design patterns

  • How to put all of it together for a real-world project

Whether you are a C# programmer or a Visual Basic or Java programmer learning C#, a software development manager, or a business analyst, Agile Principles, Patterns, and Practices in C# is the first book you should read to understand agile software and how it applies to programming in the .NET Framework.

(HTML tags aren't allowed.)

Poker for Dummies
Poker for Dummies
Poker is America’s national card game, and its popularity continues to grow. Nationwide, you can find a game in progress everywhere. If you want to play, you can find poker games on replicas of 19th century riverboats or on Native American tribal lands. You can play poker at home with the family or online with opponents from around the world....
Data Analysis Using Regression and Multilevel/Hierarchical Models
Data Analysis Using Regression and Multilevel/Hierarchical Models

Data Analysis Using Regression and Multilevel/Hierarchical Models is a comprehensive manual for the applied researcher who wants to perform data analysis using linear and nonlinear regression and multilevel models. The book introduces a wide variety of models, whilst at the same time instructing the reader in how to fit these models using...

Fuzzy Automata and Languages: Theory and Applications (Computational Mathematics)
Fuzzy Automata and Languages: Theory and Applications (Computational Mathematics)
The huge number and broad range of the existing and potential applications of fuzzy logic have precipitated a veritable avalanche of books published on the subject. Most, however, focus on particular areas of application. Many do no more than scratch the surface of the theory that holds the power and promise of fuzzy logic. Fuzzy Automata and...

Oracle Developer Forms Techniques
Oracle Developer Forms Techniques

Learn the best techniques and tricks from expert Bulusu Lakshman. Apply these real-world applications, undocumented tips, solutions, projects, and techniques to your own programs to become a more efficient and better developer of Oracle Forms. Lakshman gives you what you need to take your Oracle development to the next level.

...
The J2EE Architect's Handbook
The J2EE Architect's Handbook
This handbook is a concise guide to architecting, designing, and building J2EE applications. Whether you're architect your first J2EE application or looking to keep your projects on-time and on-budget, you will refer to this handbook again and again.

You will discover how to: -- Design J2EE applications so that they are robust,
...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy