Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Software Development with Trac and Subversion

Buy
Software development - especially for small teams & projects - often ends up unmanaged and suffering from the ever present problem of feature creep. This book presents a simple set of processes and practices that allow you to manage these projects without getting in the way. This book looks at what is needed to manage software development projects, how Trac and Subversion meets these needs, and how to install, configure and use them.
(HTML tags aren't allowed.)

Pervasive Games: Theory and Design (Morgan Kaufmann Game Design Books)
Pervasive Games: Theory and Design (Morgan Kaufmann Game Design Books)
Quickly emerging from the fast-paced growth of mobile communications and wireless technologies, pervasive games take gaming away from the computer screen and back to the three-dimensional world. Now games can be designed to be played in public spaces like shopping malls, conferences, museums and other non-traditional game venues. Game designers...
Wireless Technology: Applications, Management, and Security (Lecture Notes in Electrical Engineering)
Wireless Technology: Applications, Management, and Security (Lecture Notes in Electrical Engineering)
This is an edited volume based on selected papers from the annual Wireless Telecommunications Symposium. The WTS is a forum to exchange information on advances in mobile communications and wireless networking technology, management, applications, and security in a conference environment with leaders and experts from industry, governmental agencies,...
Introduction to Tribology
Introduction to Tribology

A fully updated version of the popular Introduction to Tribology , the second edition of this leading tribology text introduces the major developments in the understanding and interpretation of friction, wear and lubrication. Considerations of friction and wear have been fully revised to include recent analysis and data work, and friction...


Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Lecture Notes in Computer Science)
Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design,...
Programming Windows CE
Programming Windows CE
PROGRAMMING WINDOWS CE guides Windows programmers through the unique problems and the new opportunities provided by Windows CE. The book covers all the new Win32(r) APIs supported by Windows CE as well as workarounds for Win32 APIs not supported. The book also covers programming techniques necessary when programming for memory-constrained...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy