Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming for the Java(TM) Virtual Machine
Programming for the Java(TM) Virtual Machine

The core of Java technology, the Java virtual machine is an abstract computing machine that enables the Java platform to host applications on any computer or operating system without rewriting or recompiling. Anyone interested in designing a language or writing a compiler for the Java virtual machine must have an in-depth...

User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software.

The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of...

C++ Templates: The Complete Guide
C++ Templates: The Complete Guide

Templates are among the most powerful features of C++, but they are too often neglected, misunderstood, and misused. C++ Templates: The Complete Guide provides software architects and engineers with a clear understanding of why, when, and how to use templates to build and maintain cleaner,...

Algorithms
Algorithms
This book is intended to survey the most important algorithms in use on
computers today and to teach fundamental techniques to the growing number
of people who are interested in becoming serious computer users. It is appropriate
for use as a textbook for a second, third or fourth course in computer
science: after students have
...
Java™ Performance and Scalability Volume 1: Server-Side Programming Techniques
Java™ Performance and Scalability Volume 1: Server-Side Programming Techniques

This book was written with one goal in mind: to provide Java programmers with the expertise needed to build efficient, scalable Java code. The author shares his experience in server-side performance tuning through measured performance assessments, called optimizations. Each optimization discusses techniques to improve the...

Structure and Interpretation of Signals and Systems
Structure and Interpretation of Signals and Systems
This book provides an accessible introduction to signals and systems by beginning with an early introduction to cound and image applications, as opposed to circuits, that motivate readers to learn the theory. The book is accompanied by a robust website with detailed notes and illustrative applets for most every topic. An accessible introduction to...
The Unified Modeling Language User Guide
The Unified Modeling Language User Guide

Introduced in 1997, the Unified Modeling Language (UML) has rapidly been accepted throughout the software industry as the standard graphical language for specifying, constructing, visualizing, and documenting software-intensive systems. The UML provides anyone involved in the production, deployment, and maintenance of software with a standard...

SAP BW: A Step by Step Guide for BW 2.0
SAP BW: A Step by Step Guide for BW 2.0

SAP BW has recently come to the fore as a valuable tool for developing data warehouses that accurately and effectively support critical business decision making. It facilitates easy-to-use and high-performance extraction, transfer, transformation, and loading of data from a variety of...

C#® Developer's Guide to ASP.NET, XML, and ADO.NET
C#® Developer's Guide to ASP.NET, XML, and ADO.NET

The book every Internet application developer working with Microsoft development tools needs to retool their knowledge of the new .NET techniques used to build Windows applications.

  • Unbiased, in-depth commentary on the efficacy of the various technologies that comprise .NET as they...

Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
C++ Gotchas: Avoiding Common Problems in Coding and Design
C++ Gotchas: Avoiding Common Problems in Coding and Design

"This may well be the best C++ book I have ever read. I was surprised by the amount I learned."-Matthew Wilson, Development Consultant, Synesis Software

C++ Gotchas is the professional programmer's guide to avoiding and correcting ninety-nine of the most...

Practical BGP
Practical BGP

Hands-on guidance for deploying and optimizing BGP networks--enterprise and ISP

Now there's a practical guide to deploying and managing BGPv4 in any environment--from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's...

Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy