Home | Amazing | Today | Tags | Publishers | Years | Search 
Planning Extreme Programming
Planning Extreme Programming

The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming
...
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform

Since its introduction, The Java 2 Platform, Enterprise Edition (J2EE) has achieved remarkable success among application server providers and their customers. More than a dozen leading application server companies have announced J2EE compatible products, and over one million developers have downloaded the J2EE SDK from Sun's J2EE Web site (...

VB.NET Language Pocket Reference
VB.NET Language Pocket Reference
Visual Basic .NET is a radically new version of Microsoft Visual Basic, the world's most widely used rapid application development (RAD) package. Whether you are just beginning application development with Visual Basic .NET or are already deep in code, you will appreciate just how easy and valuable the VB.NET Language Pocket Reference is....
The Promise of Mediation: The Transformative Approach to Conflict
The Promise of Mediation: The Transformative Approach to Conflict
The Guide on the Transformative Mediation Process

Praise for The Promise of Mediation

"The Promise of Mediation has been the single most significant influence on the modern ADR movement. This brilliant work serves as a constant reminder that mediation is about more than settling cases. Any serious student of the mediation...

Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
This book opens up three new topics in modern Chinese literary history: the intimate lives of Lu Xun and Xu Guangping as a couple; real and imagined love-letters in modern Chinese literature; and concepts of privacy in China. The scandalous affair between modern China's greatest writer and his former student is revealed in their letters to each...
Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design and Implementation focuses on some semantic aspects which have not been studied in previous works and extends the EER model with fuzzy capabilities. The exposed model is called FuzzyEER model, and some of the studied extensions are: fuzzy attributes, fuzzy aggregations and different aspects on specializations, such...
Legal Guide for Starting & Running a Small Business, Seventh Edition
Legal Guide for Starting & Running a Small Business, Seventh Edition
While it cannot eliminate all need for a flesh-and-blood lawyer, attorney Fred Steingold's Legal Guide for Starting & Running a Small Business, Volume 1 does the next best thing by offering a clear and concise path around many of the legal pitfalls encountered regularly by today's entrepreneur. And in this newly updated third...
Computer Systems: Theory, Technology and Applications
Computer Systems: Theory, Technology and Applications

An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research.

From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are...

Data Mining: Opportunities and Challenges
Data Mining: Opportunities and Challenges
An overview of the multidisciplinary field of data mining, this book focuses specifically on new methodologies and case studies. Included are case studies written by 44 leading scientists and talented young scholars from seven different countries. Topics covered include data mining based on rough sets, the impact of missing data, and mining free...
Webster's New World Hacker Dictionary
Webster's New World Hacker Dictionary
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.

Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.

Cyberspace has a language all its own. Understanding it is vital
...
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platforms and emerging managed IP networks with a reference architecture from the AT&T Labs GeoPlex project. The main goal is to present basic principles that both the telecommunications industry and the Internet...
Nuclear Import and Export in Plants and Animals
Nuclear Import and Export in Plants and Animals
The nucleus is perhaps the most complex organelle of the cell. The wide range of functions of the cell nucleus and its molecular components include packaging and maintaining the integrity of the cellular genetic material, generating messages to the protein synthesis machinery of the cell, assembling ribosome precursors and delivering them to the...
Result Page: 2261 2260 2259 2258 2257 2256 2255 2254 2253 2252 2251 2250 2249 2248 2247 2246 2245 2244 2243 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy