Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Testing using Visual Studio 2012
Software Testing using Visual Studio 2012

Testing is one of the main phases in the software development lifecycle. Managing the test scenarios, test cases, defects, and linking each one of these is bit of a challenge without using any tools. For frequently changing businesses, it is essential to address testing requirements by matching the pace of the business. This can only be...

Performance Driven IT Management: Five Practical Steps to Business Success
Performance Driven IT Management: Five Practical Steps to Business Success

"Despite spending more than $600 billion on information technology over the past decade, the Federal Government has achieved little of the productivity improvements that private industry has realized from IT" according to the 25 Point Implementation Plan to Reform Federal Information Technology Management published by the...

Python for Everyone
Python for Everyone
Cay Horstmann's Python for Everyone provides readers with step-by-step guidance, a feature that is immensely helpful for building confidence and providing an outline for the task at hand. “Problem Solving” sections stress the importance of design and planning while “How...
Examples and Counterexamples in Graph Theory
Examples and Counterexamples in Graph Theory
It is a real pleasure, indeed an honor, for me to have been invited by Mike Capobianco and John Molluzzo to write an introduction to this imaginative and valuable addition to graph theory. Let me therefore present a few of my thoughts on the current status of graph theory and how their work contributes to the field.

...
Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Instant Netcat Starter
Instant Netcat Starter

As a featured networking utility, Netcat uses TCP/IP protocols to read and write data across network connections. Netcat is a feature rich backend network debugging and exploration tool with the ability to create almost any type of connection you would need.

"Instant Netcat Starter Guide" is a practical, hands-on guide...

MongoDB: The Definitive Guide
MongoDB: The Definitive Guide

Manage the huMONGOus amount of data collected through your web application with MongoDB. This authoritative introduction—written by a core contributor to the project—shows you the many advantages of using document-oriented databases, and demonstrates how this reliable, high-performance system allows for almost infinite...

Spatial AutoRegression (SAR) Model: Parameter Estimation Techniques (SpringerBriefs in Computer Science)
Spatial AutoRegression (SAR) Model: Parameter Estimation Techniques (SpringerBriefs in Computer Science)
Explosive growth in the size of spatial databases has highlighted the need for spatial data analysis and spatial data mining techniques to mine the interesting but implicit spatial patterns within these large databases. Extracting useful and interesting patterns from massive geo-spatial datasets is important for many application...
Law Express: Intellectual Property Law (Revision Guide)
Law Express: Intellectual Property Law (Revision Guide)
Intellectual property law is a demanding but enjoyable subject. It covers a range of rights, some of which have little in common with others. Students should keep in mind that, although some rights may be quite different to others, a number of rights may exist in respect of the same subject matter. For example, a new design of...
Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

Fundamentals of Pervasive Information Management Systems
Fundamentals of Pervasive Information Management Systems

A comprehensive new edition on mobile computing—covering both mobile and sensor data

The new paradigm of pervasive computing was born from the needs of highly mobile workers to access and transfer data while on the go. Significant advances in the technology have lent and will continue to lend prevalence to its...

MongoDB Applied Design Patterns
MongoDB Applied Design Patterns

Whether you’re building a social media site or an internal-use enterprise application, this hands-on guide shows you the connection between MongoDb and the business problems it’s designed to solve. You’ll learn how to apply MongoDb design patterns to several challenging domains, such as ecommerce, content...

Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy