Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Project Management Demystified
Project Management Demystified
Learn Project Management on time and under budget! "Project Management Demystified" is valuable for both the novice project manager and the experienced. For the novice, it is a great way to understand PM basics in an easy-to-understand and practical way. Personalized stories demonstrate both what to do and what not to do. Experienced...
Software Test Automation (ACM Press)
Software Test Automation (ACM Press)
You can't just buy an automated testing tool and expect to improve your organization's testing process without some real effort, at least that is what the authors of Software Test Automation argue. Written for any test manager or engineer, this practical-minded guide shows the right way to automate testing to bring down costs and improve...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
.NET-A Complete Development Cycle
.NET-A Complete Development Cycle

"The authors excel in presenting all aspects of the .NET development cycle in a format accessible to the beginner, and as a primer and reference for the experienced developer. This book is not only educational and informative, but working through it is fun!"
—Dr. Oliver Downs, Chief Scientist, Analytical
...

Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the...
The Strategy Gap: Leveraging Technology to Execute Winning Strategies
The Strategy Gap: Leveraging Technology to Execute Winning Strategies

Praise for The Strategy Gap

"With a better handle on the financial pulse of the business, enterprises will be better able to meet the Street’s expectations of financial transparency and corporate accountability. The writers do a masterful job of getting readers to this point of awareness, and further display their insight...

Nonlinear Filtering: Methods and Applications
Nonlinear Filtering: Methods and Applications

This book gives readers in-depth know-how on methods of state estimation for nonlinear control systems. It starts with an introduction to dynamic control systems and system states and a brief description of the Kalman filter. In the following chapters, various state estimation techniques for nonlinear systems are discussed, including...

Mastering Bird Photography: The Art, Craft, and Technique of Photographing Birds and Their Behavior
Mastering Bird Photography: The Art, Craft, and Technique of Photographing Birds and Their Behavior
In Mastering Bird Photography: The Art, Craft, and Technique of Photographing Birds and Their Behavior, acclaimed bird photographer and author Marie Read shares techniques and stories behind her compelling images, offering fresh insights into making successful bird photographs, whether you’re out in the field or in the comfort...
The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
unlimited object storage image
Result Page: 61 60 59 58 57 56 55 54 53 52 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy