Home | Amazing | Today | Tags | Publishers | Years | Search 
JavaScript Testing with Jasmine: JavaScript Behavior-Driven Development
JavaScript Testing with Jasmine: JavaScript Behavior-Driven Development
All programmers want their code to work the way they intended. Jasmine, a popular testing framework for the JavaScript programming language, allows you to achieve that goal. Through coded specifications, Jasmine helps make your JavaScript work exactly how it’s supposed to. In this book, we’ll explore...
Bisociative Knowledge Discovery: An Introduction to Concept, Algorithms, Tools, and Applications
Bisociative Knowledge Discovery: An Introduction to Concept, Algorithms, Tools, and Applications

Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied to originates from one domain. The focus of this book, and the BISON project from which the contributions are...

Understanding Computation: From Simple Machines to Impossible Programs
Understanding Computation: From Simple Machines to Impossible Programs
This book is for programmers who are curious about programming languages and the theory of computation, especially those who don’t have a formal background in mathematics or computer science.

If you’re interested in the mind-expanding parts of computer science that deal with programs,
...
Encyclopedia of Electronics Circuits, Volume 5
Encyclopedia of Electronics Circuits, Volume 5
The Encyclopedia of Electronic Circuits, Volume Vadds approximately 1000 new circuits to the treasury of carefully chosen circuits that cover nearly every phase of today's electronic technology. These five volumes contain a wealth of new ideas and up-to-date circuits garnered from prestigious industry sources. Also included are...
Real-Time Systems: Scheduling, Analysis, and Verification
Real-Time Systems: Scheduling, Analysis, and Verification
This text is based on two rich sources: (1) materials in lecture notes I taught to senior and graduate-level computer science and electrical engineering students at Rice University and at the University of Houston, and (2) my research in the area of timing analysis and verification of real-time systems since the late 1980s,...
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

Model-Driven Development of Advanced User Interfaces (Studies in Computational Intelligence)
Model-Driven Development of Advanced User Interfaces (Studies in Computational Intelligence)
Model-Driven Development (MDD) has become an important paradigm in software development. The approach claims to provide a solution for systematic and efficient software development for the highly complex systems developed nowadays. It uses models, i.e. abstract representations of certain aspects of a system, as primary artifacts...
Investment Valuation 2nd Edition University with Investment Set
Investment Valuation 2nd Edition University with Investment Set

Investment Valuation

Tools and Techniques for Determining the Value of Any Asset
Valuation is at the heart of every investment decision, whether that decision is to buy, sell, or hold. But the pricing of any financial asset has become a more complex task in modern financial markets. Now completely revised and fully updated
...

Press On: Principles of Interaction Programming
Press On: Principles of Interaction Programming

Interactive systems and devices, from mobile phones to office copiers, do not fulfill their potential for a wide variety of reasons--not all of them technical. Press On shows that we can design better interactive systems and devices if we draw on sound computer science principles. It uses state machines and graph theory as a powerful and...

Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect...

Mastering the Nikon D600
Mastering the Nikon D600

Mastering the Nikon D600 by Darrell Young provides a wealth of experience-based information and insights for owners of the new D600 camera. Darrell is determined to help the user navigate past the confusion that often comes with complex and powerful professional camera equipment.

This book explores the
...

Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy