Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beautiful Testing: Leading Professionals Reveal How They Improve Software (Theory in Practice)
Beautiful Testing: Leading Professionals Reveal How They Improve Software (Theory in Practice)
Successful software depends as much on scrupulous testing as it does on solid architecture or elegant code. But testing is not a routine process, it's a constant exploration of methods and an evolution of good ideas.

Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and
...
Neural Network Design and the Complexity of Learning
Neural Network Design and the Complexity of Learning

Using the tools of complexity theory, Stephen Judd develops a formal description of associative learning in connectionist networks. He rigorously exposes the computational difficulties in training neural networks and explores how certain design principles will or will not make the problems easier.

Judd looks beyond the scope
...

Jakarta Struts Pocket Reference
Jakarta Struts Pocket Reference

Web tier frameworks have soared in popularity over the past year or so due to the increasing complexity of Java itself, and the need to get more work done with fewer resources. Developers who used to spend hours and hours writing low-level features can use a well-written framework to build the presentation tier so they start coding...

Good Manufacturing Practices for Pharmaceuticals, Seventh Edition (Drugs and the Pharmaceutical Sciences)
Good Manufacturing Practices for Pharmaceuticals, Seventh Edition (Drugs and the Pharmaceutical Sciences)

This book provides insight into the world of pharmaceutical quality systems and the key elements that must be in place to change the business and organizational dynamics from task-oriented procedure-based cultures to truly integrated quality business systems that are self-detecting and correcting. Chapter flow has been changed to...

Building Mobile Apps at Scale: 39 Engineering Challenges
Building Mobile Apps at Scale: 39 Engineering Challenges
While there is a lot of appreciation for backend and distributed systems challenges, there tends to be less empathy for why mobile development is hard when done at scale.

This book collects challenges engineers face when building iOS and Android apps at scale, and common ways to tackle these. By scale, we mean having
...
Professional Wikis (Programmer to Programmer)
Professional Wikis (Programmer to Programmer)

The success of Wikipedia has proven just how effective wikis can be for collaborative editing on a large scale—larger than anyone originally thought possible. This book shows you how to install, use, manage, and extend a wiki using MediaWiki—the wiki engine used to power Wikipedia.

As each chapter builds on previous...

Star Schema The Complete Reference
Star Schema The Complete Reference

The definitive guide to dimensional design for your data warehouse

Learn the best practices of dimensional design. Star Schema: The Complete Reference offers in-depth coverage of design principles and their underlying rationales. Organized around design concepts and illustrated with detailed examples, this is a...

Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing
Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing

What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...

IP Routing
IP Routing

This concise guide offers the basic concepts of IP routing, free of hype and jargon. It begins with the simplest routing protocol, RIP, and then proceeds, in order of complexity, to IGRP, EIGRP, RIP2, OSPF, and finally to BGP. New concepts are presented one at a time in successive chapters. By the end, you will have mastered not only...

C++ Network Programming, Vol. 1: Mastering Complexity with ACE and Patterns
C++ Network Programming, Vol. 1: Mastering Complexity with ACE and Patterns

As networks, devices, and systems continue to evolve, software engineers face the unique challenge of creating reliable distributed applications within frequently changing environments. C++ Network Programming, Volume 1, provides practical solutions for developing and optimizing complex distributed systems using the...

Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy