Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Testing Network: An Integral Approach to Test Activities in Large Software Projects
The Testing Network: An Integral Approach to Test Activities in Large Software Projects
"The Testing Network" presents an integrated approach to testing based on cutting-edge methodologies, processes and tools in today's IT context. It means complex network-centric applications to be tested in heterogeneous IT infrastructures and in multiple test environments (also geographically distributed). The added-value of this book is...
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)

By the time you’re reading this in a bookstore, BizTalk will have celebrated its tenth birthday. Over the past decade, there have been seven releases of Microsoft’s enterprise integration server, and it has become the most broadly deployed integration middleware technology in the industry, with over 10,000 customers worldwide....

Machine Learning
Machine Learning
The field of machine learning is concerned with the question of how to construct
computer programs that automatically improve with experience. In recent years
many successful machine learning applications have been developed, ranging from
data-mining programs that learn to detect fraudulent credit card transactions, to...
Principles of Functional Verification
Principles of Functional Verification
A step-by-step guide to electronic design verification

As design complexity in chips and devices continues to rise, so, too, does the demand for functional verification. Principles of Functional Verification is a hands-on, practical text that will help train professionals in the field of engineering on the methodology and
...
Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Randomized Algorithms for Analysis and Control of Uncertain Systems: With Applications (Communications and Control Engineering)
Randomized Algorithms for Analysis and Control of Uncertain Systems: With Applications (Communications and Control Engineering)

The presence of uncertainty in a system description has always been a critical issue in control. The main objective of Randomized Algorithms for Analysis and Control of Uncertain Systems, with Applications (Second Edition) is to introduce the reader to the fundamentals of probabilistic methods in the analysis and design of...

Imperfect C++ Practical Solutions for Real-Life Programming
Imperfect C++ Practical Solutions for Real-Life Programming

C++, although a marvelous language, isn't perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn't just tell you what's wrong with C++, but offers practical techniques and tools for writing code that's...

Multivariable Control Systems: An Engineering Approach (Advanced Textbooks in Control and Signal Processing)
Multivariable Control Systems: An Engineering Approach (Advanced Textbooks in Control and Signal Processing)

Multivariable control techniques solve issues of complex specification and modelling errors elegantly but the complexity of the underlying mathematics is much higher than presented in traditional single-input, single-output control courses.

Multivariable Control Systems focuses on control...

The Economic and Social Impacts of E-Commerce
The Economic and Social Impacts of E-Commerce
E-commerce is not new, though the interest shown in it is of relatively recent origin. Academics have applied their skill in seeking to maintain or improve business efficiency for years past, but they have concerned themselves mainly with obtaining facts of a historical nature – that is, by analyzing past papers, they have  sought to...
Under Control: Governance Across the Enterprise
Under Control: Governance Across the Enterprise

With the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.

Governance should offer solutions, but it is clear that...

BizTalk 2013 EDI for Health Care: HIPAA-Compliant 834 (Enrollment) and 837 (Claims) Solutions
BizTalk 2013 EDI for Health Care: HIPAA-Compliant 834 (Enrollment) and 837 (Claims) Solutions

BizTalk 2013 EDI for Healthcare – EDI 834Enrollment Solutions eliminates the complexity anddemonstrates how to build both inbound and outbound EDI 834 processes inBizTalk server that follow the required patterns for integrations with theseexchanges. Archiving, mapping,reconstituting EDI 837 data, exception...

The Relational Model for Database Management: Version 2
The Relational Model for Database Management: Version 2
Today, if you have a well-designed database management system, you have the keys to the kingdom of data processing and decision support. That is why there now exists a prototype machine whose complete design is based on the relational model. Its arithmetic hardware is a quite minor part of thearchitecture. In fact, the old term "computer...
unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy