Use Case Modeling Developers who effectively employ use cases deliver better applications--on time and under budget. The concept behind use cases is perhaps as old as software itself; they express the behavior of systems in terms of how users will ultimately interact with them. Despite this inherent simplicity, the use case approach is frequently misapplied,... Data Science For Dummies
Discover how data science can help you gain in-depth insight into your business – the easy way!
Jobs in data science abound, but few people have the data science skills needed to fill these increasingly important roles in organizations. Data Science For Dummies is the perfect starting point for IT professionals...
Reactive Design Patterns
Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...
Sams Teach Yourself SAP in 24 Hours (4th Edition)
When I was asked to update Sams Teach Yourself SAP in 24 Hours, I was completely
thrilled. Seriously! The world of SAP and our world in general have gone through major
upheavals in the last few years, and I was excited to share with SAPlings and veterans
alike just how much had changed. In the same way, I was anxious to realign and...
MOS 2010 Study Guide for Microsoft Word, Excel, PowerPoint, and Outlook
Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can...
Distibuted Systems: Design and Algorithms
In today’s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems.
Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues.
|Result Page: 13 12 11 10 9 8 7 6 5 4 |