Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Object Thinking
Object Thinking

In Object Thinking, esteemed object technologist David West contends that the mindset makes the programmer—not the tools and techniques. Delving into the history, philosophy, and even politics of object-oriented programming. West reveals how the best programmers rely on analysis and conceptualization—on...

Cato the Younger: Life and Death at the End of the Roman Republic
Cato the Younger: Life and Death at the End of the Roman Republic
Marcus Porcius Cato ("the Younger") is most famous for being Julius Caesar's nemesis. His sustained antagonism was in large part responsible for pushing the Romans towards civil war. Yet Cato never wanted war even though he used the threat of violence against Caesar. This strategic gamble misfired as Caesar, instead of...
How to Kill the Scrum Monster: Quick Start to Agile Scrum Methodology and the Scrum Master Role
How to Kill the Scrum Monster: Quick Start to Agile Scrum Methodology and the Scrum Master Role

Implement Scrum or improve how Scrum works in your team or organization using this concise, sharp, and programmatic book. You will quickly learn what you need to know without getting confused with unnecessary details.

What You'll Learn

  • Become familiar with Agile concepts and understand...
Painting Do-It-Yourself For Dummies
Painting Do-It-Yourself For Dummies
Painting your home yourself can be faster, more affordable and even easier than hiring professionals—but only if you get it right the first time. Painting Do-It-Yourself For Dummies, helps you do just that with easy-to-follow, step-by-step procedures for giving your, floors, walls, and ceilings the extreme makeover of your dreams....
Object-Oriented Construction Handbook
Object-Oriented Construction Handbook
Successful businesses and organizations are continually looking for ways to improve service and customer satisfaction in order to achieve long-term customer loyalty. In light of these goals, software developers must ask the question: how does customer orientation influence traditional approaches, methods, and principles of software development? In...
Extreme programming adventures in C#
Extreme programming adventures in C#

See eXtreme Programming (XP) in action at the hands of an XP mater—and learn Microsoft .NET and C# programming in the process! In this fast-paced, hands-on exposition, Ron Jeffries—one of the leading voices and practitioner in the XP community—demonstrates that you can write well-designed, resilient code incrementally and...

The Second Mountain: The Quest for a Moral Life
The Second Mountain: The Quest for a Moral Life
#1 NEW YORK TIMES BESTSELLER • Everybody tells you to live for a cause larger than yourself, but how exactly do you do it? The author of The Road to Character explores what it takes to lead a meaningful life in a self-centered world.

“Deeply moving, frequently eloquent and
...
The Correctness-by-Construction Approach to Programming
The Correctness-by-Construction Approach to Programming

The focus of this book is on bridging the gap between two extreme methods for developing software. On the one hand, there are texts and approaches that are so formal that they scare off all but the most dedicated theoretical computer scientists. On the other, there are some who believe that any measure of formality is a waste of time,...

Apple Pro Training Series : Final Cut Pro 5
Apple Pro Training Series : Final Cut Pro 5
The scalability, performance and Emmy Award-winning workflow of Final Cut Pro 5 make it the first choice of professional editors everywhere. For those clamoring to get in on the action, this best-selling volume uses a series of class-length lessons designed to provide a strong foundation in all aspects of the digital video editing powerhouse....
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Halophilic Microorganisms and their Environments (Cellular Origin, Life in Extreme Habitats and Astrobiology)
Halophilic Microorganisms and their Environments (Cellular Origin, Life in Extreme Habitats and Astrobiology)

"This water" he told me, "runs out to the eastern region, and flows into the Arabah; and when it comes into the sea, into the sea of foul waters [i. e. , the Dead Sea], the water will become wholesome. Every living creature that swarms will be able to live wherever this stream goes; the fish will be very abundant once these...

Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Wireless communications is one of the most active areas of research over the
past and the current decades. In fact, the demand for wireless services has been
changing from the regular voice telephony services to mixed voice, data, and
multimedia services over the wireless media. Since the mid-1990s, the wireless
industry has
...
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy