 |
|
 Practicing Software Engineering in the 21st CenturyThis technological manual explores how software engineering principles can be used in tandem with software development tools to produce economical and reliable software that is faster and more accurate. Tools and techniques provided include the Unified Process for GIS application development, service-based approaches to business and information... |  |  Sexual Murder: Catathymic and Compulsive HomicideDuring graduate school, I had planned on a career in professional psychology with an emphasis on evaluating and treating children and adolescents. After a 2-year traineeship at a state hospital, I was ready to begin my clinical internship at the New Jersey Neuropsychiatric Institute in Princeton. Due to an administrative snafu, however, I was... |  |  Interface Oriented DesignInterface-Oriented Design explores how you can develop software with interfaces that interact with each other. We’ll look at techniques for breaking down solutions into these interacting interfaces and then for determining appropriate implementations for these interfaces to create well-structured... |
|
 Underwater Concreting and RepairThe construction of a wide range of structures including bridge piers, harbours, sea and river defences over many decades, and more recently the development of offshore oil fields, has required placement of concrete underwater. This process can be successfully carried out and sound, good quality concrete produced if sufficient attention is paid to... |  |  Network Security Technologies, Second EditionNetwork Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security... |  |  ImageMagick Tricks: Web Image Effects from the Command Line and PHPUnleash the power of ImageMagick with this fast, friendly guide. It's packed with examples of photo manipulations, logo creation, animations, and complete web projects. With this book up your sleeve, you'll be creating spellbinding images from code in no time. ImageMagick is a free software suite to create, edit, and compose bitmap images using... |
|
 The Healthy PC: Preventive Care and Home Remedies for Your ComputerKeep Your PC Running Smoothly--Without Spending a Lot of Money!
Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely... |  |  Software Project Secrets: Why Software Projects FailPreviously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the... |  |  RF Mems Circuit Design for Wireless CommunicationsThis book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable... |
|
 Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |  |  |
|
| Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 |