Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Test Driven Development: A Practical Guide
Test Driven Development: A Practical Guide
Foreword by Ron Jeffries
  • The relentlessly practical TDD guide: real problems, real solutions, real code
  • Includes a start-to-finish project written in Java and using JUnit
  • Introduces TDD frameworks for C++, C#/.NET, Python, VB6, and more
  • For every developer and project manager interested...
Introducing Microsoft  LINQ
Introducing Microsoft LINQ

Your first look at building data-rich applications using Microsoft LINQ.

Get a head start using Microsoft Language Integrated Query (LINQ). Two experienced developers give you advanced insights and expert guidance for using this unified model for data access. You will learn how to write queries in your native programming...

Model-Driven Testing: Using the UML Testing Profile
Model-Driven Testing: Using the UML Testing Profile
Model-driven development has become the most important new paradigm in software development and has already demonstrated considerable impact in reducing time to market and improving product quality. However, the development of high-quality systems not only requires systematic development processes but also systematic test processes.

This book...

MySQL Administrator's Bible (Bible (Wiley))
MySQL Administrator's Bible (Bible (Wiley))
With special focus on the next major release of MySQL, this resource provides a solid framework for anyone new to MySQL or transitioning from another database platform, as well as experience MySQL administrators. The high-profile author duo provides essential coverage of the fundamentals of MySQL database management—including MySQL’s...
Coders at Work
Coders at Work

Peter Seibel interviews 15 of the most interesting computer programmers alive today in Coders at Work, offering a brand-new companion volume to Apress’s highly acclaimed best-seller Founders at Work by Jessica Livingston. As the words “at work” suggest, Peter Seibel focuses on how his...

Twisted Network Programming Essentials
Twisted Network Programming Essentials

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using...

SDL Game Development: (Black & White)
SDL Game Development: (Black & White)

BLACK & WHITE EDITION

If you're good with C++ and object oriented programming, this book utilizes your skills to create 2D games using the Simple DirectMedia Layer API. Practical tutorials include the development of two wickedly good games.

Overview

  • Create 2D reusable games using...
Radiology Sourcebook: A Practical Guide for Reference and Training
Radiology Sourcebook: A Practical Guide for Reference and Training

Douglas P. Beall, MD, summarizes the early experiences of established clinicians to create a compendium of everything you need to know during your formative years in radiology. Written for radiology residents and fellows and newly minted radiologists, the Radiology Sourcebook provides vital professional information and sound guidance on such...

DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)
Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)

This book presents recent research in the field of interaction between computational intelligence and mathematics. In the current technological age, we face the challenges of tackling very complex problems – in the usual sense, but also in the mathematical and theoretical computer science sense. However, even the most...

Developing Enterprise Applications - An Impurist's View
Developing Enterprise Applications - An Impurist's View
Developing Enterprise Applications using Using VB6, MTS, SQLServer and IIS- An Impurist's View shows software architects, developers and managers how to apply both common and lesser known patterns and framework components to create flexible, global enterprise applications using Microsoft's tools and technologies. Along the way, you will see hints,...
unlimited object storage image
Result Page: 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy