Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Statistical Software Engineering
Statistical Software Engineering

The development and the production of high-quality, reliable, complex computer software have become critical issues in the enormous worldwide computer technology market. The capability to efficiently engineer computer software development and production processes is central to the future economic strength, competitiveness, and national security...

Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
SilverStripe: The Complete Guide to CMS Development (Wiley)
SilverStripe: The Complete Guide to CMS Development (Wiley)

Co-author of this book, and early member of the SilverStripe open source community.

It wasn’t too long ago when a fellow developer at work asked me to look at his screen. He had stumbled across some new technology, and asked: ‘Hey, have you heard about this?’ All too often such questions are answered with a...

Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis

Audit and Trace Log Management: Consolidation and Analysis is both a timely and much needed compilation of useful information around a topic that is becoming more and more critical to not only IT professionals and security practitioners, but to many other departments, such as legal, risk, and compliance, as well as auditors and...

User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software.

The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of...

Practical Criminal Investigations in Correctional Facilities
Practical Criminal Investigations in Correctional Facilities
The felonious activities of confined inmates reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside the walls of our prisons. Practical Criminal Investigations in Correctional Facilities gives sound advice to both the long-time...
Instant Boris Effects (VASST Instant)
Instant Boris Effects (VASST Instant)
Boris plug-in applications, including Graffiti, FX, and Red, permit video editors to add titling, effects, compositing, and 3D capabilities to their nonlinear editing (NLE) systems. Documentation and training materials have been notoriously lacking for these applications. Instant Boris Effects is a complete guide for novice and intermediate users...
Questionnaires in Second Language Research: Construction, Administration, and Processing
Questionnaires in Second Language Research: Construction, Administration, and Processing
One of the most common methods of data collection in second language
(L2) research is to use questionnaires of various kinds. The
popularity of questionnaires is due to the fact that they are easy to
construct, extremely versatile, and uniquely capable of gathering a
large amount of information quickly in a form that is readily
...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Mastering the Requirements Process (2nd Edition)
Mastering the Requirements Process (2nd Edition)
It is widely recognized that incorrect requirements account for up to 60 percent of errors in software products, and yet the majority of software development organizations do not have a formal requirements process. Many organizations appear willing to spend huge amounts on fixing and altering poorly specified software, but seem unwilling to invest...
The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence
The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence

An unparalleled collection of recommended guidelines for data warehousing and business intelligence pioneered by Ralph Kimball and his team of colleagues from the Kimball Group.

Recognized and respected throughout the world as the most influential leaders in the data warehousing industry, Ralph Kimball and the Kimball Group have...

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results
Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results

Once you've got a web site up and running it is all too easy to sit back and relax. But how do you know you did a good job? How can you improve the site you have based on real user behaviour? Without getting feedback from your users, how will you find out how it's being used? Web traffic analysis allows you to gain some insight into...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy