Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Oxford Practice Grammar
Oxford Practice Grammar
Who is this book for?

Oxford Practice Grammar is for students of English at a middle or 'intermediate' level. This means students who are no longer beginners but who are not yet expert in English. The book is suitable for those studying for the Cambridge First Certificate in English. It can be used by students attending classes or by
...
RF Photonic Technology in Optical Fiber Links
RF Photonic Technology in Optical Fiber Links
RF photonic components, transmission systems, and signal processing examples in optical fibers are reviewed by leading academic, government, and industry scientists working in this field. This volume introduces various related technologies such as direct modulation of laser sources, external modulation techniques, and detectors. The text is aimed...
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Electronic Theses and Dissertations: A Sourcebook for Educators: Students, and Librarians (Books in Library and Information Science)
Electronic Theses and Dissertations: A Sourcebook for Educators: Students, and Librarians (Books in Library and Information Science)
Electronic Theses and Dissertations examines how electronic publication of theses and dissertations might enhance graduate education. This text clarifies the composition, evaluation, dissemination, and preservation of electronic theses and dissertations (ETDs), and provides a conceptual framework for the development of effective ETD programs. It...
Handbook of Research on Fuzzy Information Processing in Databases
Handbook of Research on Fuzzy Information Processing in Databases
Information technology is one of the most rapidly changing disciplines, especially with the fuzzy extension. Fuzzy databases have been studied in many works and papers but, in general, these works study some particular area and many works are theoretical works, with very few real applications.

The Handbook of Research on Fuzzy...

Fedora 8 and Red Hat Enterprise Linux Bible
Fedora 8 and Red Hat Enterprise Linux Bible
With the Fedora Linux operating system and the instructions in this book, you can transform your PC into a safe, powerful, and free computer system. Starting with Fedora, you can simply replace (or coexist with) Microsoft Windows on your everyday desktop computer. You can also configure your computer to share your files, printers, Web pages, or...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Complete Wireless Design
Complete Wireless Design

ON THE CD-ROM

*PUFF RF/Microwave circuit simulation software
*Sonnet Lite electromagnetic simulation software
*National's PLL Design Program
*Agilent's AppCad circuit design program

Design an entire radio system from the ground up instead of relying on a simple plug-in selection of circuits to be modified....

The Theory of Spinors
The Theory of Spinors
Describes orthgonal and related Lie groups, using real or complex parameters and indefinite metrics. Develops theory of spinors by giving a purely geometric definition of these mathematical entities. Covers generalities on the group of rotations in n-dimensional space, the theory of spinors in spaces of any number of dimensions and much more....
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy