Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Test-Driven JavaScript Development (Developer's Library)
Test-Driven JavaScript Development (Developer's Library)

For JavaScript developers working on increasingly large and complex projects, effective automated testing is crucial to success. Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript...

Introductory Statistics with R (Statistics and Computing)
Introductory Statistics with R (Statistics and Computing)
This book provides an elementary-level introduction to R, targeting both non-statistician scientists in various fields and students of statistics. The main mode of presentation is via code examples with liberal commenting of the code and the output, from the computational as well as the statistical viewpoint. Brief sections introduce the...
The Project Management Life Cycle: A Complete Step-By-Step Methodology for Initiating, Planning, Executing & Closing a Project Successfully
The Project Management Life Cycle: A Complete Step-By-Step Methodology for Initiating, Planning, Executing & Closing a Project Successfully
Over the past 20 years, businesses around the world have undergone rapid change. No longer are customers happy with their ‘status quo’ products or services: they expect businesses to adapt rapidly to the changing environment by providing more offerings, cheaper and faster than before. This rate of change has forced businesses to...
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Universal Serial Bus (USB) is one of the most important developments in PC peripheral interconnect technology since the introduction of serial and parallel ports in the early 1980's. It is fast becoming the port of choice for many new digital video conferencing cameras, scanners, monitors, PC telephony equipment, and Human Interface Devices such as...
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development

This book will teach the concepts of test driven development in Java so you can build clean, maintainable and robust code

Key Features

  • Explore the most popular TDD tools and frameworks and become more proficient in building applications
  • Create applications with better code...
Leading Transformative Change Collectively
Leading Transformative Change Collectively

This book directly helps decision-makers and change agents in companies, NGOs, and government bodies become more proficient in transformative, collaborative change in realizing the SDGs.

This practitioner’s handbook translates a systemic – and enlivening – approach to collaboration into day-to-day work...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Digital Government: Principles and Best Practices
Digital Government: Principles and Best Practices

E-government has emerged not merely as a specialization in public administration but as a transformative force affecting all leaves and functions in government. Digital Government: Principles and Best Practices, written by a collection of practitioners and researchers, provides an overview of the management challenges and issues...

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

The Design Analysis Handbook: A Practical Guide to Design Validation
The Design Analysis Handbook: A Practical Guide to Design Validation
If you need to create reliable, cost-effective, optimized designs, The Design Analysis Handbook provides a practical framework for integrating quality into the design process from start to finish. The methodology used is called Worst Case Analysis Plus (WCA+), a design-validation tool that demands thoroughness and analytical thinking by the user....
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Ontology Matching
Ontology Matching

Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,...

unlimited object storage image
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy