 |
|
|
|
 Network Warrior
The examples used in this book are taken from my own experiences, as well as from
the experiences of those with or for whom I have had the pleasure of working. Of course,
for obvious legal and honorable reasons, the exact details and any information that
might reveal the identities of the other parties involved have been changed. ... |  |  Ecological Modeling for Resource Management
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research... |  |  Software Reliability Methods (Texts in Computer Science)
This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software... |
|
|
Result Page: 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 |