Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile Software Development Teams (Progress in IS)
Agile Software Development Teams (Progress in IS)

This book explores how agile development practices, in particular pair programming, code review and automated testing, help software development teams to perform better. Agile software engineering has become the standard software development paradigm over the last decade, and the insights provided here are taken from a large-scale survey of...

The Official (ISC)2 Guide to the CCSP CBK
The Official (ISC)2 Guide to the CCSP CBK

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert...

Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics 2)
Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics 2)

This book develops geometric techniques for proving the polynomial time solvability of problems in convexity theory, geometry, and - in particular - combinatorial optimization. It offers a unifying approach based on two fundamental geometric algorithms: - the ellipsoid method for finding a point in a convex set and - the basis reduction...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
This book offers a comprehensive model for explaining the success and failure of cities in nurturing startups, presents detailed case studies of how participants in that model help or hinder startup activity, and shows how to apply these lessons to boost local startup activity.

Startup Cities explains the...

Computer Science: Reflections on the Field, Reflections from the Field
Computer Science: Reflections on the Field, Reflections from the Field

Computer Science: Reflections on the Field, Reflections from the Field provides a concise characterization of key ideas that lie at the core of computer science (CS) research. The book offers a description of CS research recognizing the richness and diversity of the field. It brings together two dozen essays on diverse aspects...

CCIE Routing and Switching Practice Labs
CCIE Routing and Switching Practice Labs

Six comprehensive CCIE routing and switching labs to hone configuration and troubleshooting skills

Prepare for the CCIE lab exams and hone your configuration and troubleshooting skills with six complete practice scenarios that cover:

  • Frame Relay...

Core JSP
Core JSP

In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a...

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection

This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve,...

IBM Certification Study Guide Aix Communications
IBM Certification Study Guide Aix Communications
The AIX and RS/6000 certifications offered through the Professional Certification Program from IBM are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of AIX and RS/6000. A complete set of professional certifications are available. They include:
Fuzzy Equational Logic (Studies in Fuzziness and Soft Computing)
Fuzzy Equational Logic (Studies in Fuzziness and Soft Computing)
The present book deals with algebras, congruences, morphisms, reasoning about identities, classes of algebras and their axiomatizability, etc., from the point of view of fuzzy logic. We therefore deal with topics traditionally studied in universal algebra. Our approach is the following. In classical universal algebra, one works in bivalent setting....
unlimited object storage image
Result Page: 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy