Home | Amazing | Today | Tags | Publishers | Years | Search 
Safety of Electromedical Devices: Law - Risks - Opportunities
Safety of Electromedical Devices: Law - Risks - Opportunities

The book discusses the legal and technical requirements for manufacturers, designers and testers of electromedical devices. It describes which obstacles must be overcome to introduce a medical device on the European market, but also informs readers as to pitfalls and opportunities, and in which way safety can be achieved and product liability...

Agile Game Development with Scrum
Agile Game Development with Scrum

Deliver Better Games Faster, On Budget—And Make Game Development Fun Again!

Game development is in crisis—facing bloated budgets, impossible schedules, unmanageable complexity, and death march overtime. It’s no wonder so many development studios are struggling to survive. Fortunately,...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Design Driven Testing: Test Smarter, Not Harder
Design Driven Testing: Test Smarter, Not Harder

The groundbreaking book Design Driven Testing brings sanity back to the software development process by flipping around the concept of Test Driven Development (TDD)—restoring the concept of using testing to verify a design instead of pretending that unit tests are a replacement for design. Anyone who feels that TDD is...

Test-Driven JavaScript Development (Developer's Library)
Test-Driven JavaScript Development (Developer's Library)

For JavaScript developers working on increasingly large and complex projects, effective automated testing is crucial to success. Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript...

Configuration Management Best Practices: Practical Methods that Work in the Real World
Configuration Management Best Practices: Practical Methods that Work in the Real World

Successfully Implement High-Value Configuration Management Processes in Any Development Environment

 

As IT systems have grown increasingly complex and mission-critical, effective configuration management (CM) has become critical to an...

JBoss AS 5 Performance Tuning
JBoss AS 5 Performance Tuning

Packed with practical examples, this book looks at a different aspect of performance tuning in each chapter and shows the reader how to apply them to their existing Java applications. Written to version 5.1, this book also has information about the upcoming 6.0 release and how you can upgrade your existing applications. This book is for Java...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Android Wireless Application Development (2nd Edition) (Developer's Library)
Android Wireless Application Development (2nd Edition) (Developer's Library)

Android™ Wireless Application Development  Second Edition

 

Lauren Darcey

Shane Conder

 

The start-to-finish guide to Android application...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Professional Team Foundation Server 2010 (Wrox Programmer to Programmer)
Professional Team Foundation Server 2010 (Wrox Programmer to Programmer)

OVER THE PAST DECADE, Microsoft has been creating development tools that have been designed for the ever - growing engineering teams of software developers, testers, architects, project managers, designers, and database administrators. In the Visual Studio 2010 line of products, there are tools for each team member to use to contribute...

Virtualizing Microsoft Tier 1 Applications with VMware vSphere 4
Virtualizing Microsoft Tier 1 Applications with VMware vSphere 4

Over the years as power costs have soared and data center space has become scarce and expensive to acquire, enterprises and small businesses have been looking for ways to decrease their data center footprints as well as reduce the overall costs of operating an IT infrastructure. As the number of different applications being deployed in...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy