Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

Visual C# 2005 How to Program (2nd Edition)
Visual C# 2005 How to Program (2nd Edition)

The complete, authoritative Deitel® Live-Code introduction to object-oriented programming with C# 2.0, Visual C#® 2005, ADO.NET 2.0, ASP.NET 2.0 and Web Services!  C# is one of the world’s most powerful object-oriented languages. This new edition, which is completely updated to...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Advances In Uml And Xml-based Software Evolution
Advances In Uml And Xml-based Software Evolution
This book continues to provide a forum, which a recent book, Software Evolution with
UML and XML, started, where expert insights are presented on the subject.
In that book, initial efforts were made to link together three current phenomena: software
evolution, UML, and XML. In this book, focus will be on the practical side of...
Java Design Patterns: A Tutorial
Java Design Patterns: A Tutorial

Design patterns have become a staple of object-oriented design and programming by providing elegant, easy-to-reuse, and maintainable solutions to commonly encountered programming challenges. However, many busy Java programmers have yet to learn about design patterns and incorporate this powerful technology into their work.

...

Quick CORBA 3
Quick CORBA 3
This book collects descriptions of the Object Management Group’s most powerful new CORBA and modeling specifications into a single volume. These specifications combine to give CORBA the capabilities it needs to support advanced Internet and enterprise computing. It includes almost all of the ten specifications originally labeled CORBA 3 (most...
UML 2 for Dummies
UML 2 for Dummies
When it comes to modeling, this book is not just another pretty face! It guides you gently through the complexities of UML, helps you adjust to the UML 2 standard, shows you how to extract key information from UML models, and more. Before you know it, you'll be communicating and developing systems like never before.

If, like us, you're a
...
Process Quality Assurance for UML-Based Projects
Process Quality Assurance for UML-Based Projects

Software quality, by its very nature, is elusive. Add to that the issue of ever-changing user requirements and the vagaries of software project management and "quality" can easily become a mere word on a distant horizon. This highly acclaimed book demonstrates how the Unified Modeling Language (UML) can be used within a process...

Use Cases: Requirements in Context, Second Edition
Use Cases: Requirements in Context, Second Edition

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition:...

Object-Oriented Analysis and Design with Applications (3rd Edition)
Object-Oriented Analysis and Design with Applications (3rd Edition)
Object-Oriented Design with Applications has long been the essential reference to object-oriented technology, which, in turn, has evolved to join the mainstream of industrial-strength software development. In this third edition--the first revision in 13 years--readers can learn to apply object-oriented methods using new paradigms...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy