Wolf Creek | Movie Trailer Poonam Dubey Film | Heading to the Ground
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing

Fundamental testing methodologies applied to the popular Pythonlanguage

Testing Python; Applying Unit Testing, TDD, BDD andAcceptance Testing is the most comprehensive book available ontesting for one of the top software programming languages in theworld. Python is a natural choice for new and experienceddevelopers,...

Linked Data: Structured Data on the Web
Linked Data: Structured Data on the Web

Summary

Linked Data presents the Linked Data model in plain, jargon-free language to Web developers. Avoiding the overly academic terminology of the Semantic Web, this new book presents practical techniques, using everyday tools like JavaScript and Python.

About this Book

...

Writing Secure Code
Writing Secure Code

Improving security was a major focus while we were developing Windows 2000. At one point, we decided to run an unusual experiment to test the product’s mettle before we released it. We set up a Windows 2000 Web server called “Windows2000test.com,” put it out there, and waited to see what happened. We made no...

Advanced Java Game Programming
Advanced Java Game Programming

Advanced Java Game Programming teaches you how to create desktop and Internet computer games using the latest Java programming language techniques. Whereas other Java game programming books focus on introductory Java material, this book covers game programming for experienced Java developers.

David Wallace...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
Project Managers at Work
Project Managers at Work

Read 25 in-depth, candid interviews with notable project managers. Discover how project managers work, what they do, how they adapt and make decisions, how they inspire and motivate others, what career lessons and advice they can share, and how they landed their current jobs either as project managers or in more senior positions thanks to...

Numerical Polynomial Algebra
Numerical Polynomial Algebra
This first book on the numerical analysis of polynomial systems is a stepping stone at the interface of symbolic computation and numerical computation. Bernard Sturmfels, Department of Mathematics, University of Berkeley

I am not familiar with any books that do such a careful job of combining numerical analysis with the algebra of
...
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
This book equips the student with essential intellectual tools that are needed from the very beginning of university studies in computing. These consist of abilities and skills - to pass from a concrete problem to an abstract representation, reason with the abstract structure coherently and usefully, and return with booty to the specific situation....
ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet  of Value
ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet of Value

The next generation internet, the Internet of Things, cannot work without an Internet of Value. The Internet of Value ― or ValueWeb, for short ― allows machines to trade with machines and people with people, anywhere on this planet in real-time and for free. The problem is that our old system cannot work that way, as it...

The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)

An Under-the-Hood Guide to the Power of Xen Hypervisor Internals


The Definitive Guide to the Xen Hypervisor is a comprehensive...

Result Page: 71 70 69 68 67 66 65 64 63 62 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy