Call me Fitz | Star Wars - Les Derniers J | Truth or Dare (2018)
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile ALM: Lightweight tools and Agile strategies
Agile ALM: Lightweight tools and Agile strategies

Welcome to Agile ALM. This book has three main goals. The first is to describe Agile Application Lifecycle Management (ALM) in practical terms and to provide a plan for rolling out Agile strategies and best-of-breed tools. The second purpose is to explain how to create ALM toolboxes based on standard tools used in advanced, real-world...

The Unwritten Rules of the Highly Effective Job Search: The Proven Program Used by the World’s Leading Career Services Company
The Unwritten Rules of the Highly Effective Job Search: The Proven Program Used by the World’s Leading Career Services Company

The Proven Program Used by 600,000 Job Hunters!

You put hours and hours of hard work into your job search and the companies you've contacted never call. It's a story all too common in the fast-paced, highly competitive world of job hunting. Nothing is more discouraging than sending one resumé after another...

The Wall Street Professional's Survival Guide: Success Secrets of a Career Coach
The Wall Street Professional's Survival Guide: Success Secrets of a Career Coach

This is the only complete, up-to-date, and practical guide for financial industry professionals seeking new or better jobs in today’s brutally competitive environment. Author Roy Cohen spent more than 10 years providing outplacement services to Goldman Sachs’ employees. In this book, he shares finance-specific...

Test iOS Apps with UI Automation: Bug Hunting Made Easy
Test iOS Apps with UI Automation: Bug Hunting Made Easy

If you're an iOS developer or QA professional tapping through an app to reproduce bugs or performance issues you thought were solved two releases ago, then this is your book. Learn how to script the user interface, assert correct behavior, stub external dependencies, reproduce performance problems, organize test code for the long haul,...

Getting an Information Security Job For Dummies
Getting an Information Security Job For Dummies

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an...

Information Processing and Living Systems (Advances in Bioinformatics and Computational Biology)
Information Processing and Living Systems (Advances in Bioinformatics and Computational Biology)
Information processing and information flow occur in the course of an organism's development and throughout its lifespan. Organisms do not exist in isolation, but interact with each other constantly within a complex ecosystem. The relationships between organisms, such as those between prey or predator, host and parasite, and between mating...
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications

Gain a strong foundation of Arduino-based device development, from which you can go in any direction according to your specific development needs and desires. You'll build Arduino-powered devices for everyday use, and then connect those devices to the Internet. 

You'll be introduced to the building...

More than Nature Needs: Language, Mind, and Evolution
More than Nature Needs: Language, Mind, and Evolution

The human mind is an unlikely evolutionary adaptation. How did humans acquire cognitive capacities far more powerful than anything a hunting-and-gathering primate needed to survive? Alfred Russel Wallace, co-founder with Darwin of evolutionary theory, saw humans as "divine exceptions" to natural selection. Darwin thought use of...

Safe C++: How to avoid common mistakes
Safe C++: How to avoid common mistakes
Astute readers such as yourself may be wondering whether the title of this book, Safe C++, presumes that the C++ programming language is somehow unsafe. Good catch! That is indeed the presumption. The C++ language allows programmers to make all kinds of mistakes, such as accessing memory beyond the bounds of an...
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation

What is the shortest possible route for a traveling salesman seeking to visit each city on a list exactly once and return to his city of origin? It sounds simple enough, yet the traveling salesman problem is one of the most intensely studied puzzles in applied mathematics--and it has defied solution to this day. In this book, William Cook...

Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy