The Definitive Refactoring Guide, Fully Revamped for Ruby With refactoring, programmers can transform even the most chaotic software into well-designed systems that are far easier to evolve and maintain.
How to Find and Fix the Killer Software Bugs that Evade Conventional Testing In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today's most serious, well-hidden software bugs--and introduces powerful new "e;exploratory"e; techniques for finding and correcting them.
CMMI-ACQ(R) (Capability Maturity Model(R) Integration for Acquisition) describes best practices for the successful acquisition of products and services.
How to Find and Fix the Killer Software Bugs that Evade Conventional Testing In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today's most serious, well-hidden software bugs--and introduces powerful new "e;exploratory"e; techniques for finding and correcting them.
The Parallel Programming Guide for Every Software Developer From grids and clusters to next-generation game consoles, parallel computing is going mainstream.
In today's rapidly changing technological world, it is increasingly important that web and desktop applications be accessible to everyone, including those of us with special needs.
To understand Jini, imagine that you could move to a new office across the world, or check into any hoteland could simply plug your notebook or Palm directly into the local network.
Wireless Web Development, Second Edition provides both a substantial engineering and business background to wireless developers, covering numerous facets of wireless web software geared toward today's mobile platforms and mobile devices.
Increasingly, business leaders are either looking to start a new developer program at their company or looking to increase the impact of their existing DevRel program.
The book provides a comprehensive examination of the integration of IoT technology into various industries and its impact on daily life, with a focus on the most recent advancements in the field.
Microservices, or very commonly known as Mircoservices Architecture are used for describing the methods and resources that are used for architecture specification achievement.
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing: A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications.
What Every Engineer Should Know About Data-Driven Analytics provides a comprehensive introduction to the theoretical concepts and approaches of machine learning that are used in predictive data analytics.
Grounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of our contemporary information infrastructure and online existence.
Grounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of our contemporary information infrastructure and online existence.
What Every Engineer Should Know About Data-Driven Analytics provides a comprehensive introduction to the theoretical concepts and approaches of machine learning that are used in predictive data analytics.
This volume constitutes the revised selected papers from the four workshops collocated with the 20th International Conference on Software Engineering and Formal Methods, SEFM 2022, held in Berlin, Germany, in September 2022.
This book constitutes the Third Diabetic Foot Ulcers Grand Challenge, DFUC 2022, which was held on September 2022, in conjunction with the 25th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2022 in Singapore.
This book constitutes the refereed proceedings of the 8th European Lean Educator Conference ELEC 2022, which took place in Galway, Ireland, in November 2022; the event was sponsored by IFIP WG 5.
This book constitutes revised selected papers from the refereed proceedings of the 4th International Workshop on Dynamic Logic, DaLi 2022, held in Haifa, Israel, in July/August 2022.
This textbook presents a focused and accessible primer on the fundamentals of Java programming, with extensive use of illustrative examples and hands-on exercises.
A practical description of the software design patterns as they are mentioned in the 1994 book "e;Design Patterns - Elements of Reusable ObjectOriented Software"e; by the author group Gamma, Helm, Johnson and Vlissides (also called "e;Gang of Four"e;, GoF for short).
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.
The 18th European Advanced Course on AI (ACAI) took place in Berlin on 11-15 October 2021, organized by the European project Humane-AI Net in collaboration with the European AI Association (EURAI).
This book constitutes the refereed workshop proceedings of the 11th International Workshop on Structured Object-Oriented Formal Language and Method, SOFL+MSVL 2022, held in Madrid, in October 2022.
Digital Image Processing with C++: Implementing Reference Algorithms with the CImg Library presents the theory of digital image processing and implementations of algorithms using a dedicated library.
Digital Image Processing with C++: Implementing Reference Algorithms with the CImg Library presents the theory of digital image processing and implementations of algorithms using a dedicated library.