Navigation bar
  Start Previous page
 65 of 106 
Next page End 60 61 62 63 64 65 66 67 68 69 70  

development process? How do you handle the fact that different kinds of work
products, like documents and code, are treated differently? How do you obtain
integration between different configuration management tools? How do you handle
multisite development? How do you handle configuration management in relation to
object-oriented development-;component-based development? I took on the
assignment because in my own experience, configuration management has been of
great value, not because I felt I knew much about it theoretically. I know much
more now, and I hope I've conveyed some of the understanding, knowledge, and
appreciation I've gained during my work on this book. If readers try at least
some of the detailed disciplines, I hope they will experience the same
enthusiasm about its usefulness that I did. The book is based on literature as
well as experience-;and also on attitudes and opinions. It contains a lot of
examples, advice, and recommendations that are not to be regarded as The Truth
but primarily as the sum of a lot of experience-;negative as well as positive.
When I learned that the book was to be published in the Agile Series, I knew
little about agile development. But as I studied the values and principles, I
found that I had practiced it in parts for years. Agile development is a
wonderful idea, and one of the cornerstones of its success is configuration
management, so it was a pleasure to be able to contribute to the series with one
of my favorite disciplines. The book may seem a bit heavy to some agilists, but
I think it's better to discard some formality and detailed activities
deliberately, knowing what one hasn't performed, than to just not perform it out
of ignorance. So, agilists and others, read and choose! Purpose of the Book This
book is not supposed to be a primer in configuration management. It does,
however, start with an introduction to fundamental principles, to establish a
basic understanding of the concepts used. The main part of the book discusses
more advanced issues encountered when configuration management has to be
implemented. The overall purpose of the book is twofold: To scare those who are
engaging in configuration management! The book will give the reader an
understanding of the complexity and comprehensiveness of the discipline.
Configuration management is not easy! If you think it is, you'll be unable to
solve its tasks in a professional way. To assuage the fear of those who are
engaging in configuration management! The book will provide a fundamental
understanding of the principles of the discipline, their interrelations and
usage. Configuration management is not difficult! All you have to do is do it.
If you understand it, it's much easier to specify and plan so it fulfills its
purpose and becomes manageable. It's assumed that the reader has some knowledge
of other disciplines within software development, such as planning, design,
test, and quality assurance.
Password: www.AvaxHome.ru
Mason McCuskey, "Beginning Game Audio Programming"
Muska & Lipman/Premier-Trade | ISBN 1592000290 | 2003 Year | CHM | 7,44 Mb | 384
Pages
No matter how exciting the game and how realistic the visual effects, without
catchy audio in the background it’s obvious that something is missing. New
developments in technology enable you to do things with audio that weren’t
possible before, but they also make it necessary to find a guide that walks you
through the technical hurdles. "Beginning Game Audio Programming" covers the
challenges that you will face as you create sound effects and music for your
games and gives you the information you need to face these challenges head-on.
You’ll learn how to compose dynamic music and program 3D sound. There’s even
coverage of using DirectPlay Voice for real- time voice chat in your games! If
you are comfortable with C++ and DirectX, then you’re ready to dive into the
exciting world of audio with "Beginning Game Audio Programming".
Password: www.AvaxHome.ru
Andy Ju An Wang, Kai Qian, "Component-Oriented Programming"
Wiley-Interscience | ISBN 0471644463 | 2005 Year | PDF | 3,07 Mb | 336 Pages
“ A practical, programming-centered approach to component-based software
development Component-oriented programming (COP) is rapidly becoming a
mainstream programming paradigm, offering higher reusability and better modular
structure with greater flexibility than object-oriented or library-based
programming approaches. Component-Oriented Programming offers a unique
programming-centered approach to component-based software development that
delivers the well-developed training and practices needed to successfully apply
this cost-effective method. Following an overview of basic theories and
methodologies, the authors provide a unified component infrastructure for
building component software using JavaBeans, EJB, OSGi, CORBA, CCM, .NET, and
Web services. Readers learn how to: Develop reusable software components Build a
software system of pre-built software components Design and implement a
component-based software system using various programming-centered approaches
Throughout the text, step-by-step guides and self-review questions for each new
component technology encourage hands-on practice. Clear organization and self-
testing features make Component-Oriented Programming an ideal textbook for
graduate and undergraduate courses in computer science, software engineering, or
information technology, as well as a valuable reference for industry
professionals.
Password: www.AvaxHome.ru
Robert Sedgewick, "Algorithms"
Addison-Wesley | ISBN 0201066726 | 1983 Year | PDF | 4 Mb | 551 Pages
Password: www.AvaxHome.ru
Geoffrey R. Marczyk, David DeMatteo, David Festinger, "Essentials of Research
Design and Methodology"
John Wiley & Sons | ISBN 0471470538 | 2005 Year | PDF | 1,41 Mb | 290 Pages
“ Master the essential skills for designing and conducting a successful research
project Essentials of Research Design and Methodology contains practical
information on how to design and conduct scientific research in the behavioral
and social sciences. This accessible guide covers basic to advanced concepts in
a clear, concrete, and readable style. The text offers students and
practitioners in the behavioral sciences and related disciplines important
insights into identifying research topics, variables, and methodological
approaches. Data collection and assessment strategies, interpretation methods,
and important ethical considerations also receive significant coverage in this
user-friendly guide. Essentials of Research Design and Methodology is the only
available resource to condense the wide-ranging topics of the field into a
concise, accessible format for handy and quick reference. As part of the
Essentials of Behavioral Science series, this book offers a thorough review of
the most relevant topics in research design and methodology. Each concise
chapter features numerous callout boxes highlighting key concepts, bulleted
points, and extensive illustrative material, as well as "Test Yourself"
questions that help you gauge and reinforce your grasp of the information
covered.
Password: www.AvaxHome.ru
D.V.L.Smith, J.H.Fletcher, "The Art & Science of Interpreting Market Research
Evidence"
John Wiley & Sons | ISBN 0470844248 | 2004 Year | PDF | 1 Mb | 248 Pages
“ The Art and Science of Interpreting Market Research Evidence offers a complete
account of the way today's researchers interpret evidence and apply it to
decision making. David Smith and Jonathan Fletcher show how to assess your
current deciphering processes, and present an innovative framework integrating
quantitative and qualitative approaches for analysing complex data-sets. With
its holistic approach to interpretation and its 10-step process for making it
work in practice, this book will equip you with a deep understanding of data
analysis and ultimately improve your judgment to produce better business
decisions. "This is modern commercial research, where the mind of the researcher
is finally acknowledged as admissible data. Prior knowledge, pragmatism,
experience are all robust grist to the 'holistic' research mill. A must-read for
anyone getting to grips with 21st century market research." Virginia Valentine,
Semiotic Solutions
Password: www.AvaxHome.ru
Kenneth Slonneger, Barry L. Kurtz, "Formal Syntax and Semantics of Programming
Languages: A Laboratory Based Approach"
Addison Wesley Longman | ISBN 0201656973 | 1994 Year | PDF | 1,41 Mb | 637 Pages
“ Presents a panorama of techniques in formal syntax, operational semantics and
formal semantics. Includes valuable hands-on laboratory exercises. DLC:
Programming languages (Electronic computers) - Syntax.
Password: www.AvaxHome.ru
Kris Kaspersky, "Code Optimization: Effective Memory Usage"
A-List Publishing | ISBN 1931769249 | 2003 Year | CHM | 10,93 Mb | 400 Pages
“ A guide to optimizing programs on the PC and Unix platforms, this book covers
the expediency of optimization and the methods to increase the speed of programs
via optimization. Discussed are typical mistakes made by programmers that lessen
the performance of the system along with easily implemented solutions. Detailed
descriptions of the devices and mechanism of interaction of the computer
components, effective ways of programming, and a technique for optimizing
programs, are provided. Programmers will also learn how to effectively implement
programming methods in a high-level language that is usually done in assembler
with particular attention given to the RAM subsystem. The working principles of
the RAM and the way in which it is coupled with the processor as well as a
description of programming methods that allows programmers to overclock the
memory to reach maximum performance are included.
Password: www.AvaxHome.ru
D.McKinnon, "Safe Air Travel Companion"
McGraw-Hill | ISBN 0071406875 | 2002 Year | PDF | 0,23 Mb | 159 Pages
“ Recent events have forced everyone to be more aware of safety during airline
flights. But being aware isn't enough . . . there are dozens of easy-to-follow
practical actions you as a passenger should follow in order to minimize your
risk -- and perhaps save your life -- in the event of a hijacking or other
Previous page Top Next page