Flylib.com
X
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
X-Barcharts
XmR charts
XP (Extreme Programming) 2nd
Previous page
Table of content
Next page
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
ISBN: 0131872508
EAN: 2147483647
Year: 2006
Pages: 394
Authors:
Bijay K. Jayaswal
,
Peter C. Patton
BUY ON AMAZON
Software Configuration Management
Configuration Status Accounting
Configuration Management and Software Engineering Standards Reference
Appendix A Project Plan
Appendix E Test Plan
Appendix S Sample Maintenance Plan
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Objectives of this book
Atomic transactions
Native Web service support for service-orientation principles
The agile strategy
Introduction to service-oriented design
Ruby Cookbook (Cookbooks (OReilly))
Checking Your Access to a File
A Simple Feed Aggregator
Reading and Writing Configuration Files
Writing a CGI Script
Uninstalling a Gem
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Templates and Velocity
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Exam Prep Questions
Exam Prep Questions
Exam Prep Questions
Appendix A. CD Contents and Installation Instructions
Comparing, Designing, and Deploying VPNs
Summary
Review Questions
Advantages and Disadvantages of IPsec Site-to-Site VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies