Книги жанра зарубежная компьютерная литература: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 20
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра зарубежная компьютерная литература

Requirements Modelling and Specification for Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here is a practical handbook to requirements engineering and systems specification for developers building systems within a service oriented architecture. I…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Requirements Modelling and Specification for Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here is a practical handbook to requirements engineering and systems specification for developers building systems within a service oriented architecture. I…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Requirements Modelling and Specification for Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here is a practical handbook to requirements engineering and systems specification for developers building systems within a service oriented architecture. I…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Microprocessor Theory and Applications with 68000/68020 and Pentium
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel? Pentium?. It begins with an overview of microprocessors–including anexplanation of terms, the evolution of the microprocessor, and typical applica…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Microprocessor Theory and Applications with 68000/68020 and Pentium
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel? Pentium?. It begins with an overview of microprocessors–including anexplanation of terms, the evolution of the microprocessor, and typical applica…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Microprocessor Theory and Applications with 68000/68020 and Pentium
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel? Pentium?. It begins with an overview of microprocessors–including anexplanation of terms, the evolution of the microprocessor, and typical applica…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Microprocessor Theory and Applications with 68000/68020 and Pentium
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel? Pentium?. It begins with an overview of microprocessors–including anexplanation of terms, the evolution of the microprocessor, and typical applica…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Business Rules Management and Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution applications. This proposed title brings together the following key ideas in modern enterprise system development best practice. The need for service-ori…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Business Rules Management and Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution applications. This proposed title brings together the following key ideas in modern enterprise system development best practice. The need for service-ori…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Business Rules Management and Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution applications. This proposed title brings together the following key ideas in modern enterprise system development best practice. The need for service-ori…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Business Rules Management and Service Oriented Architecture
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution applications. This proposed title brings together the following key ideas in modern enterprise system development best practice. The need for service-ori…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Managing the Human Factor in Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such ch…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Managing the Human Factor in Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such ch…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Managing the Human Factor in Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such ch…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Managing the Human Factor in Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such ch…

Добавленo: Рейтинг: 3 Комментариев 0 шт.