Software Design, Testing & Engineering
azw3, epub |eng | 2016-12-06 | Author:Ron D McFarland Ph.D.
Apple lists several core practices necessary for secure programming. These include (hyperlinks are embedded): Avoiding Buffer Overflows and Underflows describes the various types of buffer overflows and explains how to ...
( Category:
Testing
July 22,2020 )
epub |eng | 2018-04-12 | Author:Steven F. Lott [Steven F. Lott]
Repeating a single value with repeat() The repeat() function seems like an odd feature: it returns a single value over and over again. It can serve as an alternative for ...
( Category:
Object-Oriented Design
July 21,2020 )
epub |eng | | Author:Lott, Steven;
Finally, we chained all of the readers into a single iterator with chain(*readers). This was used to yield the sequence of rows from all of the files. It's important to ...
( Category:
Object-Oriented Design
July 21,2020 )
epub |eng | | Author:Philippe Lalanda, Julie A. McCann & Ada Diaconescu
Floating-point operations per second (FLOPS)—This metric is similar to the IPS, above, as it also represents a notion of processing throughput. It was primarily designed to make comparisons between machines ...
( Category:
Software Development
July 21,2020 )
epub |eng | 2020-01-24 | Author:Achilleas Anagnostopoulos [Achilleas Anagnostopoulos]
The Config type holds all required configuration options for creating a new crawler pipeline: // Config encapsulates the configuration options for creating a new Crawler. type Config struct { PrivateNetworkDetector ...
( Category:
Software Development
July 21,2020 )
epub, pdf |eng | 2020-07-18 | Author:Lewis, Elijah [Lewis, Elijah]
The importance of indentations like this cannot be overemphasized. This is practically what makes your code readable at all. It is easy to see the structure of an indented file ...
( Category:
Testing
July 21,2020 )
epub |eng | 2017-03-13 | Author:Paul Felten [Felten, Paul]
ABOUT THE AUTHOR After earning his B.A. in History, Paul Felten enlisted in the US Army, as an infantryman. While enlisted he earned the coveted Ranger tab and served two ...
( Category:
Testing
July 21,2020 )
epub |eng | | Author:Shamshad Ansari
Convolution layer 7: Kernel 3×3, filters 256, activation ReLU Pooling layer: MaxPooling, kernel size 2×2 and strides 2×2 Convolution layer 8: Kernel 3×3, filters 512, activation ReLU Convolution layer 9: ...
( Category:
Software Development
July 21,2020 )
epub |eng | | Author:Michael L. Perry
Handling the Next Action State machine–based patterns show us one of the reasons that we want to know the state of an entity: to understand how to respond to the ...
( Category:
Software Development
July 21,2020 )
epub |eng | 2019-02-27 | Author:Lauren S. Ferro [Lauren S. Ferro]
( Category:
Tools
July 20,2020 )
epub, pdf |eng | 2010-07-14 | Author:Diomidis Spinellis
9.1.1 Centralized Repository and Distributed Approaches A centralized repository architectural model relies on a central process or data structure acting as a control or information hub for the system. In ...
( Category:
Software Development
July 20,2020 )
epub |eng | | Author:Bruce Sutherland
b=str.empty() Returns true if size() == 0. Note: str is a string, n is a number, c is a single character, and b is a boolean. This set of methods ...
( Category:
Software Development
July 20,2020 )
mobi, epub |eng | 2013-06-09 | Author:McCollin
Source: http://themehybrid.com/themes Figure 7-6 Hybrid child themes Non-developers can use Hybrid with a child theme to get a website up and running very quickly, but its main strength lies in ...
( Category:
Software Development
July 20,2020 )
azw3 |eng | 2013-04-29 | Author:Michael R. Hansen & Hans Rischel [Hansen, Michael R.]
8.4 Sequential composition The semicolon symbol “;” denotes the sequential composition operator (while the double semicolon “;;” is a terminator symbol). This operator combines two expressions exp1 and exp2 to ...
( Category:
Object-Oriented Design
July 19,2020 )
Bioinformatics Data Skills: Reproducible and Robust Research with Open Source Tools by Vince Buffalo
azw3, pdf |eng | 2015-06-30 | Author:Vince Buffalo [Buffalo, Vince]
Despite the convenience that comes with representing and working with genomic ranges, there are unfortunately some gritty details we need to be aware of. First, there are two different flavors ...
( Category:
Software Development
July 19,2020 )
Categories
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16756)Deep Learning with Python by François Chollet(12563)
Hello! Python by Anthony Briggs(9911)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9794)
The Mikado Method by Ola Ellnestam Daniel Brolund(9775)
Dependency Injection in .NET by Mark Seemann(9335)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8292)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7758)
Grails in Action by Glen Smith Peter Ledbrook(7693)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7012)
Microservices with Go by Alexander Shuiskov(6780)
Practical Design Patterns for Java Developers by Miroslav Wengner(6692)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6633)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6409)
Angular Projects - Third Edition by Aristeidis Bampakos(6041)
The Art of Crafting User Stories by The Art of Crafting User Stories(5572)
NetSuite for Consultants - Second Edition by Peter Ries(5503)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5305)
Kotlin in Action by Dmitry Jemerov(5061)
