Software Design, Testing & Engineering
epub, pdf |eng | | Author:Jeff Tang
Touchtone Detection Well, although Mark can recognize any musical note played, he cannot detect a touchtone sound entered on a phone. You may not know that each key, whether in ...
( Category:
Computer Vision & Pattern Recognition
April 5,2020 )
epub |eng | 2018-05-08 | Author:Erich R Bühler [Bühler, Erich R]
FIGURE 4.8: Identifying a crucial moment Remember that no change plan is good if you do not know how to deal with the impediments that arise while attempting to implement ...
( Category:
Agile
April 4,2020 )
epub |eng | 2020-02-15 | Author:Anis, Daneyal [Anis, Daneyal]
In the above code sample, we used the train_test_split function in the Scikit-learn library. As you can see, we defined ‘y’ as the target / dependent variable ‘SalePrice’ and ‘X’ ...
( Category:
Expert Systems
April 4,2020 )
epub |eng | | Author:Connor P. Milliken
Method Scope Like global attributes, you may have methods that are accessible through the class itself rather than an instance of the class. These may also be known as static ...
( Category:
Software Development
April 4,2020 )
epub |eng | 2020-03-09 | Author:Dunn, Nat [Dunn, Nat]
Challenge Solution: file-processing/Solutions/word_search_challenge.py def search(word, text): """Return tuple holding line num and line text.""" results = [] for line in enumerate(text, 1): if line[1].find(word) >= 0: results.append(line) return results def ...
( Category:
Software Development
April 3,2020 )
epub |eng | | Author:David Powers
8.Try a number of tests, omitting the trailing slash from the value passed to setDestination() or selecting a nonexistent folder. Also pass invalid values for the maximum size and suffix. ...
( Category:
Software Development
April 3,2020 )
mobi |eng | 2018-02-28 | Author:Rambabu Posa
( Category:
Software Development
April 3,2020 )
epub, pdf |eng | 2011-12-19 | Author:Ljubomir Perkovic [Ljubomir Perkovic]
Compare this to the execution shown in Figure 7.10, when the default exception handler handled the exception. In the previous example, we chose to implement an exception handler at the ...
( Category:
Object-Oriented Design
April 3,2020 )
epub |eng | 2020-03-19 | Author:Fiordelis, Stephen [Fiordelis, Stephen]
Phases of Ethical Hacking Ethical hacking is divided into five phases. Not every hacker needs to use this step sequentially. Depending on the targets, these phases can be utilized accordingly. ...
( Category:
Software Development
April 3,2020 )
epub, mobi |eng | 2020-03-30 | Author:Antonio Melé
RabbitMQ is running and ready to receive messages. Adding Celery to your project You have to provide a configuration for the Celery instance. Create a new file next to the ...
( Category:
Software Development
April 2,2020 )
epub |eng | 2018-07-18 | Author:Stephen Fleming
Future of Microservices Over the years, software application development has evolved from Service-Oriented Architecture (SOA) to monolith architecture and now microservices architecture, which is the most preferred software application technique. ...
( Category:
Tools
April 2,2020 )
epub, pdf |eng | 2018-08-29 | Author:Andrew Lock [Andrew Lock]
( Category:
Software Development
April 1,2020 )
epub |eng | 2019-11-26 | Author:Dirk Strauss [Dirk Strauss]
Maintainability Index This will be a value between 0 and 100 and represents how easy it is to maintain the code. The higher the value, the more maintainable your code ...
( Category:
Testing
April 1,2020 )
epub |eng | | Author:Michael Schwartz & Maciej Machulak
Easy JavaScript Client This JavaScript client is one of the easiest ways to test OpenID Connect, although it’s not the most secure (remember Figure 5-1). The client we will use ...
( Category:
LDAP
March 31,2020 )
epub |eng | 2020-03-25 | Author:ACADEMY, CODING [ACADEMY, CODING]
Df.mean(): This one is going to return to you the mean value that comes with all of the columns. Df.corr(): This one is going to work because it helps you ...
( Category:
Neural Networks
March 31,2020 )
Categories
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16756)Deep Learning with Python by François Chollet(12563)
Hello! Python by Anthony Briggs(9911)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9794)
The Mikado Method by Ola Ellnestam Daniel Brolund(9775)
Dependency Injection in .NET by Mark Seemann(9335)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8292)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7758)
Grails in Action by Glen Smith Peter Ledbrook(7693)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7016)
Microservices with Go by Alexander Shuiskov(6783)
Practical Design Patterns for Java Developers by Miroslav Wengner(6696)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6636)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6409)
Angular Projects - Third Edition by Aristeidis Bampakos(6045)
The Art of Crafting User Stories by The Art of Crafting User Stories(5575)
NetSuite for Consultants - Second Edition by Peter Ries(5508)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5309)
Kotlin in Action by Dmitry Jemerov(5061)
