Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer programming > Software engineering
* This book surveys the different technologies and servers that are available for you to use with ASP.NET and maps the "Quality Attributes" of Application Architecture for these different servers. * The author has been using ASP.NET since the technology preview of the .NET 1.0 Framework. He has put scores of ASP.NET applications into production for large enterprise companies and universities. * This book is written with today's technology, with an eye on the future.
The book provides a platform for dealing with the flaws and failings of the soft computing paradigm through different manifestations. The different chapters highlight the necessity of the hybrid soft computing methodology in general with emphasis on several application perspectives in particular. Typical examples include (a) Study of Economic Load Dispatch by Various Hybrid Optimization Techniques, (b) An Application of Color Magnetic Resonance Brain Image Segmentation by Para Optimus LG Activation Function, (c) Hybrid Rough-PSO Approach in Remote Sensing Imagery Analysis, (d) A Study and Analysis of Hybrid Intelligent Techniques for Breast Cancer Detection using Breast Thermograms, and (e) Hybridization of 2D-3D Images for Human Face Recognition. The elaborate findings of the chapters enhance the exhibition of the hybrid soft computing paradigm in the field of intelligent computing.
With the growth of public and private data stores and the emergence of off-the-shelf data-mining technology, recommendation systems have emerged that specifically address the unique challenges of navigating and interpreting software engineering data. This book collects, structures and formalizes knowledge on recommendation systems in software engineering. It adopts a pragmatic approach with an explicit focus on system design, implementation, and evaluation. The book is divided into three parts: "Part I - Techniques" introduces basics for building recommenders in software engineering, including techniques for collecting and processing software engineering data, but also for presenting recommendations to users as part of their workflow. "Part II - Evaluation" summarizes methods and experimental designs for evaluating recommendations in software engineering. "Part III - Applications" describes needs, issues and solution concepts involved in entire recommendation systems for specific software engineering tasks, focusing on the engineering insights required to make effective recommendations. The book is complemented by the webpage rsse.org/book, which includes free supplemental materials for readers of this book and anyone interested in recommendation systems in software engineering, including lecture slides, data sets, source code, and an overview of people, groups, papers and tools with regard to recommendation systems in software engineering. The book is particularly well-suited for graduate students and researchers building new recommendation systems for software engineering applications or in other high-tech fields. It may also serve as the basis for graduate courses on recommendation systems, applied data mining or software engineering. Software engineering practitioners developing recommendation systems or similar applications with predictive functionality will also benefit from the broad spectrum of topics covered.
Real-world configurations and supporting materials enable you to deploy Nagios and integrate other tools on a step-by-step basis Simplifies deployment and installation by providing examples of real-world monitoring situations and explains how to configure, architect, and deploy EM solutions to address these situations Shows how to create your own Nagios plug-ins, to monitor devices for which Nagios doesn't provide plug-ins
Soft City Culture and Technology: The Betaville Project discusses the complete cycle of conception, development, and deployment of the Betaville platform. Betaville is a massively participatory online environment for distributed 3D design and development of proposals for changes to the built environment- an experimental integration of art, design, and software development for the public realm. Through a detailed account of Betaville from a Big Crazy Idea to a working "deep social medium", the author examines the current conditions of performance and accessibility of hardware, software, networks, and skills that can be brought together into a new form of open public design and deliberation space, for and spanning and integrating the disparate spheres of art, architecture, social media, and engineering. Betaville is an ambitious enterprise, of building compelling and constructive working relationships in situations where roles and disciplinary boundaries must be as agile as the development process of the software itself. Through a considered account and analysis of the interdependencies between Betaville's project design, development methods, and deployment, the reader can gain a deeper understanding of the potential socio-technical forms of New Soft Cities: blended virtual-physical worlds, whose "public works" must ultimately serve and succeed as massively collaborative works of art and infrastructure.
* The Definitive Guide to ImageMagick is the first book to cover ImageMagick (http://www.imagemagick.org/) comprehensively, one of the most popular open source software suites for creating and manipulating images. * Beginner /Intermediate Programmers and Web Developers looking for an automated solution for image manipulation; this book explains how ImageMagick's features can be incorporated in a variety of applications. * The author and review team is unusually strong: the author has been involved in large-scale image processing and storage for the past several years. And the creators of ImageMagick were closely involved in the book's technical review.
Over the last two decades, a major challenge for researchers working on modeling and evaluation of computer-based systems has been the assessment of system Non Functional Properties (NFP) such as performance, scalability, dependability and security. In this book, the authors present cutting-edge model-driven techniques for modeling and analysis of software dependability. Most of them are based on the use of UML as software specification language. From the software system specification point of view, such techniques exploit the standard extension mechanisms of UML (i.e., UML profiling). UML profiles enable software engineers to add non-functional properties to the software model, in addition to the functional ones. The authors detail the state of the art on UML profile proposals for dependability specification and rigorously describe the trade-off they accomplish. The focus is mainly on RAMS (reliability, availability, maintainability and safety) properties. Among the existing profiles, they emphasize the DAM (Dependability Analysis and Modeling) profile, which attempts to unify, under a common umbrella, the previous UML profiles from literature, providing capabilities for dependability specification and analysis. In addition, they describe two prominent model-to-model transformation techniques, which support the generation of the analysis model and allow for further assessment of different RAMS properties. Case studies from different domains are also presented, in order to provide practitioners with examples of how to apply the aforementioned techniques. Researchers and students will learn basic dependability concepts and how to model them using UML and its extensions. They will also gain insights into dependability analysis techniques through the use of appropriate modeling formalisms as well as of model-to-model transformation techniques for deriving dependability analysis models from UML specifications. Moreover, software practitioners will find a unified framework for the specification of dependability requirements and properties of UML, and will benefit from the detailed case studies.
*Unlike its competitors, focuses solely on applied programming techniques for testers *Will appeal to both developers and testers alike; already popularized in classrooms worldwide for three years *Testing market is growing as more business adopt .NET technologies
Handbook of Neuroevolution Through Erlang presents both the theory behind, and the methodology of, developing a neuroevolutionary-based computational intelligence system using Erlang. With a foreword written by Joe Armstrong, this handbook offers an extensive tutorial for creating a state of the art Topology and Weight Evolving Artificial Neural Network (TWEANN) platform. In a step-by-step format, the reader is guided from a single simulated neuron to a complete system. By following these steps, the reader will be able to use novel technology to build a TWEANN system, which can be applied to Artificial Life simulation, and Forex trading. Because of Erlang's architecture, it perfectly matches that of evolutionary and neurocomptational systems. As a programming language, it is a concurrent, message passing paradigm which allows the developers to make full use of the multi-core & multi-cpu systems. Handbook of Neuroevolution Through Erlang explains how to leverage Erlang's features in the field of machine learning, and the system's real world applications, ranging from algorithmic financial trading to artificial life and robotics.
* Covers the A-to-Z of Axapta in 300 pages * Author is the world's leading Axapta expert * Provides essential guidance to a fast-growing community currently deprived of suitable documentation and training
Microsoft BizTalk Server 2006 R2 offers an efficient, integrated way to deploy EDI solutions. With this practical guide, you can set up and deliver a BizTalk 2006--driven EDI solution without getting caught up in the complexity of non-EDI items in BizTalk. This book offers insights into the brand-new Biztalk 2006 R2--based EDI functionality, including the far greater flexibility in handling interchange. It gives advice covering specific implementations, provides an in-depth understanding of EDI, and presents a detailed, step-by-step approach to building and deploying projects.
Founders at Work recounts the early struggles for independence and acceptance of many of modern technology's giants, through personal interviews that are at times hilarious, at times painful, and always inspiring. As human-interest stories they will interest the same audience that enjoys reading about the Google founders in PEOPLE magazine. These stories are exceptionally interesting, because they're about the early stages, when the founders were younger and inexperienced. Most readers know startup founders only as confident millionaires. As novices trying to find their way by trial and error, they're more human, and easier for the reader to identify with.
Diagramming and process are important topics in today's software development world, as the UML diagramming language has come to be almost universally accepted. Yet process is necessary; by themselves, diagrams are of little use. Use Case Driven Object Modeling with UML - Theory and Practice combines the notation of UML with a lightweight but effective process - the ICONIX process - for designing and developing software systems. ICONIX has developed a growing following over the years. Sitting between the free-for-all of Extreme Programming and overly rigid processes such as RUP, ICONIX offers just enough structure to be successful.
It is difficult to just throw out all existing code and start over when a new technology arrives. That's the situation with Microsoft .NET, which represents a new and improved way of developing software for the Windows platform. Wouldn't you would love to rewrite all of your existing code in the newer managed code environment that .NET provides? However, you have that little problem known as legacy code. Fortunately, Microsoft .NET provides a rich set of tools interoperation with existing code. This book is written as a guide for Windows developers transitioning from native Windows code to .NET managed code.
This book introduces one of the most exciting and popular .NET-oriented initiatives; the Enterprise Application Library, which offers nine classes of reusable code used to solve a variety of common problem spaces. It is the first book to introduce all ten of the enterprise application blocks, which have been recently updated for .NET 2.0. It covers a number of topics, including configuration, data access, exception management, caching, application updates, UI separation, asynchronous invocation, logging, security, and XML-based information aggregation. With this book readers will be able to build .NET applications faster and more efficiently.
* This is the only up-to-date book on the market that covers Flash mobile application development. * Evidence of demand - large companies such as Nokia and Samsung are Flash-enabling their phones. * The book will support the new FlashLite version available with the next version of Flash, released later on this year.
First and only book on the Java 5, including new Java EE 5, for SAP/ABAB programmers The author has given the first course of its kind in Belgium, and employs his experience and approach in this book More Java development or exposure to Java needed by SAP/ABAP programmers and developers as evidenced by NetWeaver, for example
In this book, the world's foremost experts in F# show you how to program in F# the way they do. Written by F#'s inventor and two major contributors to its development, Expert F# is the authoritative, comprehensive, and in-depth guide to the language and its use. Designed to help others become experts, the first part of the book quickly yet carefully describes the F# language. The second part then carefully shows how to elegantly use F# for a wide variety of practical programming tasks. This comprehensive reference of F# concepts, syntax, and features offers a treasury of expert techniques.
This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology; investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices; provides guidance on biometric systems design; explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats; discusses such usage issues as collaboration frameworks, and messaging and data translation; examines the impact of biometric technologies on society, covering issues of privacy and user factors; reviews the current situation in identity management, and predicts where these trends may take us in the future.
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Frequency Identification (RFID), which helped to automate inventory, tracking and basic identification, today IoT is characterized by a dynamic trend toward connecting smart sensors, objects, devices, data and applications. The next step will be "cognitive IoT," facilitating object and data re-use across application domains and leveraging hyper-connectivity, interoperability solutions and semantically enriched information distribution. The Architectural Reference Model (ARM), presented in this book by the members of the IoT-A project team driving this harmonization effort, makes it possible to connect vertically closed systems, architectures and application areas so as to create open interoperable systems and integrated environments and platforms. It constitutes a foundation from which software companies can capitalize on the benefits of developing consumer-oriented platforms including hardware, software and services. The material is structured in two parts. Part A introduces the general concepts developed for and applied in the ARM. It is aimed at end users who want to use IoT technologies, managers interested in understanding the opportunities generated by these novel technologies, and system architects who are interested in an overview of the underlying basic models. It also includes several case studies to illustrate how the ARM has been used in real-life scenarios. Part B then addresses the topic at a more detailed technical level and is targeted at readers with a more scientific or technical background. It provides in-depth guidance on the ARM, including a detailed description of a process for generating concrete architectures, as well as reference manuals with guidelines on how to use the various models and perspectives presented to create a concrete architecture. Furthermore, best practices and tips on how system engineers can use the ARM to develop specific IoT architectures for dedicated IoT solutions are illustrated and exemplified in reverse mapping exercises of existing standards and platforms.
This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones. It is based on the findings collected and lessons learned at the Software Center (SC), a unique collaboration between research and industry, with Chalmers University of Technology, Gothenburg University and Malmoe University as academic partners and Ericsson, AB Volvo, Volvo Car Corporation, Saab Electronic Defense Systems, Grundfos, Axis Communications, Jeppesen (Boeing) and Sony Mobile as industrial partners. The 17 chapters present the "Stairway to Heaven" model, which represents the typical evolution path companies move through as they develop and mature their software engineering capabilities. The chapters describe theoretical frameworks, conceptual models and, most importantly, the industrial experiences gained by the partner companies in applying novel software engineering techniques. The book's structure consists of six parts. Part I describes the model in detail and presents an overview of lessons learned in the collaboration between industry and academia. Part II deals with the first step of the Stairway to Heaven, in which R&D adopts agile work practices. Part III of the book combines the next two phases, i.e., continuous integration (CI) and continuous delivery (CD), as they are closely intertwined. Part IV is concerned with the highest level, referred to as "R&D as an innovation system," while Part V addresses a topic that is separate from the Stairway to Heaven and yet critically important in large organizations: organizational performance metrics that capture data, and visualizations of the status of software assets, defects and teams. Lastly, Part VI presents the perspectives of two of the SC partner companies. The book is intended for practitioners and professionals in the software-intensive systems industry, providing concrete models, frameworks and case studies that show the specific challenges that the partner companies encountered, their approaches to overcoming them, and the results. Researchers will gain valuable insights on the problems faced by large software companies, and on how to effectively tackle them in the context of successful cooperation projects.
This book explains how to implement an effective disaster recovery strategy for SQL Server 2005 and 2008 databases. It details powerful tools and features for data backup and disaster recovery present in SQL Server 2005 and enhanced in SQL Server 2008. Users of SQL Server 2000 will find that the options for handling disaster recovery have dramatically increased. This book explores those options by examining the technical details of disaster recovery features and then applying that knowledge to practical scenarios. Also covered are fundamental changes to disaster recovery capabilities and common issues to expect when using new features.
This book illustrates how goal-oriented, automated measurement can be used to create Lean organizations and to facilitate the development of Lean software, while also demonstrating the practical implementation of Lean software development by combining tried and trusted tools. In order to be successful, a Lean orientation of software development has to go hand in hand with a company's overall business strategy. To achieve this, two interrelated aspects require special attention: measurement and experience management. In this book, Janes and Succi provide the necessary knowledge to establish "Lean software company thinking," while also exploiting the latest approaches to software measurement. A comprehensive, company-wide measurement approach is exactly what companies need in order to align their activities to the demands of their stakeholders, to their business strategy, etc. With the automatic, non-invasive measurement approach proposed in this book, even small and medium-sized enterprises that do not have the resources to introduce heavyweight processes will be able to make their software development processes considerably more Lean. The book is divided into three parts. Part I, "Motivation for Lean Software Development," explains just what "Lean Production" means, why it can be advantageous to apply Lean concepts to software engineering, and which existing approaches are best suited to achieving this. Part II, "The Pillars of Lean Software Development," presents the tools needed to achieve Lean software development: Non-invasive Measurement, the Goal Question Metric approach, and the Experience Factory. Finally, Part III, "Lean Software Development in Action," shows how different tools can be combined to enable Lean Thinking in software development. The book primarily addresses the needs of all those working in the field of software engineering who want to understand how to establish an efficient and effective software development process. This group includes developers, managers, and students pursuing an M.Sc. degree in software engineering.
* This timely new edition covers technological changes to broadband wireless access, including competing standards to WiMax, mobile entertainment, and new data backup systems. * Shows wireless operators how to plan a broadband wireless network for the greatest return on investment in the shortest possible time. * Municipal wireless networks are expanding throughout the United States and Europe, where the wired infrastructure is too old to support the volume of Internet traffic and where modern cable is too expensive for most Internet users.
Service Broker is a key Microsoft product in support of message-based processing between applications. Pro SQL Server 2008 Service Broker helps you to take full advantage of this key Microsoft technology, beginning from the fundamentals, moving through installation and application development, and ultimately showing you how to develop highly available and scalable applications based upon the service-oriented architecture that is quickly gaining ground as the way forward in application development. Comprehensive approach to developing with Service Broker Strong focus on best practices and real-world scenarios Covers the key aspects of distributed application design |
You may like...
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, …
Hardcover
R1,922
Discovery Miles 19 220
Foundations of Software Testing - ISTQB…
Dorothy Graham, Rex Black, …
Paperback
The Big Book of Drones
Ralph DeFrangesco, Stephanie DeFrangesco
Paperback
R879
Discovery Miles 8 790
|