This book is a hands-on guide to learning all the tools, principles, and techniques needed to build a fully functional database-driven Web site using PHP and MySQL from scratch.
Contents Foreword vii Preface to the Second Edition xi Preface to the First Edition xv Guide to the Main Mathematical Concepts and Their Application xxv Notation and Symbols xxvii 1 Introduction 1 1.1 The Image Society.....................1 1.2 What
Acquiring the designation of Certifi ed Software Quality Analyst (CSQA) indicates a professional level of competence in the principles and practices of quality assurance in the IT profession. CSQAs become members of an acclaimed professional group,
Lean Software Development shows software professionals how to achieve breakthrough quality, savings, speed, and business value by adapting the seven "lean" principles that have already revolutionized manufacturing and R&D. Drawing on 25+ years' expe
This course is an introduction to software engineering. Software engineering includes the principles and practices that contribute to producing better software and to making software development more predictable and economical. You will learn about
Written by two authors with first-hand experience wringing the last ounce of performance from commercial C++ applications, this book demonstrates the potential of C++ to produce highly efficient programs. The book reveals practical, everyday object-
What does ZEMAX do? ZEMAX is a program which can model, analyze, and assist in the design of optical systems. The interface to ZEMAX has been designed to be easy to use, and with a little practice it can allow very rapid interactive design. Most ZEM
NewSID SYSINTERNALS SOFTWARE LICENSE TERMS These license terms are an agreement between Sysinternals (a wholly owned subsidiary of Microsoft Corporation) and you. Please read them. They apply to the software you are downloading from Systinternals.co
内容是英文的,介绍uml,很有帮助!Overview of UML for Java ProgrammersWorking with DiagramsClass DiagramsSequence DiagramsUse CasesPrinciples of OODThe Practices: dXPackagesObject DiagramsState DiagramsHeuristics and CoffeeSMC Remote Service: Case Study
Morgan Kaufmann, 2008 The first text and reference on this sea change in the computer industry This book is the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. It is of immediate use to
Passive optical network (PON) technologies have become an important broadband access technology as a result of the growing demand for bandwidth-hungry video-on-demand applications. Written by the leading researchers and industry experts in the field
本文阐述了哈希函数的构造方法有很多,但应注意两个原则:第一,函数值应在1至记录总数之间;第二,尽可能避免冲突。 设要存放的数据元素有n个,存放数据元素的内存单元有m个,设计哈希函数的目标就是要使通过哈希函数得到的n个数据元素的哈希地址尽可能均匀地分布在m个连续内存单元上,同时使计算过程尽可能简单以达到尽可能高的时间效率。 This paper describes the structure of the hash function of a lot of ways, but should pa
Martin Fowler和《重构:改善既有代码的设计》(中文版)另几位作者清楚揭示了重构过程,他们为面向对象软件开发所做的贡献,难以衡量。《重构:改善既有代码的设计》(中文版)解释重构的原理(principles)和最佳实践方式(best practices),并指出何时何地你应该开始挖掘你的代码以求改善。《重构:改善既有代码的设计》(中文版)的核心是一份完整的重构名录(catalog of refactoring),其中每一项都介绍一种经过实证的代码变换手法(code transforma