1
by Fogel, Karl
Published 2005
O'Reilly
... fail. To help you beat the odds, O'Reilly has put together Producing Open Source Software, a guide...

2
by Hunleth, Frank, Tate, Bruce
Published 2022
The Pragmatic Bookshelf

4
by Sethi, Munish
Published 2015
Packt Publishing
Table of Contents: ...IntroductionDefining Jasmine specs corresponding to a user story; Implementing Jasmine specs...

5
by Soni, Mitesh, Berg, Alan Mark
Published 2017
Packt Publishing
Table of Contents: ... -- How to do it... -- How it works... -- Chapter 4: Improving Code Quality -- Introduction -- Integrating...

6
by Frain, Ben
Published 2013
Packt Publishing
... will become trivial. Easily produce cross-browser CSS3 gradients, shadows, and transformations along...

7
Published 2023
PACKT Publishing

8
by Clarke, Andy
Published 2009
New Riders

9
Published 2022
PACKT Publishing
.... This course takes you through the introduction to the course and the learning objectives. You will learn...

10
by Rowe, Neil C., Rrushi, Julian
Published 2016
Springer International Publishing
Table of Contents: ...Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense...

11
by Hartley, P.J.
Published 1976
Macmillan Education UK

12
by Sharp, Robin
Published 2024
Springer Nature Switzerland
Table of Contents: ...Chapter 1. Introduction: Why cybersecurity? -- Chapter 2. Technique and human beings -- Chapter 3...

13
by Delfs, Hans, Knebl, Helmut
Published 2015
Springer Berlin Heidelberg
Table of Contents: ...Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols...

14
Published 2021
O'Reilly Media, Inc.

15
Published 2024
Packt Publishing, Limited
Table of Contents: ... Expertise -- Introduction -- Preface -- Introduction to the Book -- Who Should Read This Book -- How to Use...

16
by Revesz, Peter
Published 2010
Springer London
... introduction to the theory, the various types of databases and their applications. Professional database...

17
by Delfs, Hans, Knebl, Helmut
Published 2007
Springer Berlin Heidelberg

18
by Ledgard, H.
Published 1981
Springer New York
Table of Contents: ...I—ADA: An Introduction -- 1. Five Examples -- 2. Describing Data -- 3. Describing Computations -- 4...

19
by Delfs, Hans, Knebl, Helmut
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...1. Introduction -- 1.1 Encryption and Secrecy -- 1.2 The Objectives of Cryptography -- 1.3 Attacks...

20
by Werum, Wulf
Published 1982
Vieweg+Teubner Verlag
Table of Contents: ...I: Introduction -- 1. Important Language Features -- 2. Rules For The Construction Of Pearl Phrases...