Flylib.com
References
Previous page
Table of content
Next page
[Beck2000] K. Beck.
Extreme Programming Explained
. Addison-Wesley, 2000.
Previous page
Table of content
Next page
Extreme Programming Perspectives
ISBN: 0201770059
EAN: 2147483647
Year: 2005
Pages: 445
Authors:
Michele Marchesi
,
Giancarlo Succi
,
Don Wells
,
Laurie Williams
,
James Donovan Wells
BUY ON AMAZON
Qshell for iSeries
Using Parameters and Variables
The Integrated File System
Command-Line Arguments
The Perl Utility
C and C++ Development Tools
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
IDS and IPS Internals
Snort
Incident Response
The Future of Intrusion Detection and Prevention
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 250 Grounding and Bonding
Notes to Tables
Example No. D2(b) Optional Calculation for One-Family Dwelling, Air Conditioning Larger than Heating [See 220.82(A) and 220.82(C)]
Example No. D2(c) Optional Calculation for One-Family Dwelling with Heat Pump(Single-Phase, 240/120-Volt Service) (See 220.82)
Example No. D6 Maximum Demand for Range Loads
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 3. Connect Mac OS X with a Bluetooth Phone
Hack 44. Authenticate Wireless Users
Hack 55. Increase the Range of a PowerBook
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
Hack 89. Cut a Cable Omni Antenna
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Gaining Drawing Strategies: Part 1
Generating Elevations
Working with Hatches and Fills
Printing an AutoCAD Drawing
Java Concurrency in Practice
Synchronizers
Task Execution
The Executor Framework
Summary
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies