Flylib.com
List of Technology Traps
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Planning Your Project
TECHNOLOGY TRAP: This Year’s Model
Chapter 2: Organizing Your Project
TECHNOLOGY TRAP: The Map Is Not the Territory
Chapter 3: Using Source Code Control Effectively
TECHNOLOGY TRAP: Penny-wise, Pound Foolish? Or, a Fool and His Money Are Soon Parted?
Chapter 4: Coding Defensively
TECHNOLOGY TRAP: When Good Comments Go Bad
Chapter 5: Preventing Bugs with Unit Testing
TECHNOLOGY TRAP: Code Thrashing
Chapter 6: Pumping Up the IDE
TECHNOLOGY TRAP: The Ten-Ton IDE
Chapter 7: Digging Into Source Code
TECHNOLOGY TRAP: The Iceberg of Code
Chapter 8: Generating Code
TECHNOLOGY TRAP: The Velvet Straightjacket
Chapter 9: Tracking and Squashing Bugs
TECHNOLOGY TRAP: The Burden of Process
Chapter 10: Logging Application Activity
TECHNOLOGY TRAP: Think First!
Chapter 11: Working with Small Teams
TECHNOLOGY TRAP: Big Process in Little Teams
Chapter 12: Creating Documentation
TECHNOLOGY TRAP: Experience in a Locked Cabinet
Chapter 13: Mastering the Build Process
TECHNOLOGY TRAP: The Dirty Build
Chapter 14: Protecting Your Intellectual Property
TECHNOLOGY TRAP: If It’s on Their Machine, They Own It
Chapter 15: Delivering the Application
TECHNOLOGY TRAP: Is That All There Is?
< Day Day Up >
Previous page
Table of content
Next page
Coder to Developer: Tools and Strategies for Delivering Your Software
ISBN: 078214327X
EAN: 2147483647
Year: 2003
Pages: 118
Authors:
Mike Gunderloy
,
Sybex
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
SSL and TLS
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
VBScript Programmers Reference
Classes in VBScript (Writing Your Own COM Objects)
Adding VBScript to Your VB Applications
Appendix C Coding Convention
Appendix E VBScript Error Codes and the Err Object
Appendix G The Windows Script Host Object Model
Twisted Network Programming Essentials
Listing Mailboxes on an IMAP Server
Mail Servers
Using NNTP as a User Interface
Services, Processes, and Logging
Running a Twisted Application as a Daemon
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 312 Cabinets, Cutout Boxes, and Meter Socket Enclosures
Article 340 Underground Feeder and Branch-Circuit Cable Type UF
Article 366 Auxiliary Gutters
Article 384 Strut-Type Channel Raceway
Article 504 Intrinsically Safe Systems
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Infrastructure Wiring Basics
Rough-In Installation
Designing and Installing Distributed Video Systems
Designing a Home Security System
Home Automation Controllers
FileMaker 8 Functions and Scripts Desk Reference
Get(ExtendedPrivileges)
Get(PortalRowNumber)
Get(WindowContentHeight)
MiddleValues()
NPV()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies