Test cross

Results: 550



#Item
81

PDF Document

Add to Reading List

Source URL: www.junitmax.com

Language: English - Date: 2010-09-21 14:38:34
82OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:26
83Identifying Program, Test, and Environmental Changes That Affect Behaviour Reid Holmes David Notkin

Identifying Program, Test, and Environmental Changes That Affect Behaviour Reid Holmes David Notkin

Add to Reading List

Source URL: cs.uwaterloo.ca

Language: English - Date: 2011-02-25 18:13:33
84Elasticity and Its Application Chapter 5 Elasticity . . . … is a measure of how much buyers and

Elasticity and Its Application Chapter 5 Elasticity . . . … is a measure of how much buyers and

Add to Reading List

Source URL: www.wcc.hawaii.edu

Language: English
85CONTENTS  INTRODUCTION xxiii 1

CONTENTS INTRODUCTION xxiii 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-31 10:13:38
86Build a simple notification service with Node.js and MongoDB Kevin Williams Cloud, Automation, and Test Architect for IBM Software  27 June 2014

Build a simple notification service with Node.js and MongoDB Kevin Williams Cloud, Automation, and Test Architect for IBM Software 27 June 2014

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2015-02-19 08:35:00
87Test Driven Development in Debian — BoF Ian Jackson Tom Marble  Stefano Zacchiroli

Test Driven Development in Debian — BoF Ian Jackson Tom Marble Stefano Zacchiroli

Add to Reading List

Source URL: upsilon.cc

Language: English - Date: 2011-07-27 12:29:02
88ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions  ACROS Application Security Analysis Frequently Asked Questions  1. What is the ACROS Application Security Analysis?

ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions ACROS Application Security Analysis Frequently Asked Questions 1. What is the ACROS Application Security Analysis?

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:08
89Yorick: An Interpreted Language David H. Munro cThe Regents of the University of California. All rights reserved. Copyright 
 Permission to use, copy, modify, and distribute this software for any purpose without

Yorick: An Interpreted Language David H. Munro cThe Regents of the University of California. All rights reserved. Copyright Permission to use, copy, modify, and distribute this software for any purpose without

Add to Reading List

Source URL: yorick.sourceforge.net

Language: English - Date: 2005-07-31 23:54:27
90Chapter 16  Strategy Optimisation In prior chapters we have considered how to create both an underlying predictive model (such as with the Suppor Vector Machine and Random Forest Classifier) as well as a trading strategy

Chapter 16 Strategy Optimisation In prior chapters we have considered how to create both an underlying predictive model (such as with the Suppor Vector Machine and Random Forest Classifier) as well as a trading strategy

Add to Reading List

Source URL: www.quantstart.com

Language: English - Date: 2015-05-18 04:58:44