441. The complete idiot's guide to iPad & iPhone app development /
Author: Troy Brant.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development.,iPad (Computer)-- Programming.,iPhone (Smartphone)-- Programming.,Application software-- Design.,Application software-- Development.,Computer Science.,COMPUTERS-- Programming-- Apple Programming.,Engineering & Applied Sciences.,iPad (Computer)-- Computer software.,iPhone (Smartphone)-- Computer software.
Classification :
QA76
.
8
.
I863
B73
2010eb


442. The craft of software testing :
Author: Brian Marick.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer software-- Testing.,Logiciels-- Essais.,Computer software-- Testing.,Software Engineering,Softwaretest
Classification :
QA76
.
76
.
T48
M36
1995


443. The domain testing workbook /
Author: Cem Kaner, Sowmya Padmanabhan, Douglas Hoffman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming-- Testing.,Computer software-- Quality control.,Computer software-- Reliability.,Computer software-- Testing.,Quality assurance-- Testing.,Computer software-- Quality control.,Computer software-- Reliability.,Computer software-- Testing.
Classification :
TS156
.
6


444. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

445. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


446. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

447. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


448. The pragmatic programmer :
Author: Dave Thomas, Andy Hunt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming.,Computer programming.
Classification :
QA76
.
6
.
T4494
2020


449. The site reliability workbook :
Author: edited by Betsy Beyer [and 4 others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer engineering.,Information technology-- Management.,Reliability (Engineering),BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer engineering.,Information technology-- Management.,Reliability (Engineering)
Classification :
T58
.
64


450. Theory and Practice of Model Transformations :
Author: edited by Keith Duddy, Gerti Kappel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Logic design.,Software engineering.
Classification :
QA76
.
76
.
D47
E358
2013


451. Thinking-driven testing :
Author: Adam Roman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer software-- Quality control.,Software engineering.,Software measurement.,Computer software-- Quality control.,COMPUTERS-- Programming-- General.,Software engineering.,Software measurement.
Classification :
QA76
.
758


452. Time Series and Econometric Modelling :
Author: edited by Ian B. MacNeill, Gary J. Umphrey, Richard A. L. Carter, A. Ian McLeod, Aman Ullah.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Applied mathematics.,Engineering mathematics.,Mathematics.

453. Tools and algorithms for the construction and analysis of systems :
Author: Dirk Beyer, Marieke Huisman (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer software-- Verification, Congresses.,System analysis, Congresses.,System design, Congresses.,Algorithms & data structures.,Computer programming-- software development.,Computer software-- Verification.,Computers-- Hardware-- Handheld Devices.,Computers-- Information Theory.,Computers-- Programming-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Software Engineering.,System analysis.,System design.,Systems analysis & design.
Classification :
QA76
.
9
.
S88


454. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


455. Transactions on engineering technologies :
Author: Haeng Kon Kim, Mahyar A. Amouzegar, Sio-long Ao, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses,Engineering, Congresses,Technological innovations, Congresses,Technology, Congresses
Classification :
TA5


456. Trends in Functional Programming :
Author: edited by Jay McCarthy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Logic design.
Classification :
QA76
.
62
E358
2014


457. Unifying the Software Process Spectrum
Author: edited by Mingshu Li, Barry Boehm, Leon J. Osterweil.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Information Systems.,Software engineering.,Software engineering.,Computer Appl. in Administrative Data Processing.,Computers and Society.,Management of Computing and Information Systems.,Programming Techniques.,Software Engineering/Programming and Operating Systems.

458. Usability :
Author: edited by Judy Hammond, Tom Gross, Janet Wesson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science),Software engineering.
Classification :
QA76
.
9
.
H85
E358
2002


459. User experience re-mastered :
Author: edited by Chauncey Wilson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Human-computer interaction.,User interfaces (Computer systems)-- Design.,Web sites-- Design.,COMPUTERS-- User Interfaces.,Human-computer interaction.,User interfaces (Computer systems)-- Design.,Web sites-- Design.
Classification :
QA76
.
9
.
U83
U833
2010


460. Verification and Validation of Real-Time Software
Author: edited by William J. Quirk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Software engineering.
Classification :
QA76
.
54
E358
1985

