![]() | Software Engineering, Sommerville | ![]() | Software Engineering, Pressman |
![]() | After the Gold Rush, Steve McConnell | ![]() | Software Requirements |
![]() | The Decline and Fall of the American Programmer, Ed Yourdon | ![]() | The mythical man-month (Fred Brooks?) |
![]() | Software Fundamentales, Parnas | ![]() | Writing Effective Use Cases, Alistair Cockburn |
![]() | Design Patterns | ![]() | Code Complete, Steve McConnell |
![]() | Object-Oriented Modelign and Design, Rumbaugh | ![]() | Patterns of Enterprise Application Architecture, Martin Fowler |
![]() | Rapid Development, Steve McConnell | ![]() | Agile Software Development, Robert C. Martin |
![]() | Toward Zero-Defect Programming, Allan M. Stavely | ![]() | Software Project Management |
![]() | Debugging the Development Process | ![]() | Effective Methods for Software Testing |
![]() | Effective Java | ![]() | Writing Solid Code, Steve Maguire |
![]() | UML Distilled, Martin Fowler | ![]() | Software Metrics and Sofware Metrology, Alain Abran |
![]() | The Architecture of Open Source Application | ![]() | Choisir L'agilité, Sylvie Trudel, Mathieu Boisvert |
![]() | Clean Code A Handbook of Agile Software Development Robert C. Martin |
![]() | Maximum Security | ![]() | Computer Related Risks, Peter G. Neumann |
![]() | Cert Oracle Secure Coding Standard for Java | ![]() | Secure Systems Development with UML |
![]() | Core Security Patterns | ![]() | Security Patterns |
![]() | Building Secure Software | ![]() | Software Vulnerability Guide |
![]() | 19 Deadly Sins of Software Security | ![]() | Implementing Database Security and Auditing |
![]() | How to Break Software Security | ![]() | Writing Information Security Policies |
![]() | Applied Cryptography | ![]() | Surviving Security |
![]() | Designing the User Interface, Ben Schneiderman | ![]() | Le design web raisonné, Daniel Lafrenière |
![]() | Learning Dart, Dzenan Ridjanovic, Ivo Balbaert |
Dernière mise à jour: 12 décembre 2015.