Selenium 2 Testing Tools: Beginner's Guide
Selenium WebDriver is the most used tool for browser automation. This book shows developers and testers how to create automated tests using a browser. You will learn how to be able to use Selenium IDE for quick throwaway tests. Or if
you want to create tests to last, learn to use Selenium WebDriver.
You will learn to use...
Robot Framework Test Automation
Create test suites and automated acceptance tests from scratch
Create a Robot Framework test file and a test suite
Identify and differentiate between different test case writing styles
Full of easy- to- follow steps, to get you started with Robot Framework...
Coder to Developer: Tools and Strategies for Delivering Your Software
No one can disparage the ability to write good code. At its highest levels, it is an art. But no one can confuse writing good code with developing good software. The difference—in terms of challenges, skills, and compensation—is immense.
Coder to Developer: Tools and Strategies for Delivering Your Software helps you...
A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....
Agile Software Development Quality Assurance After spending the summer north of the Arctic Circle, basking in the midnight sun and the warmest weather for over 100 years in Finland, I was especially happy to find this book sitting on my desk waiting to be read. Although there is no shortage of books on agile methodologies and practices, something had been missing. The concept of quality is... Access Control Systems: Security, Identity Management and Trust Models Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
|Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |