Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quality in Laboratory Hemostasis and Thrombosis
Quality in Laboratory Hemostasis and Thrombosis

“Over the last decades, major progress has been made in quality assurance of hemostatic laboratory assays. This book will be an indispensable part of every hemostasis laboratory, where, given its hands-on nature, it will rarely sit to get dusty on the shelves.” - Frits R. Rosendaal, Leiden University Medical...

Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
Developing User Interfaces for Microsoft Windows
Developing User Interfaces for Microsoft Windows

Good user interfaces matter. In fact, they matter a great deal to the success of a program. While a program’s design and technology affects its overall capability and performance, as far as the user is concerned, the user interface is the program. If the user interface isn’t good, the program isn’t good. Don’t expect...

Selenium 2 Testing Tools: Beginner's Guide
Selenium 2 Testing Tools: Beginner's Guide
Selenium WebDriver is the most used tool for browser automation. This book shows developers and testers how to create automated tests using a browser. You will learn how to be able to use Selenium IDE for quick throwaway tests. Or if you want to create tests to last, learn to use Selenium WebDriver.

You will learn to use
...
Robot Framework Test Automation
Robot Framework Test Automation

Create test suites and automated acceptance tests from scratch

Overview

  • Create a Robot Framework test file and a test suite
  • Identify and differentiate between different test case writing styles
  • Full of easy- to- follow steps, to get you started with Robot Framework
  • ...
Coder to Developer: Tools and Strategies for Delivering Your Software
Coder to Developer: Tools and Strategies for Delivering Your Software

No one can disparage the ability to write good code. At its highest levels, it is an art. But no one can confuse writing good code with developing good software. The difference—in terms of challenges, skills, and compensation—is immense.

Coder to Developer: Tools and Strategies for Delivering Your Software helps you...

A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Agile Software Development Quality Assurance
Agile Software Development Quality Assurance
After spending the summer north of the Arctic Circle, basking in the midnight sun and the warmest weather for over 100 years in Finland, I was especially happy to find this book sitting on my desk waiting to be read. Although there is no shortage of books on agile methodologies and practices, something had been missing. The concept of quality is...
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now involves some...

Basic Guide to System Safety
Basic Guide to System Safety

This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy