|
|
|
|
Quality in Laboratory Hemostasis and Thrombosis
“Over the last decades, major progress has been made in quality assurance of hemostatic laboratory assays. This book will be an indispensable part of every hemostasis laboratory, where, given its hands-on nature, it will rarely sit to get dusty on the shelves.” - Frits R. Rosendaal, Leiden University Medical... | | Techniques and Applications of Digital Watermarking and Content ProtectionWhether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry... | | Developing User Interfaces for Microsoft WindowsGood user interfaces matter. In fact, they matter a great deal to the success of a program. While a program’s design and technology affects its overall capability and performance, as far as the user is concerned, the user interface is the program. If the user interface isn’t good, the program isn’t good. Don’t expect... |
|
Selenium 2 Testing Tools: Beginner's Guide
Selenium WebDriver is the most used tool for browser automation. This book shows developers and testers how to create automated tests using a browser. You will learn how to be able to use Selenium IDE for quick throwaway tests. Or if
you want to create tests to last, learn to use Selenium WebDriver.
You will learn to use... | | Robot Framework Test Automation
Create test suites and automated acceptance tests from scratch
Overview
-
Create a Robot Framework test file and a test suite
-
Identify and differentiate between different test case writing styles
-
Full of easy- to- follow steps, to get you started with Robot Framework
... | | Coder to Developer: Tools and Strategies for Delivering Your SoftwareNo one can disparage the ability to write good code. At its highest levels, it is an art. But no one can confuse writing good code with developing good software. The difference—in terms of challenges, skills, and compensation—is immense.
Coder to Developer: Tools and Strategies for Delivering Your Software helps you... |
|
A Practical Guide to Security Engineering and Information AssuranceA Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.... | | Agile Software Development Quality AssuranceAfter spending the summer north of the Arctic Circle, basking in the midnight sun and the warmest weather for over 100 years in Finland, I was especially happy to find this book sitting on my desk waiting to be read. Although there is no shortage of books on agile methodologies and practices, something had been missing. The concept of quality is... | | Access Control Systems: Security, Identity Management and Trust ModelsSecure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as... |
|
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |