The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...
Pro Oracle SQL unlocks the power of SQL in the Oracle Database—one of the most potent SQL implementations on the market today. To master it requires a three-pronged approach: learn the language features, learn the supporting features that Oracle provides to help use the language effectively, and learn to think and work in...
“Over the last decades, major progress has been made in quality assurance of hemostatic laboratory assays. This book will be an indispensable part of every hemostasis laboratory, where, given its hands-on nature, it will rarely sit to get dusty on the shelves.”- Frits R. Rosendaal, Leiden University Medical...
As the demand for packaging more electronic capabilities into smaller packages rises, product developers must be more cognizant of how the system configuration will impact its performance. Practical Guide to the Packaging of Electronics: Second Edition, Thermal and Mechanical Design and Analysis provides a...
The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...
Automated Software Testing addresses the challenge for today’s software professionals
who are faced with real schedule deadlines and need to introduce, manage, and perform
automated testing on a project. The book addresses automated testing within
a client-server or Web environment.
This volume contains the proceedings of the 15th International conference on
Financial Cryptography and Data Security, held at the Bay Gardens Beach
Resort, St. Lucia, February 28–March 4, 2011.
Financial cryptography and data security (FC) is a well-established international
forum for research, advanced development,...
Digital forensics deals with the acquisition, preservation, examination,
analysis and presentation of electronic evidence. Networked computing,
wireless communications and portable electronic devices have expanded
the role of digital forensics beyond traditional computer crime investigations.
Practically every type of crime now...
A single hype is not enough to change the world. But multiple hypes together can
change it as long as they are part of a bigger trend.
This book discusses more than one hyped technology: cloud computing, NoSQL, and
HTML5. The technologies in this book combine well with other hyped technologies:
functional...
Have you ever sat down and had an open discussion over coffee with an industrial chemist
or chemical technician about his or her work? Have you ever “shadowed” a chemist or a
chemical technician for a day as he or she went about the daily routine in an industrial
or government laboratory? If you have done these things,...
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...