Home | Amazing | Today | Tags | Publishers | Years | Search 
Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Pro Oracle SQL (Expert's Voice in Oracle)
Pro Oracle SQL (Expert's Voice in Oracle)

Pro Oracle SQL unlocks the power of SQL in the Oracle Database—one of the most potent SQL implementations on the market today. To master it requires a three-pronged approach: learn the language features, learn the supporting features that Oracle provides to help use the language effectively, and learn to think and work in...

Quality in Laboratory Hemostasis and Thrombosis
Quality in Laboratory Hemostasis and Thrombosis

“Over the last decades, major progress has been made in quality assurance of hemostatic laboratory assays. This book will be an indispensable part of every hemostasis laboratory, where, given its hands-on nature, it will rarely sit to get dusty on the shelves.” - Frits R. Rosendaal, Leiden University Medical...

Practical Guide to the Packaging of Electronics, Second Edition: Thermal and Mechanical Design and Analysis
Practical Guide to the Packaging of Electronics, Second Edition: Thermal and Mechanical Design and Analysis

As the demand for packaging more electronic capabilities into smaller packages rises, product developers must be more cognizant of how the system configuration will impact its performance. Practical Guide to the Packaging of Electronics: Second Edition, Thermal and Mechanical Design and Analysis provides a...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing addresses the challenge for today’s software professionals who are faced with real schedule deadlines and need to introduce, manage, and perform automated testing on a project. The book addresses automated testing within a client-server or Web environment.

The focus of this book is
...
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Chemistry: An Industry-Based Laboratory Manual
Chemistry: An Industry-Based Laboratory Manual
Have you ever sat down and had an open discussion over coffee with an industrial chemist or chemical technician about his or her work? Have you ever “shadowed” a chemist or a chemical technician for a day as he or she went about the daily routine in an industrial or government laboratory? If you have done these things,...
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy