Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
Practical, hands-on techniques for testing the design, globalization, performance, and security of Web applications

Whether you’re a novice or experienced Web tester, this hands-on guide provides you with the practical steps you’ll need to follow to rigorously test across multiple platforms and browsers. Written by one of...

Building Websites with OpenCms
Building Websites with OpenCms
OpenCms is an open-source enterprise-grade content management system based on Java and XML technology, and is designed specifically for creating and maintaining websites. It provides a full set of tools for dealing with content creation, editorial workflow, publishing, and versioning.

In this book we will take you through the process of
...
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Multi-agent systems (MAS) have emerged as a new methodology to address the issues in organizing large-scale software systems. This methodology provides a conceptual model that helps maintaining constraints, a task conventional software engineering is unable to achieve. In recent years, MAS has been used in various areas in computer science and...
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 (2nd Edition)
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 (2nd Edition)
Interconnecting Cisco Network Devices, Part 1 (ICND1), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCENT™ and CCNA® foundation learning. This book provides you with the knowledge needed to configure Cisco switches and routers to operate in corporate internetworks. By reading this book, you will gain a...
Introducing UNIX and Linux (Grassroots)
Introducing UNIX and Linux (Grassroots)
UNIX is an operating system which has seen substantial growth in its popularity over the last few years and is used by many universities and colleges, as well as in industry. Linux is a UNIX-like operating system for PCs which is freely available and has become a serious alternative to proprietary systems such as Windows. This book is a...
Conceptual Spaces: The Geometry of Thought
Conceptual Spaces: The Geometry of Thought
"This is a fearless book that casts a wide net around key issues in cognitive science. It offers the kind of coherent, unified view that the field badly needs." - Steven Sloman, Associate Professor, Cognitive and Linguistic Sciences, Brown University"

Within cognitive science, two approaches currently dominate
...
Bioinformatics: An Introduction (Computational Biology)
Bioinformatics: An Introduction (Computational Biology)
Bioinformatics is interpreted as the application of information science to biology, in which it plays a fundamental and all-pervasive role. The field continues to develop intensively in both academia and commercially, and is highly interdisciplinary. This broad-ranging and thoroughly updated second edition covers new findings while retaining the...
Blender Foundations: The Essential Guide to Learning Blender 2.6
Blender Foundations: The Essential Guide to Learning Blender 2.6

Howdy folks. This book is your guide to learning Blender 2.6. It assumes no previous knowledge of Blender, although old Blender users will find a lot to learn here too. Some beginner texts are dressed-up reference manuals, while some try to teach everything and end up teaching nothing. This book will teach you how to use Blender 2.6,...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Biophysical Techniques in Photosynthesis (Advances in Photosynthesis and Respiration)
Biophysical Techniques in Photosynthesis (Advances in Photosynthesis and Respiration)
Progress in photosynthesis research is strongly dependent on instrumentation. It is therefore not surprising that the impressive advances that have been made in recent decades are paralleled by equally impressive advances in sensitivity and sophistication of physical equipment and methods. This trend started already shortly after...
Elements of Neo-Walrasian Economics: A Survey (Advances in Japanese Business and Economics)
Elements of Neo-Walrasian Economics: A Survey (Advances in Japanese Business and Economics)

This book aims to explain to the readers the basic idea of the general equilibrium theory, which forms the core of the current mainstream economics called neoclassical school. To understand this theory is absolutely necessary, either to study further or to criticize the contemporary economic theories. The author not only explains traditional...

unlimited object storage image
Result Page: 560 559 558 557 556 555 554 553 552 551 550 549 548 547 546 545 544 543 542 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy