Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Behavior-driven Development with JavaScript
Learning Behavior-driven Development with JavaScript

Create powerful yet simple-to-code BDD test suites in JavaScript using the most popular tools in the community

About This Book

  • Master the most popular testing tools in the JavaScript ecosystem, such as CucumberJS, Mocha, SinonJS, and more.
  • Learn how Behavior-driven development can help...
Adobe Muse: Classroom in a Book
Adobe Muse: Classroom in a Book

Those creative professionals seeking the fastest, easiest, most comprehensive way to learn Adobe Muse choose Adobe Muse Classroom in a Book from the Adobe Creative Team at Adobe Press. The 10 project-based lessons in this book show readers step-by-step the key techniques for working in Muse.

...

Learning DevOps: Continuously Deliver Better Software
Learning DevOps: Continuously Deliver Better Software

Learn to use some of the most exciting and powerful tools to deliver world-class quality software with continuous delivery and DevOps

About This Book

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • ...
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Temporal Type Theory: A Topos-Theoretic Approach to Systems and Behavior (Progress in Computer Science and Applied Logic)
Temporal Type Theory: A Topos-Theoretic Approach to Systems and Behavior (Progress in Computer Science and Applied Logic)
This innovative monograph explores a new mathematical formalism in higher-order temporal logic for proving properties about the behavior of systems. Developed by the authors, the goal of this novel approach is to explain what occurs when multiple, distinct system components interact by using a category-theoretic description of behavior...
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide...

PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition
PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition

The second edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach...

VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Detail Process Charting: Speaking the Language of Process
Detail Process Charting: Speaking the Language of Process
Praise for Detail Process Charting

"A must-read for any competitive organization, Detail Process Charting: Speaking the Language of Process provides a comprehensive, yet clear, explanation of how to utilize one of the most powerful tools available to improve work processes. [Graham] has successfully integrated the history, success stories,...

The Mobile Revolution: The Making of Worldwide Mobile Markets
The Mobile Revolution: The Making of Worldwide Mobile Markets
‘We’re moving away from the business of ears to the business of eyes.’

Move over Bill Gates, stand aside Steve Jobs, said the industry pundits after
CeBIT 1998, the famous trade conference. They’d just seen Nokia’s
Communicator 9110, a mobile phone with dazzling capabilities, but what
really
...
unlimited object storage image
Result Page: 842 841 840 839 838 837 836 835 834 833 832 831 830 829 828 827 826 825 824 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy