Home | Amazing | Today | Tags | Publishers | Years | Search 
Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Pattern Calculus: Computing with Functions and Structures
Pattern Calculus: Computing with Functions and Structures

The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...

Photoshop Elements 9 for Windows: Visual QuickStart Guide
Photoshop Elements 9 for Windows: Visual QuickStart Guide

With Photoshop Elements 9 for Windows: Visual QuickStart Guide, readers can start with a tour of the interface and image-editing basics, or they can look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots to show readers how to capture and...

Liferay Portal 6 Enterprise Intranets
Liferay Portal 6 Enterprise Intranets

Liferay Portal is the world's leading open-source portal platform built on Java and Web 2.0 technologies. It was designed to not only simplify your work experience but cater to your preferences and needs. With this book in hand, you will be able to solve all your Intranet development-related queries. After all, a solution shouldn't...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security
Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security

Assist Telco and ISP engineers and technicians in their transition to IP telephony

  • Assists traditional telco engineers and technicians in designing, implementing, and supporting VoIP networks
  • Provides a step-by-step approach to designing a VoIP network
  • Outlines each VoIP...
Programming Languages and Systems: 8th Asian Symposium, APLAS 2010
Programming Languages and Systems: 8th Asian Symposium, APLAS 2010

This volume contains the papers presented at APLAS 2010, the eighth Asian Symposium on Programming Languages and Systems, held from November 28 to December 1, 2010, in Shanghai, China. The symposium was sponsored by the Asian Association for Foundation of Software (AAFS) and Shanghai Jiao Tong University.

APLAS is a premiere forum...

OSGi and Apache Felix 3.0 Beginner's Guide
OSGi and Apache Felix 3.0 Beginner's Guide

This book is a step-by-step beginner's guide based on developing a case study (a book inventory) that walks the developer through the implementation while progressively explaining the surrounding concepts in context. Throughout the book, the author discusses software design concepts and introduces productivity tools that build up the...

Graph-Theoretic Concepts in Computer Science: 36th International Workshop
Graph-Theoretic Concepts in Computer Science: 36th International Workshop

This book constitutes the thoroughly refereed post-conference proceedings of the 36th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2010, held in Zarós, Crete, Greece, in June 2010. The 28 revised full papers presented together with two invited papers were carefully reviewed and selected from 94 initial...

Oracle WebCenter 11g Handbook: Build Rich, Customizable Enterprise 2.0 Applications
Oracle WebCenter 11g Handbook: Build Rich, Customizable Enterprise 2.0 Applications

Oracle WebCenter is the leading-edge product for developing nextgeneration enterprise portals and composite applications with Web 2.0 in mind. This book introduces you to the aspects of developing WebCenter applications and enriching those applications with social computing services, including discussions, documents, blogs, wikis, tags, and...

IP-Enabled Energy Management: A Proven Strategy for Administering Energy as a Service
IP-Enabled Energy Management: A Proven Strategy for Administering Energy as a Service

Extend Your Energy Management Capabilities

Managing energy usage via a company network allows you to create an energy management program that can be scaled company-wide, and this unique book shows you just how to do it. Through step-by-step instruction and real-world case studies drawn from the expert author team's own...

Windows Communication Foundation 3.5 Unleashed (2nd Edition)
Windows Communication Foundation 3.5 Unleashed (2nd Edition)

Windows Communication Foundation (WCF) is Microsoft’s dynamic technology for allowing autonomous software to communicate. Superseding earlier technologies such as COM/DCOM, .NET Remoting, ASP.NET Web Services, and the Web Services Enhancements for .NET, WCF provides a single solution that is designed to always be...

Result Page: 876 875 874 873 872 871 870 869 868 867 866 865 864 863 862 861 860 859 858 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy