CSDL SÁCH

Khoa Công Nghệ Thông Tin

Duyệt theo:
.jpg

Testing applications on the web : test planning for internet-based systems

Tác giả: Hung Q. Nguyen

An analysis of the Web-application model and the difference between Web testing and traditional testing; A tutorial on the methodology and techniques for networking technologies and component-based testing; Strategies for test planning, test case designing, and error analysis on the Web; Effective ...

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 1
  • Đang rỗi: 1
.jpg

Testing applications on the web : test planning for mobile and internet-based systems : 2nd ed.

Tác giả: Hung Q. Nguyen, Bob Johnson, Michael Hackett

Includes updates to material on testing Web applications; Contains new coverage of testing for wireless applications; From the coauthor of the bestselling testing book of all time; Each test type is backed up with a testing example and error examples.

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 4
  • Đang rỗi: 4
.jpg

CCNA routing and switching ICND2 200-105 : official cert guide

Tác giả: Wendell Odom, Scott Hogg

This official study guide helps you master all the topics on the CCNA ICND2 exam, including: Ethernet LANs; IPv4 routing protocols; Wide area networks; IPv4 services: ACLs and QoS; IPv4 routing and troubleshooting; IPv6; Network management, SDN, and cloud computing.

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 5
  • Đang rỗi: 5
.jpg

CCENT/CCNA ICND1 100-105 : official cert guide

Tác giả: Wendell Odom

This official study guide helps you master all the topics on the CCENT/CCNA ICND1 exam, including: Networking fundamentals; Implementing basic Ethernet LANs; Ethernet LANs: design, VLANs, and troubleshooting; IPv4 addressing and subnetting; Implementing IPv4; IPv4 design and troubleshooting; IPv4 ...

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 5
  • Đang rỗi: 5
.jpg

Information warfare and security

Tác giả: Dorothy E. Denning

Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with ...

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 1
  • Đang rỗi: 1