top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Oracle PL/SQL developer's guide : master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c / / Saurabh K. Gupta
Advanced Oracle PL/SQL developer's guide : master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c / / Saurabh K. Gupta
Autore Gupta Saurabh K.
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (428 p.)
Disciplina 005.7565
Collana Professional expertise distilled
Soggetto topico PL/SQL (Computer program language)
Database design
ISBN 1-78528-252-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Overview of PL/SQL Programming Concepts; Chapter 2: Oracle 12c SQL and PL/SQL New Features; Chapter 3: Designing PL/SQL Code; Chapter 4: Using Collections; Chapter 5: Using Advanced Interface Methods; Chapter 6: Virtual Private Database; Chapter 7: Oracle SecureFiles; Chapter 8: Tuning PL/SQL Code; Chapter 9: Result Cache; Chapter 10: Analyzing, Profiling, and Tracing PL/SQL Code; Chapter 11: Safeguarding PL/SQL Code against SQL injection
Chapter 12: Working with Oracle SQL DeveloperIndex; Introduction to PL/SQL; Cursors - an overview; Exception handling in PL/SQL; Creating stored procedures; Functions; A PL/SQL package; Oracle Database 12c enhancements to PL/SQL subprograms; Managing database dependencies; Reviewing Oracle-supplied packages; Oracle SQL Developer; Summary; Practice exercise; Database consolidation and the new Multitenant architecture; Oracle 12c SQL and PL/SQL new features; The Oracle Database 12c (12.1.0.2) In-Memory option; Summary; Cursor structures; Cursor variables
Implicit statement results in Oracle Database 12cSubtypes; Summary; Practice exercise; Introduction to collections; Collection types; Associative arrays; Nested tables; Varray; Comparing the collection types; Oracle 12c enhancements to collections; PL/SQL collection methods; Summary; Practice exercise; Overview of External Procedures; Components of external procedure execution flow; Executing external C programs from PL/SQL; Securing External Procedures with Oracle Database 12c; Executing Java programs from PL/SQL; Summary; Practice exercise; Oracle Database Security overview
Fine-Grained Access ControlVirtual Private Database; Virtual Private Database metadata; Oracle Database 12c Security enhancements; Summary; Practice exercise; Introduction to Large Objects; LOB data types in Oracle; Oracle SecureFiles; Working with LOBs; Migrating LONG to LOBs; Migrating BasicFiles to SecureFiles; Oracle Database 12c enhancements to SecureFiles; Summary; Practice exercise; The PL/SQL Compiler; Native and interpreted compilation techniques; Tuning PL/SQL code; Summary; Practice exercise; Oracle Database 11g Result Cache; SQL query Result Cache; PL/SQL Function Result Cache
OCI Client results cacheThe DBMS_RESULT_CACHE package; Result cache in Real Application Clusters; Summary; Practice exercise; A sample PL/SQL program; Tracking PL/SQL coding information; Determining identifier types and usages; The DBMS_METADATA package; Tracing PL/SQL programs using DBMS_TRACE; Profiling PL/SQL code; Summary; Practice exercise; What is SQL injection?; Preventing SQL injection attacks; Testing the code for SQL injection flaws; Summary; Practice exercise; An overview of SQL Developer; Getting started with SQL Developer; SQL Developer 4.0 and 4.1 New Features; Summary
PL/SQL program fundamentals
Record Nr. UNINA-9910798172003321
Gupta Saurabh K.  
Birmingham : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Oracle PL/SQL developer's guide : master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c / / Saurabh K. Gupta
Advanced Oracle PL/SQL developer's guide : master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c / / Saurabh K. Gupta
Autore Gupta Saurabh K.
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (428 p.)
Disciplina 005.7565
Collana Professional expertise distilled
Soggetto topico PL/SQL (Computer program language)
Database design
ISBN 1-78528-252-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Overview of PL/SQL Programming Concepts; Chapter 2: Oracle 12c SQL and PL/SQL New Features; Chapter 3: Designing PL/SQL Code; Chapter 4: Using Collections; Chapter 5: Using Advanced Interface Methods; Chapter 6: Virtual Private Database; Chapter 7: Oracle SecureFiles; Chapter 8: Tuning PL/SQL Code; Chapter 9: Result Cache; Chapter 10: Analyzing, Profiling, and Tracing PL/SQL Code; Chapter 11: Safeguarding PL/SQL Code against SQL injection
Chapter 12: Working with Oracle SQL DeveloperIndex; Introduction to PL/SQL; Cursors - an overview; Exception handling in PL/SQL; Creating stored procedures; Functions; A PL/SQL package; Oracle Database 12c enhancements to PL/SQL subprograms; Managing database dependencies; Reviewing Oracle-supplied packages; Oracle SQL Developer; Summary; Practice exercise; Database consolidation and the new Multitenant architecture; Oracle 12c SQL and PL/SQL new features; The Oracle Database 12c (12.1.0.2) In-Memory option; Summary; Cursor structures; Cursor variables
Implicit statement results in Oracle Database 12cSubtypes; Summary; Practice exercise; Introduction to collections; Collection types; Associative arrays; Nested tables; Varray; Comparing the collection types; Oracle 12c enhancements to collections; PL/SQL collection methods; Summary; Practice exercise; Overview of External Procedures; Components of external procedure execution flow; Executing external C programs from PL/SQL; Securing External Procedures with Oracle Database 12c; Executing Java programs from PL/SQL; Summary; Practice exercise; Oracle Database Security overview
Fine-Grained Access ControlVirtual Private Database; Virtual Private Database metadata; Oracle Database 12c Security enhancements; Summary; Practice exercise; Introduction to Large Objects; LOB data types in Oracle; Oracle SecureFiles; Working with LOBs; Migrating LONG to LOBs; Migrating BasicFiles to SecureFiles; Oracle Database 12c enhancements to SecureFiles; Summary; Practice exercise; The PL/SQL Compiler; Native and interpreted compilation techniques; Tuning PL/SQL code; Summary; Practice exercise; Oracle Database 11g Result Cache; SQL query Result Cache; PL/SQL Function Result Cache
OCI Client results cacheThe DBMS_RESULT_CACHE package; Result cache in Real Application Clusters; Summary; Practice exercise; A sample PL/SQL program; Tracking PL/SQL coding information; Determining identifier types and usages; The DBMS_METADATA package; Tracing PL/SQL programs using DBMS_TRACE; Profiling PL/SQL code; Summary; Practice exercise; What is SQL injection?; Preventing SQL injection attacks; Testing the code for SQL injection flaws; Summary; Practice exercise; An overview of SQL Developer; Getting started with SQL Developer; SQL Developer 4.0 and 4.1 New Features; Summary
PL/SQL program fundamentals
Record Nr. UNINA-9910815849803321
Gupta Saurabh K.  
Birmingham : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced penetration testing for highly-secured environments
Advanced penetration testing for highly-secured environments
Autore Allen Lee (Information security specialist)
Edizione [Second edition /]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , [2016]
Descrizione fisica 1 online resource (428 p.)
Collana Community experience distilled
Soggetto topico Penetration testing (Computer security)
Computer networks - Security measures
Computer security - Management
Computer networks
Soggetto genere / forma Electronic books.
ISBN 1-78439-202-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Penetration Testing Essentials; Chapter 2: Preparing a Test Environment; Chapter 3: Assessment Planning; Chapter 4: Intelligence Gathering; Chapter 5: Network Service Attacks; Chapter 6: Exploitation; Chapter 7: Web Application Attacks; Chapter 8: Exploitation Concepts; Chapter 9: Post-Exploitation; Chapter 10: Stealth Techniques; Chapter 11: Data Gathering and Reporting; Chapter 12: Penetration Testing Challenge; Index; Methodology defined; Example methodologies
Abstract methodologySummary; Introducing VMware Workstation; Installing VMware Workstation; Network design; Understanding the default architecture; Creating the switches; Putting it all together; Summary; Introducing advanced penetration testing; Before testing begins; Planning for action; Installing LibreOffice; Effectively managing your test results; Introduction to the Dradis framework; Summary; Introducing reconnaissance; DNS recon; Gathering and validating domain and IP information; Using search engines to do your job for you; Creating network baselines with scanPBNJ; Summary
Web Application Attack and Audit framework (w3af)Introduction to browser plugin HackBar; Reader challenge; Summary; Buffer overflows - a refresher; 64-bit exploitation; Introducing vulnserver; Fuzzing tools included in Kali; Social Engineering Toolkit; Fast-Track; Reader challenge; Summary; Rules of Engagement; Data gathering, network analysis, and pillaging; Pivoting; Reader challenge; Summary; Lab preparation; Stealth scanning through the firewall; Now you see me, now you don't - avoiding IDS; Blending in; PfSense SSH logs; Looking at traffic patterns; Cleaning up compromised hosts
Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?; VMnet0; VMnet1; VMnet8; Folders
Installing Kali Linux
Record Nr. UNINA-9910466127703321
Allen Lee (Information security specialist)  
Birmingham : , : Packt Publishing, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced penetration testing for highly-secured environments
Advanced penetration testing for highly-secured environments
Autore Allen Lee (Information security specialist)
Edizione [Second edition /]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , [2016]
Descrizione fisica 1 online resource (428 p.)
Collana Community experience distilled
Soggetto topico Penetration testing (Computer security)
Computer networks - Security measures
Computer security - Management
Computer networks
ISBN 1-78439-202-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Penetration Testing Essentials; Chapter 2: Preparing a Test Environment; Chapter 3: Assessment Planning; Chapter 4: Intelligence Gathering; Chapter 5: Network Service Attacks; Chapter 6: Exploitation; Chapter 7: Web Application Attacks; Chapter 8: Exploitation Concepts; Chapter 9: Post-Exploitation; Chapter 10: Stealth Techniques; Chapter 11: Data Gathering and Reporting; Chapter 12: Penetration Testing Challenge; Index; Methodology defined; Example methodologies
Abstract methodologySummary; Introducing VMware Workstation; Installing VMware Workstation; Network design; Understanding the default architecture; Creating the switches; Putting it all together; Summary; Introducing advanced penetration testing; Before testing begins; Planning for action; Installing LibreOffice; Effectively managing your test results; Introduction to the Dradis framework; Summary; Introducing reconnaissance; DNS recon; Gathering and validating domain and IP information; Using search engines to do your job for you; Creating network baselines with scanPBNJ; Summary
Web Application Attack and Audit framework (w3af)Introduction to browser plugin HackBar; Reader challenge; Summary; Buffer overflows - a refresher; 64-bit exploitation; Introducing vulnserver; Fuzzing tools included in Kali; Social Engineering Toolkit; Fast-Track; Reader challenge; Summary; Rules of Engagement; Data gathering, network analysis, and pillaging; Pivoting; Reader challenge; Summary; Lab preparation; Stealth scanning through the firewall; Now you see me, now you don't - avoiding IDS; Blending in; PfSense SSH logs; Looking at traffic patterns; Cleaning up compromised hosts
Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?; VMnet0; VMnet1; VMnet8; Folders
Installing Kali Linux
Record Nr. UNINA-9910798229903321
Allen Lee (Information security specialist)  
Birmingham : , : Packt Publishing, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced penetration testing for highly-secured environments
Advanced penetration testing for highly-secured environments
Autore Allen Lee (Information security specialist)
Edizione [Second edition /]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , [2016]
Descrizione fisica 1 online resource (428 p.)
Collana Community experience distilled
Soggetto topico Penetration testing (Computer security)
Computer networks - Security measures
Computer security - Management
Computer networks
ISBN 1-78439-202-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Penetration Testing Essentials; Chapter 2: Preparing a Test Environment; Chapter 3: Assessment Planning; Chapter 4: Intelligence Gathering; Chapter 5: Network Service Attacks; Chapter 6: Exploitation; Chapter 7: Web Application Attacks; Chapter 8: Exploitation Concepts; Chapter 9: Post-Exploitation; Chapter 10: Stealth Techniques; Chapter 11: Data Gathering and Reporting; Chapter 12: Penetration Testing Challenge; Index; Methodology defined; Example methodologies
Abstract methodologySummary; Introducing VMware Workstation; Installing VMware Workstation; Network design; Understanding the default architecture; Creating the switches; Putting it all together; Summary; Introducing advanced penetration testing; Before testing begins; Planning for action; Installing LibreOffice; Effectively managing your test results; Introduction to the Dradis framework; Summary; Introducing reconnaissance; DNS recon; Gathering and validating domain and IP information; Using search engines to do your job for you; Creating network baselines with scanPBNJ; Summary
Web Application Attack and Audit framework (w3af)Introduction to browser plugin HackBar; Reader challenge; Summary; Buffer overflows - a refresher; 64-bit exploitation; Introducing vulnserver; Fuzzing tools included in Kali; Social Engineering Toolkit; Fast-Track; Reader challenge; Summary; Rules of Engagement; Data gathering, network analysis, and pillaging; Pivoting; Reader challenge; Summary; Lab preparation; Stealth scanning through the firewall; Now you see me, now you don't - avoiding IDS; Blending in; PfSense SSH logs; Looking at traffic patterns; Cleaning up compromised hosts
Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?; VMnet0; VMnet1; VMnet8; Folders
Installing Kali Linux
Record Nr. UNINA-9910813995003321
Allen Lee (Information security specialist)  
Birmingham : , : Packt Publishing, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced quantitative finance with C++ : create and implement mathemtical models in C++ using quatitaive finance / / Alonso Peña ; cover image by Ravi Kumar
Advanced quantitative finance with C++ : create and implement mathemtical models in C++ using quatitaive finance / / Alonso Peña ; cover image by Ravi Kumar
Autore Peña Alonso
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (124 p.)
Disciplina 332.015195
Collana Community Experience Distilled
Soggetto topico Finance - Mathematical models
C++ (Computer program language)
Soggetto genere / forma Electronic books.
ISBN 1-78216-723-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: What is Quantitative Finance?; Discipline 1 - finance (financial derivatives); Discipline 2 - mathematics; Discipline 3 - informatics (C++ programming); The Bento Box template; Summary; Chapter 2: Mathematical Models; Equity; Foreign exchange; Interest rates; Short rate models; Market models; Credit; Structural models; Intensity models; Summary; Chapter 3: Numerical Methods; The Monte Carlo simulation method; Algorithm of MC method; Example of MC method
Binomial Trees methodAlgorithm of the BT method; Example of the BT method; The Finite Difference method; Algorithm of FDM; Example of FD method; Summary; Chapter 4: Equity Derivatives in C++; Basic example - European Call; Advanced example - equity basket; Summary; Chapter 5: Foreign Exchange Derivatives with C++; Basic example - European FX Call (FX1); Advanced example - FX barrier option (FX2); Summary; Chapter 6: Interest Rate Derivatives with C++; Basic example - plain vanilla IRS (IR1); Advanced example - IRS with Cap (IR2); Summary; Chapter 7: Credit Derivatives with C++
Basic example - bankruptcy (CR1)Advanced example - CDS (CR2); Summary; Appendix A: C++ Numerical Libraries for Option Pricing; Numerical recipes; Financial numerical recipes; The QuantLib project; The Boost library; The GSL library; Appendix B: References; Index
Record Nr. UNINA-9910464624203321
Peña Alonso  
Birmingham, [England] : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav
Autore Yadav Ashish Kumar Tulsiram
Edizione [1.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (348 pages) : color illustrations
Disciplina 006.312
Collana Professional expertise distilled
Soggetto topico Big data
Data mining
Automatic data collection systems
Soggetto genere / forma Electronic books.
ISBN 1-78588-121-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910465289903321
Yadav Ashish Kumar Tulsiram  
Birmingham : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav
Autore Yadav Ashish Kumar Tulsiram
Edizione [1.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (348 pages) : color illustrations
Disciplina 006.312
Collana Professional expertise distilled
Soggetto topico Big data
Data mining
Automatic data collection systems
ISBN 1-78588-121-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910798456203321
Yadav Ashish Kumar Tulsiram  
Birmingham : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav
Autore Yadav Ashish Kumar Tulsiram
Edizione [1.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (348 pages) : color illustrations
Disciplina 006.312
Collana Professional expertise distilled
Soggetto topico Big data
Data mining
Automatic data collection systems
ISBN 1-78588-121-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910814716303321
Yadav Ashish Kumar Tulsiram  
Birmingham : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced UFT 12 for test engineers Cookbook : over 60 practical recipes to help you accomplish automation tasks using UFT 12 and VBScript / / Meir Bar-Tal, Jonathon Lee Wright ; cover image by Faiz F
Advanced UFT 12 for test engineers Cookbook : over 60 practical recipes to help you accomplish automation tasks using UFT 12 and VBScript / / Meir Bar-Tal, Jonathon Lee Wright ; cover image by Faiz F
Autore Bar-Tal Meir
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.437
Collana Quick answers to common problems
Soggetto topico Graphical user interfaces (Computer systems)
ISBN 1-84968-841-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Data-Driven Tests; Introduction; Creating a DataTable parameter; Retrieving data from a DataTable; Storing data in a DataTable; Importing an Excel file to a test; Exporting a DataTable; Parameterizing Test Object properties; Defining test cases using a DataTable; Storing data in the Environment object; Retrieving data from the Environment object; Reading values from an INI file; Using a configuration file to manage test environments
Using a global dictionary for fast shared data accessUsing a global dictionary for fast shared code access; Chapter 2: Testing Web Pages; Introduction; Checking if page links are broken; Deleting cookies; Managing multiple browser windows; Handling pop-up dialogs; Downloading a file using XMLHttp; Checking whether a website is up; Uploading a file using FTP; Identifying elements based on anchors; Synchronizing a test with a web page loading; Accessing web elements through DOM; Chapter 3: Testing XML and Database; Introduction; Establishing and closing a database connection
Using SQL queries programmaticallyUsing a database checkpoint; Using an XML checkpoint; Chapter 4: Method Overriding; Introduction; Overriding a Test Object method; Registering a method to all classes; Using method overriding to support object subtypes; Adding a new method to a class; Chapter 5: Object Identification; Introduction; Setting mandatory and assistive properties for a class; Using Descriptive Programming inline; Using the Description object; Using child objects; Using native properties for object identification; Identifying an object based on its parent
Chapter 6: Event and Exception HandlingIntroduction; Catching errors inside a function or subroutine; Creating and using a recovery scenario; Using a global dictionary for recovery; Chapter 7: Using Classes; Introduction; Implementing a class; Implementing a simple search class; Implementing a generic Login class; Implementing function pointers; Implementing a generic Iterator; Chapter 8: Utility and Reserved Objects; Introduction; Using global variables (Environment); Customizing mouse operations (DeviceReplay); Managing processes (SystemUtil); Measuring time (MercuryTimers)
Resolving file locations (PathFinder)Loading shared object repositories (RepositoriesCollection); Loading and creating XML documents (XMLUtil); Drawing a rectangle on the screen with Win32 API methods (Extern); Verifying binary file contents (FileCompare); Implementing a custom reserved object; Using remote objects; Utility statements; Chapter 9: Windows Script Host (WSH); Introduction; Reading a key from the Windows® system registry; Writing a key to the Windows® system registry; Deleting a key from the Windows® system registry; Running a process using the Windows® system shell
Chapter 10: Frameworks
Record Nr. UNINA-9910787906303321
Bar-Tal Meir  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui