Карточка | Таблица | RUSMARC | |
Application development and design: concepts, methodologies, tools, and applications / Information Resources Management Association, editor. — 1 online resource (3 volumes (1611, xxix pages)). — <URL:http://elib.fa.ru/ebsco/1576904.pdf>.Дата создания записи: 17.08.2017 Тематика: Application software — Development.; Application software — Development.; COMPUTERS / Programming Languages / JavaScript Коллекции: EBSCO Разрешенные действия: –
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа: Анонимные пользователи Сеть: Интернет |
Аннотация
"This book is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as software design, mobile applications, and web applications"--.
Права на использование объекта хранения
Место доступа | Группа пользователей | Действие | ||||
---|---|---|---|---|---|---|
Локальная сеть Финуниверситета | Все | |||||
Интернет | Читатели | |||||
Интернет | Анонимные пользователи |
Оглавление
- Title Page
- Copyright Page
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Preface
- Section 1: Fundamental Concepts and Theories
- Chapter 1: Basic Concepts on RIAs
- Chapter 2: Software Design
- Chapter 3: Ten Years of Experience with Agile and Model-Driven Software Development in a Legacy Platform
- Chapter 4: Quality Attributes for Mobile Applications
- Chapter 5: An Overview of RIAs Development Tools
- Chapter 6: Teaching Software Architecture in Industrial and Academic Contexts
- Chapter 7: An Agile Architecture for a Legacy Enterprise IT System
- Section 2: Development and Design Methodologies
- Chapter 8: Method Using Command Abstraction Library for Iterative Testing Security of Web Applications
- Chapter 9: Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud
- Chapter 10: Recovery and Refinement of Business Process Models for Web Applications
- Chapter 11: Performance Evaluation of Public IaaS Clouds for Web 2.0 Applications Using CloudStone Benchmark
- Chapter 12: An Empirical Study of the Effect of Design Patterns on Class Structural Quality
- Chapter 13: Attaining Semantic Enterprise Interoperability Through Ontology Architectural Patterns
- Chapter 14: Countering Cross-Site Scripting in Web-Based Applications
- Chapter 15: Developing Security Enabled Applications for Web Commerce
- Chapter 16: Usability Software Engineering Testing Experimentation for Android-Based Web Applications
- Chapter 17: A Method to Design a Software Process Architecture in a Multimodel Environment
- Chapter 18: An Alternative Threat Model-Based Approach for Security Testing
- Chapter 19: An Integrated Development Environment for RFID Applications
- Chapter 20: A Roadmap on Awareness of Others in Accessible Collaborative Rich Internet Applications
- Chapter 21: A Generic Architectural Model Approach for Efficient Utilization of Patterns
- Chapter 22: User Interface Design in Isolation from Underlying Code and Environment
- Chapter 23: Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms
- Chapter 24: Firefox OS Ecosystem
- Chapter 25: Voice Application Generator Platform for Real Time Multimedia Vehicle Sensor Based Notifications
- Chapter 26: Design-Based Research with AGILE Sprints to Produce MUVES in Vocational Education
- Chapter 27: Development of Data Mining Driven Software Tool to Forecast the Customer Requirement for Quality Function Deployment
- Chapter 28: HOD2MLC
- Chapter 29: Component Based Model Driven Development
- Chapter 30: Aspect-Oriented Programming (AOP) Support on RIAs Development
- Chapter 31: The Development of an Optimised Metadata Application Profile
- Chapter 32: A Role of Enterprise Service Bus in Building Web Services
- Chapter 33: Evaluation Methods for E-Learning Applications in Terms of User Satisfaction and Interface Usability
- Chapter 34: Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications
- Chapter 35: Design of the While Listening Activities in Interactive Multimedia Listening Software
- Chapter 36: Quality Assurance in Agile Software Development
- Section 3: Tools and Technologies
- Chapter 37: A Web Backtracking Technique for Fraud Detection in Financial Applications
- Chapter 38: Auditing Defense Against XSS Worms in Online Social Network-Based Web Applications
- Chapter 39: BDS
- Chapter 40: The Impact of Media Richness on the Usage of Web 2.0 Services for Knowledge Transfer
- Chapter 41: Towards Automation of IoT Analytics
- Chapter 42: Information Theoretic XSS Attack Detection in Web Applications
- Chapter 43: Variant Logic for Model Driven Applications
- Chapter 44: Optimized and Distributed Variant Logic for Model-Driven Applications
- Chapter 45: An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications
- Chapter 46: Characterizing PaaS Solutions Enabling Cloud Federations
- Chapter 47: Combining Static Code Analysis and Machine Learning for Automatic Detection of Security Vulnerabilities in Mobile Apps
- Chapter 48: An Empirical Study of Usability Metric for Websites
- Section 4: Utilization and Applications
- Chapter 49: Quantitative Evaluation of Web2.0 Application
- Chapter 50: Requirement Prioritization of Complex Web 2.0 Application Based on Effects on Regression Testing
- Chapter 51: Leveraging Web 2.0 for Online Learning
- Chapter 52: Prevention of SQL Injection Attacks in Web Browsers
- Chapter 53: Web Service Evaluation Using Probabilistic Models
- Chapter 54: Analysis of Data Validation Techniques for Online Banking Services
- Chapter 55: Adding More Agility to Software Product Line Methods
- Chapter 56: Web Application Vulnerabilities and Their Countermeasures
- Chapter 57: Bespoke Mobile Application Development
- Chapter 58: Investigating the Use of Web 2.0 Technologies and Their Presence in Saudi Government Agencies' Websites
- Chapter 59: Mobile Health Applications Assisting Patients With Chronic Diseases
- Chapter 60: Web 2.0 Mash-Up System for Real Time Data Visualisation and Analysis Using OSS
- Section 5: Organizational and Social Implications
- Chapter 61: Web 2.0 and Social Media in Today's Business World
- Chapter 62: Success in the Web 2.0 Ecosystem
- Chapter 63: A Simple Solution to Prevent Parameter Tampering in Web Applications
- Chapter 64: Common Problems Faced When Developing Applications for Mobile Devices
- Chapter 65: Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
- Chapter 66: Factors Affecting the Adoption of Entertainment Mobile Applications in Iran
- Section 6: Emerging Trends
- Chapter 67: Adaptive Future Internet Applications
- Chapter 68: Degree of Similarity of Web Applications
- Chapter 69: New Trends on RIAs Development
- Index
Статистика использования
Количество обращений: 0
За последние 30 дней: 0 Подробная статистика |