語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Application development and designco...
~
Information Resources Management Association,
Application development and designconcepts, methodologies, tools, and applications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Application development and design/ Information Resources Management Association, editor.
其他題名:
concepts, methodologies, tools, and applications /
出版者:
Hershey, Pennsylvania :IGI Global, : [2017],
面頁冊數:
1 online resource (3 v.)
提要註:
This three volume set is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as software design, mobile applications, and web applications.
標題:
Application software - Development. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-3422-8
ISBN:
9781522534235 (ebook)
Application development and designconcepts, methodologies, tools, and applications /
Application development and design
concepts, methodologies, tools, and applications /[electronic resource] :Information Resources Management Association, editor. - Hershey, Pennsylvania :IGI Global,[2017] - 1 online resource (3 v.)
Includes bibliographical references and index.
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Basic concepts on RIAs ; Chapter 2. Software design ; Chapter 3. Ten years of experience with agile and model-driven software development in a legacyplatform ; Chapter 4. Quality attributes for mobile applications ; Chapter 5. An overview of RIAs development tools ; Chapter 6. Teaching software architecture in industrial and academic contexts: similarities and differences ; Chapter 7. An agile architecture for a legacy enterprise IT system -- Section 2. Development and design methodologies. Chapter 8. Method using command abstraction library for iterative testing security of web applications ; Chapter 9. Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud ; Chapter 10. Recovery and refinement of business process models for web applications ; Chapter 11. Performance evaluation of public IaaS clouds for Web 2.0 applications using CloudStone benchmark ; Chapter 12. An empirical study of the effect of design patterns on class structural quality ; Chapter 13. Attaining semantic enterprise interoperability through ontology architectural patterns ; Chapter 14. Countering cross-site scripting in web-based applications ; Chapter 15. Developing security enabled applications for web commerce ; Chapter 16. Usability software engineering testing experimentation for Android-based web applications: usability engineering testing for online learning management system ; Chapter 17. A method to design a software process architecture in a multimodel environment: an overview ; Chapter 18. An alternative threat model-based approach for security testing ; Chapter 19. An integrated development environment for RFID applications ; Chapter 20. A roadmap on awareness of others in accessible collaborative rich Internet applications ; Chapter 21. A generic architectural model approach for efficient utilization of patterns: application in the mobile domain -- Volume II. Chapter 22. User interface design in isolation from underlying code and environment ; Chapter 23. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project ; Chapter 24. Firefox OS ecosystem: ambitions and limits of an open source operating system for mobile devices ; Chapter 25. Voice application generator platform for real time multimedia vehicle sensor based notifications ; Chapter 26. Design-based research with AGILE sprints to produce MUVES in vocational education ; Chapter 27. Development of data mining driven software tool to forecast the customer requirement for quality function deployment ; Chapter 28. HOD2MLC: hybrid ontology design and development model with lifecycle ; Chapter 29. Component based model driven development: an approach for creating mobile web applications from design models ; Chapter 30. Aspect-oriented programming (AOP) support on RIAs development ; Chapter 31. The development of an optimised metadata application profile ; Chapter 32. A role of enterprise service bus in building web services ; Chapter 33. Evaluation methods for e-learning applications in terms of user satisfaction and interface usability ; Chapter 34. Fuzzy rule-based vulnerability assessment framework for web applications ; Chapter 35. Design of the while listening activities in interactive multimedia listening software ; Chapter 36. Quality assurance in agile software development -- Section 3. Tools and technologies. Chapter 37. A web backtracking technique for fraud detection in financial applications ; Chapter 38. Auditing defense against XSS worms in online social network-based web applications ; Chapter 39. BDS: browser dependent XSS sanitizer ; Chapter 40. The impact of media richness on the usage of Web 2.0 services for knowledge transfer ; Chapter 41. Towards automation of IoT analytics: an ontology-driven approach ; Chapter 42. Information theoretic XSS attack detection in web applications ; Chapter 43. Variant logic for model driven applications -- Volume III. Chapter 44. Optimized and distributed variant logic for model-driven applications ; Chapter 45. An invariant-based approach for detecting attacks against data in web applications ; Chapter 46. Characterizing PaaS solutions enabling cloud federations ; Chapter 47. Combining static code analysis and machine learning for automatic detection of security vulnerabilities in mobile apps ; Chapter 48. An empirical study of usability metric for websites -- Section 4. Utilization and applications. Chapter 49. Quantitative evaluation of Web2.0 application ; Chapter 50. Requirement prioritization of complex Web 2.0 application based on effects on regression ; Chapter 51. Leveraging Web 2.0 for online learning testing: a hybrid approach ; Chapter 52. Prevention of SQL injection attacks in web browsers ; Chapter 53. Web service evaluation using probabilistic models ; Chapter 54. Analysis of data validation techniques for online banking services ; Chapter 55. Adding more agility to software product line methods: a feasibility study on its customization using agile practices ; Chapter 56. Web application vulnerabilities and their countermeasures ; Chapter 57. Bespoke mobile application development: facilitating transition of foundation students to higher education ; Chapter 58. Investigating the use of Web 2.0 technologies and their presence in Saudi government agencies' websites ; Chapter 59. Mobile health applications assisting patients with chronic diseases: examples from asthma care ; Chapter 60. Web 2.0 mash-up system for real time data visualisation and analysis using OSS -- Section 5. Organizational and social implications. Chapter 61. Web 2.0 and social media in today's business world ; Chapter 62. Success in the Web 2.0 ecosystem: exploring the state and determinants in Indian businesses ; Chapter 63. A simple solution to prevent parameter tampering in web applications ; Chapter 64. Common problems faced when developing applications for mobile devices ; Chapter 65. Reviewing the security features in contemporary security policies and models for multiple platforms ; Chapter 66. Factors affecting the adoption of entertainment mobile applications in Iran: an integrated framework -- Section 6. Emerging trends. Chapter 67. Adaptive future Internet applications: opportunities and challenges for adaptive web servicestechnology ; Chapter 68. Degree of similarity of web applications ; Chapter 69. New trends on RIAs development.
Restricted to subscribers or individual electronic text purchasers.
This three volume set is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as software design, mobile applications, and web applications.
ISBN: 9781522534235 (ebook)Subjects--Topical Terms:
382630
Application software
--Development.
LC Class. No.: QA76.76.A65 / A648 2018e
Dewey Class. No.: 005.3
Application development and designconcepts, methodologies, tools, and applications /
LDR
:07862nam a2200265 a 4500
001
314579
003
IGIG
005
20181029102157.0
006
m o d
007
cr cn
008
181108t20172018pau fob 001 0 eng d
020
$a
9781522534235 (ebook)
020
$a
9781522534228 (hardcover)
035
$a
(OCoLC)1002050577
035
$a
1071025368
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.76.A65
$b
A648 2018e
082
0 4
$a
005.3
$2
23
245
0 0
$a
Application development and design
$h
[electronic resource] :
$b
concepts, methodologies, tools, and applications /
$c
Information Resources Management Association, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2017]
300
$a
1 online resource (3 v.)
504
$a
Includes bibliographical references and index.
505
0
$a
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Basic concepts on RIAs ; Chapter 2. Software design ; Chapter 3. Ten years of experience with agile and model-driven software development in a legacyplatform ; Chapter 4. Quality attributes for mobile applications ; Chapter 5. An overview of RIAs development tools ; Chapter 6. Teaching software architecture in industrial and academic contexts: similarities and differences ; Chapter 7. An agile architecture for a legacy enterprise IT system -- Section 2. Development and design methodologies. Chapter 8. Method using command abstraction library for iterative testing security of web applications ; Chapter 9. Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud ; Chapter 10. Recovery and refinement of business process models for web applications ; Chapter 11. Performance evaluation of public IaaS clouds for Web 2.0 applications using CloudStone benchmark ; Chapter 12. An empirical study of the effect of design patterns on class structural quality ; Chapter 13. Attaining semantic enterprise interoperability through ontology architectural patterns ; Chapter 14. Countering cross-site scripting in web-based applications ; Chapter 15. Developing security enabled applications for web commerce ; Chapter 16. Usability software engineering testing experimentation for Android-based web applications: usability engineering testing for online learning management system ; Chapter 17. A method to design a software process architecture in a multimodel environment: an overview ; Chapter 18. An alternative threat model-based approach for security testing ; Chapter 19. An integrated development environment for RFID applications ; Chapter 20. A roadmap on awareness of others in accessible collaborative rich Internet applications ; Chapter 21. A generic architectural model approach for efficient utilization of patterns: application in the mobile domain -- Volume II. Chapter 22. User interface design in isolation from underlying code and environment ; Chapter 23. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project ; Chapter 24. Firefox OS ecosystem: ambitions and limits of an open source operating system for mobile devices ; Chapter 25. Voice application generator platform for real time multimedia vehicle sensor based notifications ; Chapter 26. Design-based research with AGILE sprints to produce MUVES in vocational education ; Chapter 27. Development of data mining driven software tool to forecast the customer requirement for quality function deployment ; Chapter 28. HOD2MLC: hybrid ontology design and development model with lifecycle ; Chapter 29. Component based model driven development: an approach for creating mobile web applications from design models ; Chapter 30. Aspect-oriented programming (AOP) support on RIAs development ; Chapter 31. The development of an optimised metadata application profile ; Chapter 32. A role of enterprise service bus in building web services ; Chapter 33. Evaluation methods for e-learning applications in terms of user satisfaction and interface usability ; Chapter 34. Fuzzy rule-based vulnerability assessment framework for web applications ; Chapter 35. Design of the while listening activities in interactive multimedia listening software ; Chapter 36. Quality assurance in agile software development -- Section 3. Tools and technologies. Chapter 37. A web backtracking technique for fraud detection in financial applications ; Chapter 38. Auditing defense against XSS worms in online social network-based web applications ; Chapter 39. BDS: browser dependent XSS sanitizer ; Chapter 40. The impact of media richness on the usage of Web 2.0 services for knowledge transfer ; Chapter 41. Towards automation of IoT analytics: an ontology-driven approach ; Chapter 42. Information theoretic XSS attack detection in web applications ; Chapter 43. Variant logic for model driven applications -- Volume III. Chapter 44. Optimized and distributed variant logic for model-driven applications ; Chapter 45. An invariant-based approach for detecting attacks against data in web applications ; Chapter 46. Characterizing PaaS solutions enabling cloud federations ; Chapter 47. Combining static code analysis and machine learning for automatic detection of security vulnerabilities in mobile apps ; Chapter 48. An empirical study of usability metric for websites -- Section 4. Utilization and applications. Chapter 49. Quantitative evaluation of Web2.0 application ; Chapter 50. Requirement prioritization of complex Web 2.0 application based on effects on regression ; Chapter 51. Leveraging Web 2.0 for online learning testing: a hybrid approach ; Chapter 52. Prevention of SQL injection attacks in web browsers ; Chapter 53. Web service evaluation using probabilistic models ; Chapter 54. Analysis of data validation techniques for online banking services ; Chapter 55. Adding more agility to software product line methods: a feasibility study on its customization using agile practices ; Chapter 56. Web application vulnerabilities and their countermeasures ; Chapter 57. Bespoke mobile application development: facilitating transition of foundation students to higher education ; Chapter 58. Investigating the use of Web 2.0 technologies and their presence in Saudi government agencies' websites ; Chapter 59. Mobile health applications assisting patients with chronic diseases: examples from asthma care ; Chapter 60. Web 2.0 mash-up system for real time data visualisation and analysis using OSS -- Section 5. Organizational and social implications. Chapter 61. Web 2.0 and social media in today's business world ; Chapter 62. Success in the Web 2.0 ecosystem: exploring the state and determinants in Indian businesses ; Chapter 63. A simple solution to prevent parameter tampering in web applications ; Chapter 64. Common problems faced when developing applications for mobile devices ; Chapter 65. Reviewing the security features in contemporary security policies and models for multiple platforms ; Chapter 66. Factors affecting the adoption of entertainment mobile applications in Iran: an integrated framework -- Section 6. Emerging trends. Chapter 67. Adaptive future Internet applications: opportunities and challenges for adaptive web servicestechnology ; Chapter 68. Degree of similarity of web applications ; Chapter 69. New trends on RIAs development.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
$a
This three volume set is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as software design, mobile applications, and web applications.
650
0
$a
Application software
$x
Development.
$3
382630
710
2
$a
Information Resources Management Association,
$e
issuing body.
$3
407768
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-3422-8
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入