![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Internet languages > General
This thoroughly class tested text and online tutorial gives a complete introduction to the essentials of the XML standard. It will teach students how to apply web technologies to develop XML based web applications. Through the book, the student will build applications that work together to construct interesting and workable web applications.
The divide between UX and Web development can be stifling. "Bridging UX and Web Development "prepares you to break down those walls by teaching you how to integrate with your team s developers. You examine the process from their perspective, discovering tools and coding principles that will help you bridge the gap between design and implementation. With these tried and true approaches, you ll be able to capitalize on a more productive work environment. Whether you re a novice UX professional finding your place in
the software industry and looking to nail down your technical
skills, or a seasoned UI designer looking for practical information
on how to integrate your team with development, this is the
must-have resource for your UX library.
Software Evolution with UML and XML provides a forum where expert insights are presented on the subject of linking three current phenomena: software evolution, UML and XML. Software evolution and reengineering are a real problem in the software industry; various attempts have been made in these areas and there is still room for improvement. Tackling evolution with the help of UML and XML can be very beneficial to the software community, especially as the cost of software evolution makes up a considerable proportion, sometimes even 70-80 per cent, of the total budget of a software system. Software Evolution with UML and XML not only investigates the potential powerful applications of two popularly used languages, UML and XML, in the field of software evolution, but also discovers what will happen when these three are linked to work together.
This innovative monograph focuses on a contemporary form of computer-based literature called 'literary hypertext', a digital, interactive, communicative form of new media writing. Canonizing Hypertext combines theoretical and hermeneutic investigations with empirical research into the motivational and pedagogic possibilities of this form of literature. It focuses on key questions for literary scholars and teachers: How can literature be taught in such a way as to make it relevant for an increasingly hypermedia-oriented readership? How can the rapidly evolving new media be integrated into curricula that still seek to transmit traditional literary competence? How can the notion of literary competence be broadened to take into account these current trends? This study, which argues for hypertexts integration in the literary canon, offers a critical overview of developments in hypertext theory, an exemplary hypertext canon and an evaluation of possible classroom applications.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.
"Blue Pelican Java" is a somewhat unusual high school computer science textbook. Most computer science texts will begin with a section on the history of computers followed with a flurry of definitions that are just "so many words" to the average student. The approach here is to first give the student some experience upon which to hang the definitions that come later. The usual practice of introducing classes and objects is deferred until the student has a firm grasp of the fundamentals (loops, decision structures, etc). Thus, the beginning student is not overwhelmed by the simultaneous introduction of OOPs and the fundamentals. The book includes plenty of exercises (many in "contest" form), programming projects, and a huge appendix.
Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
This book provides extensive insight into the possibilities and challenges of XML in building new information management solutions in networked organizations. After a brief introduction to Web communication features and XML fundamentals, the book examines the benefits of adopting XML and illustrates various types of XML use: XML in document management; XML for data-centric and multimedia components; XML as a format for metadata, including metadata for the Semantic Web; and XML in support of data interchange between software applications and among organizations. The challenges of adopting XML in large-scale information management are also discussed. In addition, applications across a broad spectrum are examined and numerous case studies pertaining to the adoption of XML are presented. The book is particularly suitable for courses offered in Information Studies, Information Systems, or Information Technology. It also serves as an excellent practical guide for professionals in information management and provides important support material for courses in Computer Science and in Business.
The Internet has become the major form of map delivery. The current presentation of maps is based on the use of online services. This session examines developments related to online methods of map delivery, particularly Application Programmer Interfaces (APIs) and MapServices in general, including Google Maps API and similar services. Map mashups have had a major impact on how spatial information is presented. The advantage of using a major online mapping site is that the maps represent a common and recognizable representation of the world. Overlaying features on top of these maps provides a frame of reference for the map user. A particular advantage for thematic mapping is the ability to spatially reference thematic data.
Spring Security in Action shows you how to use Spring Security to create applications you can be confident will withstand even the most dedicated attacks. Starting with essential "secure by design" principles, you'll learn common software vulnerabilities and how to avoid them right from the design stage. Through hands-on projects, you'll learn to manage system users, configure secure endpoints, and use, OAuth2 and OpenID Connect for authentication and authorization. As you go, you'll learn how to adapt Spring Security to different architectures, such as configuring Spring Security for Reactive applications and container-based applications orchestrated with Kubernetes. When you're done, you'll have a complete understanding of how to use Spring Security to protect your Java enterprise applications from common threats and attacks. Key Features * The principles of secure by design * The architecture of Spring Security * Spring Security contracts for password encoding, cryptography, and authentication * Applying Spring Security to different architecture styles For experienced Java developers with knowledge of other Spring tools. About the technology Your applications, along with the data they manage, are one of your organization's most valuable assets. No company wants their applications easily cracked by malicious attackers or left vulnerable by avoidable errors. The specialized Spring Security framework reduces the time and manpower required to create reliable authorization, authentication, and other security features for your Java enterprise software. Thanks to Spring Security, you can easily bake security into your applications, from design right through to implementation. Laurentiu Spilca is a dedicated development lead and trainer at Endava, where he leads the development of a project in the financial market of European Nordic countries. He has over ten years experience as a Java developer and technology teacher.
Good user interface design isn t just about aesthetics or using
the latest technology. Designers also need to ensure their product
is offering an optimal user experience. This requires user needs
analysis, usability testing, persona creation, prototyping, design
sketching, and evaluation through-out the design and development
process. "User Experience Re-Mastered" takes tried and tested
material from best-selling books in Morgan Kaufmann s Series in
Interactive Technologies and presents it in typical project
framework. Chauncey Wilson guides the reader through each chapter,
introducing each stage, explaining its context, and emphasizing its
significance in the user experience lifecycle. This gives readers
practical and easily applicable direction for creating web sites
and web applications that ensure the ultimate experience. A must
read for students, those new to the field, and anyone designing
interfaces for people *A guided, hands-on tour through the process of creating the ultimate user experience - from testing, to prototyping, to design, to evaluation *Provides tried and tested material from best sellers in Morgan Kaufmann s Series in Interactive Technologies, including leaders in the field such as Bill Buxton and Jakob Nielsen *Features never before seen material from Chauncey Wilson s forthcoming, and highly anticipated Handbook for User Centered Design"
Visual Knowledge Modeling for Semantic Web Technologies: Models and Ontologies aims to make visual knowledge modeling available to individuals as an intellectual method and a set of tools at different levels of formalization. It aims to provide to its readers a simple, yet powerful visual language to structure their thoughts, analyze information, transform it to personal knowledge, and communicate information to support knowledge acquisition in collaborative activities.
Austin Sincock provides step-by-step real-world examples for developing Enterprise Java applications on SAP. His is the first title that uses open-source software to help developers learn and use Java for SAP. Bridges the gap between SAP's language ABAP and object-oriented Java Provides a complete look at SAP's Java connector, JCo Demonstrates graphical application development for SAP using Java's Swing libraries Shows how to deploy and build Java applications on the Tomcat Java application server Teaches how to deploy the Java-based HypersonicSQL database, use SQL to populate the database, and tie the external database into an SAP system with Java
Correcting the Great Mistake People often mistake one thing for another. That's human nature. However, one would expect the leaders in a particular ?eld of endeavour to have superior ab- ities to discriminate among the developments within that ?eld. That is why it is so perplexing that the technology elite - supposedly savvy folk such as software developers, marketers and businessmen - have continually mistaken Web-based graphics for something it is not. The ?rst great graphics technology for the Web, VRML, has been mistaken for something else since its inception. Viewed variously as a game system, a format for architectural walkthroughs, a platform for multi-user chat and an augmentation of reality, VRML may qualify as the least understood invention in the history of inf- mation technology. Perhaps it is so because when VRML was originally introduced it was touted as a tool for putting the shopping malls of the world online, at once prosaic and horrifyingly mundane to those of us who were developing it. Perhaps those ?rst two initials,"VR,"created expectations of sprawling, photorealistic f- tasy landscapes for exploration and play across the Web. Or perhaps the magnitude of the invention was simply too great to be understood at the time by the many, ironically even by those spending the money to underwrite its development. Regardless of the reasons, VRML suffered in the mainstream as it was twisted to meet unintended ends and stretched far beyond its limitations.
DSSSL (Document Style Semantics and Specification Language) is an ISO standard (ISO/IEC 10179: 1996) published in the year 1996. DSSSL is a standard of the SGML family (Standard Generalized Markup Language, ISO 8879:1986), whose aim is to establish a processing model for SGML documents. For a good understanding of the SGML standard, many books exist including Author's guide[BryanI988] and The SGML handbook[GoldfarbI990]. A DSSSL document is an SGML document, written with the same rules that guide any SGML document. The structure of a DSSSL document is explained in Chapter 2. DSSSL is based, in part, on scheme, a standard functional programming language. The DSSSL subset of scheme along with the procedures supported by DSSSL are explained in Chapter 3. The DSSSL standard starts with the supposition of a pre-existing SGML document, and offers a series of processes that can be performed on it: * Groves The first process that is performed on an SGML document in DSSSL is always the analysis of the document and the creation of a grove. The DSSSL standard shares many common characteristics with another standard of the SGML family, HyTime (ISO/IEC 10744). These standards were developed in parallel, and their developers designed a common data model, the grove, that would support the processing needs of each standard.
This book develops a crowdsourced sensor-cloud service composition framework taking into account spatio-temporal aspects. This book also unfolds new horizons to service-oriented computing towards the direction of crowdsourced sensor data based applications, in the broader context of Internet of Things (IoT). It is a massive challenge for the IoT research field how to effectively and efficiently capture, manage and deliver sensed data as user-desired services. The outcome of this research will contribute to solving this very important question, by designing a novel service framework and a set of unique service selection and composition frameworks. Delivering a novel service framework to manage crowdsourced sensor data provides high-level abstraction (i.e., sensor-cloud service) to model crowdsourced sensor data from functional and non-functional perspectives, seamlessly turning the raw data into "ready to go" services. A creative indexing model is developed to capture and manage the spatio-temporal dynamism of crowdsourced service providers. Delivering novel frameworks to compose crowdsourced sensor-cloud services is vital. These frameworks focuses on spatio-temporal composition of crowdsourced sensor-cloud services, which is a new territory for existing service oriented computing research. A creative failure-proof model is also designed to prevent composition failure caused by fluctuating QoS. Delivering an incentive model to drive the coverage of crowdsourced service providers is also vital. A new spatio-temporal incentive model targets changing coverage of the crowdsourced providers to achieve demanded coverage of crowdsourced sensor-cloud services within a region. The outcome of this research is expected to potentially create a sensor services crowdsourcing market and new commercial opportunities focusing on crowdsourced data based applications. The crowdsourced community based approach adds significant value to journey planning and map services thus creating a competitive edge for a technologically-minded companies incentivizing new start-ups, thus enabling higher market innovation. This book primarily targets researchers and practitioners, who conduct research work in service oriented computing, Internet of Things (IoT), smart city and spatio-temporal travel planning, as well as advanced-level students studying this field. Small and Medium Entrepreneurs, who invest in crowdsourced IoT services and journey planning infrastructures, will also want to purchase this book.
The Stellent Content Server has a flexible and highly extensible service-oriented architecture. It is relatively easy to develop custom applications with it, or make modifications to the existing interface. However, there has never been a good manual on how to make such applications. Thata (TM)s where this book comes in: to help administrators and web developers create custom applications with the Content Server. It contains step-by-step instructions on how to create many different types of applications, including simple business forms, new web interfaces for existing services, new skins, and new functionality with custom Java code. It also contains detailed reference material for the inner workings of the Content Server. Youa (TM)ll need this vital resource when creating custom Stellent applications, and youa (TM)ll find this information only in this complete guide to Stellent Content Server.
The pervasiveness of the Internet has had a significant impact on global politics, economics, and culture. To create a truly effective product in such a saturated digital environment, developers must study what has come before and how they can utilize existing tools to even greater effect. Evaluating Websites and Web Services: Interdisciplinary Perspectives on User Satisfaction explores some of the various approaches to the study and assessment of Internet technologies, providing scholars, researchers, developers, and professionals with critical knowledge and an interdisciplinary perspective on e-services in a variety of functional areas, from government and commerce to social media and education.
Adding internet access to embedded systems opens up a whole new world of capabilities. For example, a remote data logging system could automatically send data via the internet and be reconfigured - such as to log new types of data or to measure at different intervals - by commands sent over the internet from any computer or device with internet access. Embedded internet and internet appliances are the focus of great attention in the computing industry, as they are seen as the future of computing, but the design of such devices presents many technical challenges.;This book describes how to design, build and program embedded systems with internet access, giving special attention to sensors and actuators which gather data for transmission over the internet or execute commands sent by the internet, It shows how to build sensors and control devices that connect to the "tiny internet interface" (TINI) and explains how to write programs that control them in Java. Several design case histories are given, including weather monitoring stations, communications centres, automation systems, and data acquisitions systems. The authors discuss how these technologies work and where to get detailed specifications, and they provide ideas for the reader to pursue beyond the book. The accompanying CD-ROM includes Java source code for all the applications described in the book, and an electronic version of the text.
Java Programmers, Preprare for Microsoft's .NET initiative while
enhancing your repertoire and marketability with C# for Java
Progammers
JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. The JR implementation executes on UNIX-based systems (Linux, Mac OS X, and Solaris) and Windows-based systems. It is available free from the JR webpage. This book describes the JR programming language and illustrates how it can be used to write concurrent programs for a variety of applications. This text presents numerous small and large example programs. The source code for all programming examples and the given parts of all programming exercises are available on the JR webpage. Dr. Ronald A. Olsson and Dr. Aaron W. Keen, the authors of this text, are the designers and implementors of JR.
"An Introduction to XML Query Processing and Keyword Search" systematically and comprehensively covers the latest advances in XML data searching. It presents an extensive overview of the current query processing and keyword search techniques on XML data, including XML labeling schemes, indexing, processing on order and un-order XML tree patterns, XML query optimization, results estimation, and XML keyword searches, which are elaborated in separate chapters. Graduate students and researchers in the field of XML data searching will find this book an invaluable resource. Prof. Jiaheng Lu is an associate professor at Renmin University of China's School of Information.
Semantic Web services promise to automate tasks such as discovery, mediation, selection, composition, and invocation of services, enabling fully flexible automated e-business. Their usage, however, still requires a significant amount of human intervention due to the lack of support for a machine-processable description. In this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description of the various aspects related to Semantic Web services, such as the static background knowledge in the form of ontologies, the functional description of the service, and the behavioral description of the service. They introduce the Web Service Modeling Language (WSML), which provides means for describing the functionality and behavior of Web services, as well as the underlying business knowledge, in the form of ontologies, with a conceptual grounding in the Web Service Modeling Ontology. Academic and industrial researchers as well as professionals will find a comprehensive overview of the concepts and challenges in the area of Semantic Web services, the Web Services Modeling Language and its relation to the Web Services Modeling Ontology, and an in-depth treatment of both enabling technologies and theoretical foundations.
The Handbook of Research on Non-Functional Properties for Service-Oriented Systems: Future Directions unites different approaches and methods used to describe, map, and use non-functional properties and service level agreements. This handbook, which will be useful for both industry and academia, provides an overview of existing research and also sets clear directions for future work. |
You may like...
Decision Aid Models for Disaster…
Begona Vitoriano, Javier Montero, …
Hardcover
Software Quality Control, Error…
Judith Clapp, Saul F. Stanten, …
Hardcover
R1,241
Discovery Miles 12 410
Forecast Error Correction using Dynamic…
Sivaramakrishnan Lakshmivarahan, John M. Lewis, …
Hardcover
R3,711
Discovery Miles 37 110
IUTAM Symposium on Recent Developments…
Nguyen Van Dao, E.J. Kreuzer
Hardcover
R4,199
Discovery Miles 41 990
|