![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
With Beginning Android Web Apps Development, you'll learn how to apply HTML5, CSS3, JavaScript, Ajax and other Web standards for use on the Android mobile platform, by building a variety of fun and visually stimulating games and other web applications If you've done some basic web development, and you want to build your skills to create exceptional web apps, you'll find everything you seek in the discussions and examples in this book. Each application you'll build in Beginning Android Web Application Development will show you solutions that you can apply to many of your own projects. Each example shares techniques and coding solutions that will inspire your own work. You'll learn how to tie your Android apps into Twitter through two apps that you'll build: Who's that Tweet? , a quiz game based on celebrity accounts, and I Love Ham, a coding investigation into search phrases and rhyming. Your Android web app development skills will then proceed in another direction, as you discover the power of HTML5 in two game apps: Scavenger Hunt, which introduces you to the HTML5 GPS location API, and Spies , a location-based application that shows you how to use CSS3, Ajax, and HTML5 within multi-player environments. You'll also create an Android web application which checks the arrival time of buses and light-rails through the use of Portland, Oregon's open Tri-Met data API This app is a great template for other apps you may want to build in the future, and showcases the important techniques for incorporating cloud-based apps into web games. After reading Beginning Android Web Apps Development, you will have built real apps and developed along the way the skills you'll need to create highly interactive, professional web applications...and, your journey will be engaging and enjoyable What you'll learn * Coding solutions that you can use time and again in your own Android web apps * Key methods and techniques for contemporary Android web app development * How to take full advantage of CSS3 in the mobile environment and how to handle a multitude of screen resolutions * How to build feature-rich user interfaces with navigation, colors, and professional styling * How to add audio and video for highly interactive sites * How to optimize Ajax within your site * How to access and use the HTML location API * How to integrate JavaScript and JavaScript frameworks into your site Who this book is for For anyone starting out in Android web app development who wants to build feature-rich web apps that are optimized for the Android mobile platform. If you've got basic web development skills, you'll find the code samples and discussions in this book will take your techniques to a completely different level. Table of Contents1. Harnessing the Power of Mobile Web 2. Twitter Application: Who's That Tweet? 3. Twitter Application: I Love Ham 4.Creating a Mobile Strategy and Structuring your Code 5. Handling Multiple Screen Resolutions with CSS 3 6. Handling Different Browser Platforms 7. Providing an Impressive User Experience with jQuery Mobile 8. Building Visually Rich Internet Applications 9. HTML5 Location-Based Applications 10. Using Cloud Services: A Transport Application 11. Pushing the Limits with Audio and Video 12. Ajax and Extreme User Interfaces 13. Packaging Your Applications
This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security.
My Windows® 10 Computer for Seniors is an easy, full-color tutorial on
the latest operating system from Microsoft.
What's new in this edition? This new third edition will cover all the changes made in the past five Windows updates as well as changes in the computer hardware market. It will also cover changes to popular social networks and computer software and websites. New or updated coverage on a chapter-by-chapter basis is extensive, and all screen images will be reshot with the current version of the Windows 10 interface.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
Augmented reality takes the real world and through the use of graphics, sound and other effects allows you to enhance the environment. It makes a game more real. Your social media app puts you where want to be or go. Pro iOS 5 Augmented Reality walks you through the foundations of building an augmented reality application for the iPhone or iPad. From using MapKit, to the accelerometer and magnetometer, to integrating facial recognition and Facebook data, you'll learn the building blocks of creating augmented reality applications. Case studies are included in this one-of-a-kind book and you'll learn how to create augmented reality apps that unleash the full potential of the on-board sensors and camera. This book complements other iOS game or social media apps development books available from Apress. After reading Pro iOS 5 Augmented Reality, you'll be able to build augmented reality rich media apps or integrate all the best augmented reality techniques and tools into your existing apps.
The Windows Azure Platform has rapidly established itself as one of the most sophisticated cloud computing platforms available. With Microsoft working to continually update their product and keep it at the cutting edge, the future looks brightif you have the skills to harness it. In particular, new features such as remote desktop access, dynamic content caching and secure content delivery using SSL make the latest version of Azure a more powerful solution than ever before It's widely agreed that cloud computing has produced a paradigm shift in traditional architectural concepts by providing new ways to both store and process data. The basic concepts of the cloud are now well understood throughout the industry. What is much less well understood, and the primary focus of this book, is how the the Windows Azure technology can be applied in real-world scenarios and made to work for you. This book answers those questions, demonstrating how all the features of Windows Azureboth old and newcan be put to work. By the time you're done reading, you will be comfortable building high-quality end-to-end Windows Azure services of your own. The book, like the Azure platform itself, is divided into three key partsWindows Azure, SQL Azure, and Windows Azure AppFabric. Each of these plays a unique role in the functioning of your cloud service. It is the goal of this book to show you how to use these components, both separately and together, to build flawless cloud applications as well as hybrid architectures thatfit in alongside your business' existing systems. Pro Windows Azure Platform, Second Edition is a down-to-earth, code-centric book that shows precisely how the all the components of Windows Azure are employed, and demonstrates the techniques and best practices you'll need to put them to work. What you'll learn Everything you need to understand the Windows Azure platform componentsfrom Access Control to SQL Azure, from the ServiceBus to Windows Azure Connect The architectural theory behind Windows Azure and the nuts-and-bolts code that binds your services together How to design, build, and deploy an Azure service The critical new services of Azure and how the work: Windows Azure Connect, VMRole, SQLAzure Data Sync and Windows Azure AppFabric caching are all covered Who this book is for This book is intended for professional developers who want to dig into the internals of Azure and start investigating its features in depthin order to adoptthem into their workflow systems. Table of Contents Windows Azure Platform Overview Windows Azure Compute Windows Azure Storage, Part I: Blobs and Drives Windows Azure Storage, Part II: Queues Windows Azure Storage, Part III: Tables VMRole and Windows Azure Connect AppFabric: Access Control Service AppFabric: Service Bus AppFabric: Caching SQLAzure
This book constitutes the refereed proceedings of the 15th International Conference on Principles of Distributed Systems, OPODIS 2011, held in Toulouse, France, in December 2011. The 26 revised papers presented in this volume were carefully reviewed and selected from 96 submissions. They represent the current state of the art of the research in the field of the design, analysis and development of distributed and real-time systems.
This book constitutes the refereed proceedings of the Third
International Symposium on NASA Formal Methods, NFM 2011, held in
Pasadena, CA, USA, in April 2011.
The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a gold rush for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a lot of organization and some strategic planning. Updated and expanded for iOS 4, this bestselling book will show you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store The Business of iPhone and iPad App Development was written by experienced developers with business backgrounds, taking you step-by-step through cost effective marketing techniques that have proven successful for professional iOS app creatorsperfect for independent developers on shoestring budgets. No prior business knowledge is required. This is the book you wish you had read before you launched your first app What you'll learn Analyze your ideas and competition, and identify your audience to evaluate sales potential. Protect your business and intellectual property and avoid potential legal hassles. Transform your iOS app into a powerful marketing tool. Build synergy with in-app cross-promotion and social media, and Apple's Game Center. Utilize revenue-generating business models such as in-app advertising and In-App Purchase. Includes extensive coverage of the iAd framework and the Store Kit API. Improve usability and implement effective testing. Create a pre-release buzz online with Twitter, Facebook, blogs, and a dedicated website. Successfully navigate the App Store submission process. Execute a post-release marketing strategy with press releases, app reviews, promotional sales and giveaways. Who this book is for This book is for any developer looking to build a successful business selling iPhone, iPod touch, and iPad apps in Apple's iTunes App Store. All the code examples included in this book can be downloaded fromhttp: //iphonebusinessbook.com/. Table of Contents Seeing the Big Picture in a Crowded App Store Marketplace Doing Your Homework: Analyzing iOS App Ideas and Performing Competitive Research Protecting Your Intellectual Property Your iOS App Is Your Most Powerful Marketing Tool Social Inception: Promoting Your Apps Within Apps Money for Nothing: When It Pays to Be Free Monetizing Free Apps with iAd and Other In-App Advertising Opportunities Exploring the Freemium Model with In-App Purchase Testing and Usability: Putting Your Best Foot Forward Get the Party Started Creating a Prerelease Buzz Keys to the Kingdom: The App Store Submission Process Increasing Awareness for Your iOS App Online Resources for App Research and Marketing
* Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products* Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security* As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years* The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
It's time to capitalize on your mastery of Cocoa withPro Objective-C Design Patterns for iOS.You've developed apps that impressed and performed, and now you're ready to jump into development practices that will leave you with more effective, efficient, and professional level apps.This book is the element you need to make the jump from journeyman to master. All too often, developers grind through building good apps on willpower and a vigorous focus on code development, leaving them unaware of and unable to benefit from the underlying structural and functional design patterns. Pro Objective-C Design Patterns for iOS will teach you those design patterns that have always been present at some level in your code, but were never recognized, acknowledged, or fully utilized.Implementation of specific pattern approaches will prove their value to any developer working in the iOS application arena. You'll learn to master classic patterns like singleton, abstract factory, chain of responsibility, and observer. You'll also discover less well-known but useful patterns like memento, composite, command, and mediator. What you'll learn The basic concepts ofvarious design patterns How to apply designpatterns to your code based on different scenarios How design patterns canstrengthen your apps Who this book is for Any professional or aspiring iOS developer will find productivity, efficiency, and effectiveness of software development enhanced by the methods and practice delivered byPro Objective-C Design Patterns for iOS. Table of Contents Hello, Design Patterns A Case Study: Designing an App Prototype Factory Method Abstract Factory Builder Singleton Adapter Bridge Facade Mediator Observer Composite Iterator Visitor Decorator Chain of Responsibility Template Method Strategy Command Flyweight Proxy Memento
Andy Rathbone zeigt Ihnen schnell und dennoch verstAndlich alles Wichtige, was Sie A1/4ber Windows 10 und dessen Updates wissen mA1/4ssen: Erfahren Sie, was neu ist, wie Sie die neuen Funktionen nutzen und wie Sie altbekannte wiederfinden. Der Autor unterstA1/4tzt Sie dabei, Ihre Daten von einem alten Computer auf einen neuen Windows-10-PC zu A1/4bertragen und Windows 10 an Ihre BedA1/4rfnisse anzupassen. So kommen Sie mit Ihrem neuen Betriebssystem im Handumdrehen zurecht und fA1/4hlen sich schnell wieder zuhause.
The first ESPRIT Basic Research Project on Predictably Dependable Computing Systems (No. 3092, PDCS) commenced in May 1989, and ran until March 1992. The institutions and principal investigators that were involved in PDCS were: City University, London, UK (Bev Littlewood), lEI del CNR, Pisa, Italy (Lorenzo Strigini), Universitiit Karlsruhe, Germany (Tom Beth), LAAS-CNRS, Toulouse, France (Jean-Claude Laprie), University of Newcastle upon Tyne, UK (Brian Randell), LRI-CNRS/Universite Paris-Sud, France (Marie-Claude Gaudel), Technische Universitiit Wien, Austria (Hermann Kopetz), and University of York, UK (John McDermid). The work continued after March 1992, and a three-year successor project (No. 6362, PDCS2) officially started in August 1992, with a slightly changed membership: Chalmers University of Technology, Goteborg, Sweden (Erland Jonsson), City University, London, UK (Bev Littlewood), CNR, Pisa, Italy (Lorenzo Strigini), LAAS-CNRS, Toulouse, France (Jean-Claude Laprie), Universite Catholique de Louvain, Belgium (Pierre-Jacques Courtois), University of Newcastle upon Tyne, UK (Brian Randell), LRI-CNRS/Universite Paris-Sud, France (Marie-Claude Gaudel), Technische Universitiit Wien, Austria (Hermann Kopetz), and University of York, UK (John McDermid). The summary objective of both projects has been "to contribute to making the process of designing and constructing dependable computing systems much more predictable and cost-effective." In the case of PDCS2, the concentration has been on the problems of producing dependable distributed real-time systems and especially those where the dependability requirements centre on issues of safety and/or security.
This book contains the papers presented at the international research sympo sium "Solid Modeling by Computers: From Theory to Applications," held at the General Motors Research Laboratories on September 25-27, 1983. This was the 28th syposium in aseries which the Research Laboratories began sponsor ing in 1957. Each symposium has focused on a topic that is both under active study at the Research Laboratories and is also of interest to the larger technical community. Solid modeling is still a very young research area, young even when com pared with other computer-related research fields. Ten years ago, few people recognized the importance of being able to create complete and unambiguous computer models of mechanical parts. Today there is wide recognition that computer representations of solids are aprerequisite for the automation of many engineering analyses and manufacturing applications. In September 1983, the time was ripe for a symposium on this subject. Re search had already demonstrated the efficacy of solid modeling as a tool in computer automated design and manufacturing, and there were significant re suIts wh ich could be presented at the symposium. Yet the field was still young enough that we could bring together theorists in solid modeling and practition ers applying solid modeling to other research areas in a group sm all enough to allow a stimulating exchange of ideas."
Windows 7 is more than an operating system. It's your gateway to email, the Web, work, entertainment, and fun. The latest Windows makes your computer more fun, easy, and powerful to use than ever before. With Windows 7 Made Simple, you can unlock the potential and power of Microsoft's latest operating system.Get up and running quickly with the Quick Start Guide Find what you want to know quickly, and learn at your own pace Read AND see how to do it with handy step-by-step visual aids What you'll learn Tour what's new, changed, and better in Windows 7 Explore Windows programs and features Customize and personalize your desktop Get a free email account Surf the Web Instant message and video chat Organize, print, and email pictures Organize and find things with Libraries Watch videos and movies with Windows Media Center Download free programs like Windows Live Essentials Share music and video with your iPod, Zune, or MP3 player Use social networks, including Facebook and LinkedIn Get and read eBooks Find things on your computer and on the Internet Install programs Connect and use printers, scanners, and fax Protect your computer with Internet Security programs Perform backup and recovery Connect multiple monitors Usetouch features Take it with you: wireless and mobile computing Create a home network Set up your computer for multiple users Troubleshoot Windows, programs, and devices Who this book is for This book is for anyone who wants to get the most out of Windows 7, yet keep it fun, simple, and easy. Whether you are a new Windows 7 user, or moving from Windows XP or Vista, there's lots of help for everybody. With its easy to use contents and thorough coverage, you can use it as both a quick reference and as learning guide. Table of Contents Quick Start Guide Customizing and Personalizing Windows Checking Out Libraries Using Gadgets and Widgets Exploring Programs and Features Installing Programs Using WordPad, Paint, and Accessories Getting Free Goodies like Windows Live Essentials Communicatingwith Email, IM, and Social Networks Surfing the Web Organizing and Sharing Pictures and Videos Enjoying Music, Video, and eBooks Setting Up and Transferring User Accounts Printing, Faxing, and Scanning Connecting Monitors and Hardware Connecting to the Internet andHome Networks Protecting Your Computer andData Troubleshooting and Maintaining Your Computer Using Windows at Work and On the Road
The power of Core Data allows iOS developers to efficiently
store and retrieve application data using familiar object-oriented
paradigms.Pro Core Data for iOS explains both how and why to use
Core Data for data storage, from simple to advanced techniques.
Covering common and advanced persistence patterns, this book
prepares any iOS developer to store and retrieve data accurately
and proficiently. All iPhone, iPad, and iPod touch developers whose applications manage any amount of data. Table of Contents Getting Started Understanding Core Data Storing Data: SQLite and Other Options Creating a Data Model Working with Data Objects Refining Result Sets Tuning Performance and Memory Usage Versioning and Migrating Data Using Core Data in Advanced Applications
Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs. If you want to learn how to develop apps with Cocoa, Objective-C, and Xcode, this book is a great first step. Here are just a few of the things you'll master along the way: Fundamental programming concepts aided by short, easy-to-understand examples How to use Xcode and related programming tools to save time and work more efficiently A firm understanding of the basics of Objective-C and how it compares to other languages you might know How to create simple apps using the Cocoa framework How to easily design, write, test, and market your finished program What you'll learn Basic programming concepts illustrated with short, easy-to-understand examples How to use Xcode and related programming tools The basics of Objective-C and how it compares to other languages you might know How to create simple apps using the Cocoa framework Who this book is for Mac users who want to learn programming or Windows developers who are moving to the Mac OS and iOS platforms. No previous programming experience required. Table of Contents Understanding Programming Understanding Apple's Programming Tools The Basic Steps to Creating a Mac Program Getting Help Learning Objective-C Making Decisions with Branches Repeating Code with Loops Understanding the Cocoa Framework Manipulating Strings Arrays Dictionaries and Sets Creating Classes and Objects Inheritance, Method Overriding, and Events Creating a User Interface Choosing Commands with Buttons Making Choices with Radio Buttons and Check Boxes Making Choices with Pop-Up Buttons Inputting and Outputting Data with Labels, Text Fields, and Combo Boxes Inputting Data with Sliders, Date Pickers, and Steppers Using Built-In Dialog Boxes Creating Pull-Down Menus Designing Your Own Programs Working with Xcode Debugging Your Program
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community. -->What you'll learn-->How to respond to security incidents involving iOS devices How to acquire and analyze data on iOS devices such as iPhone and iPad How to analyze media exploitation on iOS devices-->Who this book is for--> Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators-->-->-->Table of Contents-->History of Apple Mobile Devices iOS Operating and File System Analysis Search, Seizure, and Incident Response iPhone Logical Acquisition Logical Data Analysis Mac and Windows Artifacts GPS Analysis Media Exploitation Media Exploitation Analysis Network Analysis
Mobile devices haveevolved to focus onrich media production and consumption. Developers of mobile applications are able to create applications that allow people to play, capture, andshare media in a variety of new ways on mobile devices. The popularity of Android has soared in part because the platform offers developers a rich set of capabilities including access to media capturing and playback functions. Pro Android Mediaprovides concise and clear instruction on how to utilize the media APIs made available through Android to create dynamic apps. It takes youfrom a simple means to gain access to the camera to complex video capture and sharing examples. It also covers sound, graphics, painting, and moreeverything you need to make your app come "alive." What you'll learn Develop graphics, music, video and rich media apps for Android smartphones and tablets Build touchscreen input features into Android apps that allow users to draw, paint, and do other creative forms of input Turn the Android smartphone into a full fledged media player Integrate and use location-based services and media-related web service APIs Who this book is for This book is aimed primarily at the growing market of Android developers. It is written in such a way that it may be used by those who are familiar with Android, but have no experience developing applications that deal with images, audio, or video Table of Contents Introduction to Android Imaging Building Custom Camera Applications Image Editing and Processing Graphics and Touch Events Introduction to Audio on Android Background and Networked Audio Audio Capture Audio Synthesis and Analysis Introduction to Video Advanced Video Video Capture Media Consumption and Publishing Using Web Services
As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."
Hard real-time systems are very predictable, but not sufficiently flexible to adapt to dynamic situations. They are built under pessimistic assumptions to cope with worst-case scenarios, so they often waste resources. Soft real-time systems are built to reduce resource consumption, tolerate overloads and adapt to system changes. They are also more suited to novel applications of real-time technology, such as multimedia systems, monitoring apparatuses, telecommunication networks, mobile robotics, virtual reality, and interactive computer games. This unique monograph provides concrete methods for building flexible, predictable soft real-time systems, in order to optimize resources and reduce costs. It is an invaluable reference for developers, as well as researchers and students in Computer Science.
Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers. Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This professional book will include several different techniques that are in place for long duration video retrieval. An experimentally tested technology under the JINI platform, demonstrates a practical working system which serves as a feasibility study, as well as the first step in realizing such a technology.
Growing demands for the quality, safety, and security of software can only be satisfied by the rigorous application of formal methods during software design. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering. Illustrated by complete case studies on protocol verification, verification of security protocols, and logic-based software reuse, this book provides techniques for assessing the prover's capabilities and for selecting and developing an appropriate interface architecture. |
![]() ![]() You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,412
Discovery Miles 14 120
Mathematical Analysis, Probability and…
Tao Qian, Luigi G. Rodino
Hardcover
R5,037
Discovery Miles 50 370
Research Methods: A Process of Inquiry…
Anthony Graziano, Michael Raulin
Paperback
R2,253
Discovery Miles 22 530
Advanced CAD Modeling - Explicit…
Nikola Vukasinovic, Joze Duhovnik
Hardcover
R3,634
Discovery Miles 36 340
Synthesis of Embedded Software…
Sandeep Kumar Shukla, Jean-Pierre Talpin
Hardcover
R3,034
Discovery Miles 30 340
Automotive Radar Sensors in Silicon…
Vipul Jain, Payam Heydari
Hardcover
R2,873
Discovery Miles 28 730
|