Listing 1 - 10 of 1392 | << page >> |
Sort by
|
Choose an application
Choose an application
"Cuando la calidad de los softwares sea suficiente para que la gente converse por escrito y verbalmente en la web en varios idiomas y en tiempo real, veremos un nuevo mundo abrirse ante nosotros. Científicos, políticos, empresarios y muchos otros grupos podrán comunicar directamente entre ellos sin la intervención de mediadores o traductores" (Tim McKenna, escritor y filósofo, Entrevista del NEF, octubre de 2000).
Choose an application
Offers an in-depth discussion of the key systems in the development of distributed software and service-oriented systems through the Internet, and gives readers some critical thinking and technical skills about development and performance assessment of such systems.
Choose an application
Contains papers on the advances in Concurrent Engineering research and applications. This book focuses on developing methodologies, techniques and tools based on Web technologies required to support the key objectives of Concurrent Engineering.
Choose an application
Choose an application
Choose an application
Having lived with the World Wide Web for twenty years, surfing the Web becomes a way of our life that cannot be separated. From latest news, photo sharing, social activities, to research collaborations and even commercial activities and government affairs, almost all kinds of information are available and processible via the Web. While people are appreciating the great invention, the father of the Web, Sir Tim Berners-Lee, has started the plan for the next generation of the Web, the Semantic Web. Unlike the Web that was originally designed for reading, the Semantic Web aims at a more intelligent Web severing machines as well as people. The idea behind it is simple: machines can automatically process or “understand” the information, if explicit meanings are given to it. In this way, it facilitates sharing and reuse of data across applications, enterprises, and communities. According to the organisation of the book, the intended readers may come from two groups, i.e. those whose interests include Semantic Web and want to catch on the state-of-the-art research progress in this field; and those who urgently need or just intend to seek help from the Semantic Web. In this sense, readers are not limited to the computer science. Everyone is welcome to find their possible intersection of the Semantic Web.
World Wide Web. --- W3 (World Wide Web) --- Web (World Wide Web) --- World Wide Web (Information retrieval system) --- WWW (World Wide Web) --- Hypertext systems --- Multimedia systems --- Internet --- Web services
Choose an application
World Wide Web --- Web --- World Wide Web. --- W3 (World Wide Web) --- Web (World Wide Web) --- World Wide Web (Information retrieval system) --- WWW (World Wide Web) --- Hypertext systems --- Multimedia systems --- Internet
Choose an application
This work covers commercial applications that make immediate advances and gains insight into the evolution of Semantic Web technology. It focuses on real applications attacking real world problems. This potentially means pragmatic decisions caused by the limitations of today's technology.
World Wide Web. --- Semantic Web. --- Semantic integration (Computer systems) --- Semantic networks (Information theory) --- World Wide Web --- Microformats --- W3 (World Wide Web) --- Web (World Wide Web) --- World Wide Web (Information retrieval system) --- WWW (World Wide Web) --- Hypertext systems --- Multimedia systems --- Internet
Choose an application
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next
Listing 1 - 10 of 1392 | << page >> |
Sort by
|