Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Electronic commerce --- Software patterns. --- Computer programs. --- Security measures. --- WebSphere.
Choose an application
Computer software --- Java (Computer program language) --- Software patterns. --- Development. --- AA / International- internationaal --- 654 --- -Software patterns --- 005.133 --- Patterns, Software --- Software, Computer --- Computer systems --- Object-oriented programming languages --- JavaSpaces technology --- Informatieverwerking. Bureautica. --- Development --- Java (Computer program language). --- Software patterns --- Development of computer software --- Software development --- Informatieverwerking. Bureautica
Choose an application
C (Computer program language) --- C++ (Computer program language) --- Computer security. --- Computer software --- Software patterns. --- C (Langage de programmation) --- C++ (Langage de programmation) --- Sécurité informatique --- Logiciels --- Development. --- Développement --- Modèles de conception
Choose an application
Real-time data processing --- Software patterns --- Computer architecture --- softwareontwikkeling --- C --- C++ --- realtime --- 681.3*D4 --- Operating systems--See also {681.3*C} --- Contains audio-visual material --- 681.3*D4 Operating systems--See also {681.3*C} --- Patterns, Software --- Computer software --- Fast-response data processing --- High-speed data processing --- Electronic data processing --- Architecture, Computer --- Development
Choose an application
The documentation is missing or obsolete, and the original developers have departed. Your team has limited understanding of the system, and unit tests are missing for many, if not all, of the components. When you fix a bug in one place, another bug pops up somewhere else in the system. Long rebuild times make any change difficult. All of these are signs of software that is close to the breaking point.Many systems can be upgraded or simply thrown away if they no longer serve their purpose. Legacy software, however, is crucial for operations and needs to be continually available and upgr
Programming --- Object-oriented programming (Computer science) --- Software reengineering. --- Software patterns. --- Object-oriented programming (Computer science). --- Information Technology --- General and Others --- Software reengineering --- Software patterns --- 681.3*D15 --- 681.3*D210 --- 681.3*D22 --- 681.3*D210 Design: methodologies; representation (Software engineering) --- Design: methodologies; representation (Software engineering) --- 681.3*D15 Software: object-oriented programming --- Software: object-oriented programming --- 681.3*D22 Tools and techniques: decision tables; flow charts; modules and interfaces; programmer workbench; software libraries; structured programming; top-down programming; user interfaces (Software engineering) --- Tools and techniques: decision tables; flow charts; modules and interfaces; programmer workbench; software libraries; structured programming; top-down programming; user interfaces (Software engineering) --- Computer programming --- Object-oriented methods (Computer science) --- Document Object Model (Web site development technology) --- Computer software reengineering --- Reengineering of software --- Software renewal --- Software renovation --- Software engineering --- Software maintenance --- Patterns, Software --- Computer software --- Development
Choose an application
For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.
Computer security --- Software patterns --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Software patterns. --- Patterns, Software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Science. --- Computer communication systems. --- Software engineering. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Software Engineering. --- Science, general. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer software --- Data protection --- Security systems --- Hacking --- Development --- Information Systems. --- Science, Humanities and Social Sciences, multidisciplinary. --- Computer operating systems --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Informatics --- Science --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing --- Computer networks. --- Operating systems (Computers)
Listing 1 - 6 of 6 |
Sort by
|