Listing 1 - 10 of 3268 | << page >> |
Sort by
|
Choose an application
Create scientific venue for participants can share ideas, strategies & policies for tackling development, research & adaption challenges related to open source tools & open source development environments for customized & enterprise grade applications.
Choose an application
Abstract: Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components' functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service-level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a "point-and-cut" mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability. Keywords: admin console, application, BOPS admin, BOPS cluster, BOPS server, BOPS IDS, client device IDS, Jena Rules, IDS cluster, IEEE 2410, liveness, original site admin, site admin, trusted adjudicated data, user, user device.
Choose an application
Choose an application
Learn software engineering from scratch, from installing and setting up your development environment, to navigating a terminal and building a model command line operating system, all using the Scala programming language as a medium. The demand for software engineers is growing exponentially, and with this book you can start your journey into this rewarding industry, even with no prior programming experience. Using Scala, a language known to contain “everything and the kitchen sink,” you’ll begin coding on a gentle learning curve by applying the basics of programming such as expressions, control flow, functions, and classes. You’ll then move on to an overview of all the major programming paradigms. You’ll finish by studying software engineering concepts such as testing and scalability, data structures, algorithm design and analysis, and basic design patterns. With Software Engineering from Scratch as your navigator, you can get up to speed on the software engineering industry, develop a solid foundation of many of its core concepts, and develop an understanding of where to invest your time next.
Open source software. --- Computer programming. --- Open Source.
Choose an application
Design and architect resilient OpenShift clusters and gain a keen understanding of how hundreds of projects are integrated into a powerful solution. While there are many OpenShift resources available for developers, this book focuses on the key elements of infrastructure and operations that teams need when looking to integrate and maintain this platform. You'll review important concepts, such as repeatable deployment techniques, advanced OpenShift RBAC capabilities, monitoring clusters, and integrating with external services. You'll also see how to run specialized workloads in OpenShift and how to deploy non-web based applications on the platform, all designed to help cultivate best practices as your organization continue evolve in microservices architectures. OpenShift has become the main enterprise Kubernetes distribution and its market penetration continues to growth at rapid rate. While OpenShift’s documentation provides a great list of configuration options to work with the platform, it can be a daunting task to wade through. Architecting and Operating OpenShift Clusters breaks this content down into clear and useful concepts to provide you with a solid understanding of the OCP internal architecture.
Open source software. --- Computer programming. --- Open Source.
Choose an application
The 15th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2015) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and or manipulation of the source code of software systems The term source code refers to any fully executable description of a software system, such as machine code, (very) high level languages, and executable graphical representations of systems The term analysis refers to any (semi)automated procedure that yields insight into source code, while manipulation refers to any automated or semi automated procedure that takes and returns source code.
Choose an application
Annotation Create scientific venue for participants can share ideas, strategies & policies for tackling development, research & adaption challenges related to open source tools & open source development environments for customized & enterprise grade applications.
Choose an application
Choose an application
The International Conference on Software Maintenance and Evolution (ICSME) is the premier international forum for researchers and practitioners from academia, industry, and government to present, discuss, and debate the most recent ideas, experiences, and challenges in software maintenance and evolution.
Choose an application
Listing 1 - 10 of 3268 | << page >> |
Sort by
|