Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,190 result(s) for "Java web application"
Sort by:
Model-based automated testing of JavaScript Web applications via longer test sequences
JavaScript has become one of the most widely used languages for Web development. Its dynamic and event-driven features make it challenging to ensure the correctness of Web applications written in JavaScript. A variety of dynamic analysis techniques have been proposed which are, however, limited in either coverage or scalability. In this paper, we propose a simple, yet effective, model-based automated testing approach to achieve a high code-coverage within the time budget via testing with longer event sequences. We implement our approach as an open-source tool LJS, and perform extensive experiments on 21 publicly available benchmarks. On average, LJS is able to achieve 86.5% line coverage in 10 minutes. Compared with JSDEP, a state-of-the-art breadth-first search based automated testing tool enriched with partial order reduction, the coverage of LJS is 11%–19% higher than that of JSDEP on real-world large Web applications. Our empirical findings support that proper longer test sequences can achieve a higher code coverage in JavaScript Web application testing.
Web-GIS tool for the management of rural land markets
Land abandonment and stagnation of rural markets in the last few years have become one of the main concerns of rural administrations. The use of Web and GIS (Geographic Information System) technologies can help to mitigate the effects of these problems. This paper pro-poses a novel Web-GIS tool with spatial capabilities for the dynamization of rural land markets by encouraging the transfer of land from owners to farmers through the leasing of plots. The system, based on open source software, offers information about the properties, their environment and their owners. It uses standards for handling the geographic information and for communicating with external data sources. This system was used as the basis for the development of SITEGAL, the tool for the management of the Land Bank of Galicia ( www.bantegal.com/sitegal ). SITEGAL has been operational since 2007 obtaining benefits for both administration and users (farmers and land owners), and promoting the e-Government.
Enterprise Java microservices
Large applications are easier to develop and maintain when you build them from small, simple components. Java developers now enjoy a wide range of tools that support microservices application development, including right-sized app servers, open source frameworks, and well-defined patterns. Best of all, you can build microservices applications using your existing Java skills. \"Enterprise Java microservices\" teaches you to design and build JVM-based microservices applications. You'll start by learning how microservices designs compare to traditional Java EE applications. Always practical, author Ken Finnigan introduces big-picture concepts along with the tools and techniques you'll need to implement them. You'll discover ecosystem components like Netflix Hystrix for fault tolerance and master the Just enough Application Server (JeAS) approach. To ensure smooth operations, you'll also examine monitoring, security, testing, and deploying to the cloud.
Learning-Sphere Curriculum and Course Development of \Java Web Application Development\ Based on Working Process
Learning sphere and course development in higher vocational education is based on working process. This paper presents a comprehensive course development methodology of \"Java Web Application Development\" according to the characteristic of learning sphere and course development, as well as from the software engineering perspective. The goal is to efficiently cultivate higher technical talents.
Testing Java microservices : using Arquillian, Hoverfly, AssertJ, JUnit, Selenium, and Mockito
With traditional software unit tests, there's never a guarantee that an application will actually function correctly in the production environment. When you add microservices, testing becomes even more tricky. 'Testing Java Microservices' teaches readers how to write tests like unit, component, integration, container, contract, chaos, and more.
Case Study
This chapter describes a step‐by‐step modernization process to redesign a legacy Common Business‐Oriented Language (COBOL) application to finally have a modern Java Web application. Java is used along with: user Interface (UI): Spring Web Model‐View‐Controller (MVC) as the presentation framework. The chapter explains the reverse engineering process for screens and the steps involved in creating a Unified Modeling Language™ (UML) model piece‐by‐piece. Pieces are intended to be connected with each other in a go‐with‐the‐flow manner. They are indeed assembled in order to satisfy the constraints imposed by BFE and its integrated metalanguage.
Security and privacy mechanisms for web and third-party applications
Web and third party applications are new forms of computer applications that heavily leverage the Internet and are compatible with various platforms such as PCs, tablets and smartphones. These applications are rapidly growing and are widely deployed. Many functionalities provided by these applications have been frequently used as alternatives to traditional host-based computer programs. A large user base reflects the unprecedented popularity of these applications. Unfortunately, the popularity of Web and third party applications has also drawn the attention of attackers, who exploit the vulnerabilities within these applications and pose great security and privacy threats to the users. To defend against these threats, this dissertation proposes several security defense and privacy protection mechanisms for Web and third party applications. The mechanisms proposed in this dissertation focus on two most popular platforms, i.e., Web browsers and smartphones. On each platform, different approaches are developed to protect users from the most severe and the most representative threats observed in the real world. The two most representative types of threats on Web browsers are JavaScript-based maliciousWeb pages and worm propagation in online social networks. As the top Internet security threat in recent years, malicious JavaScript code often applies obfuscation techniques to hide its malicious purpose and to evade the detection of anti-virus software. To this end, we proposed an approach called JStill that can detect and prevent the execution of the obfuscated malicious JavaScript code in Web browsers. The propagation of worms in online social network websites such as Facebook is new attack vector. Attackers leverage social connections and social engineering in online social networks to facilitate the propagation of worms. Given the new features in the propagation of worms, we proposed an early warning detection system that can detect worms in online social networks when only a small number of user accounts are infected. Android is the most popular smartphone operating system. Android system enforces an installation-time permission check mechanism, which can not effectively prevent sensitive permissions from being granted to malicious applications. In view of this issue, we propose Permlyzer, a framework to automatically generate analysis on the use of permissions in applications. The information obtained by Permlyzer can not only help users to make informed decision before installation, but also help application vendors to vet applications before releasing to the public.
Java EE 8 Cookbook
Java EE is a collection of technologies and APIs to support Enterprise Application development. The choice of what to use and when can be dauntingly complex for any developer. This book will help you master this. Packed with easy to follow recipes, this is your guide to becoming productive with Java EE 8.