Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using Aspect-Oriented Programming for Trustworthy Software Development

Buy
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming

This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, in-and-out conditions, and multi-threaded safety can be implemented using AOP.

Following an introduction, the book covers:

  • Trustworthy computing, software engineering, and computer science

  • Aspect-oriented programming and Aspect.NET

  • Principles and case studies that apply AOP to TWC

Coverage includes Aspect.NET, the AOP framework developed by the author for the Microsoft.NET platform, currently used in seventeen countries. The author discusses the basics of Aspect.NET architecture, its advantages compared to other AOP tools, and its functionality. The book has extensive practical examples and case studies of trustworthy software design and code using the Aspect.NET framework. In addition, the book explores other software technologies and tools for using AOP for trustworthy software development, including Java and AspectJ.

This book also includes a valuable chapter dedicated to ERATO, the author's teaching method employed in this book, which has enabled thousands of students to quickly grasp and apply complex concepts in computing and software engineering, while the final chapter presents an overall perspective on the current state of AOP and TWC with a view toward the future.

Software engineers, architects, developers, programmers, and students should all turn to this book to learn this tested and proven method to create more secure, private, and reliable computing.

About the Author

Vladimir O. Safonov, PhD, is Professor of the Computer Science Department at St. Petersburg University and the head of the university's Java Technology Laboratory. With some thirty years of experience leading major software projects, developing software, and teaching software technologies, Professor Safonov is one of the leading innovators in computer science and software engineering in Russia. He holds four U.S. software patents and four Russian software patents and has published five books and over eighty papers. He is also a Microsoft Research 2005/2006 RFP winner for TWC and Secure Software Development.

(HTML tags aren't allowed.)

Android Hardware Interfacing with the BeagleBone Black
Android Hardware Interfacing with the BeagleBone Black

Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black

About This Book

  • Design custom apps that interact with the outside world via BeagleBone Black
  • Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
Sensors in Biomedical Applications: Fundamentals, Technology and Applications
Sensors in Biomedical Applications: Fundamentals, Technology and Applications
For scientists, engineers, and manufacturers involved in developing, designing, and applying biomedical sensors… surveys sensors that have existing and potential applications in biomedicine.
-Sci Tech Book News, Vol. 25, No. 3, September 2001

While most books contain some information on related sensors topics, they are
...
CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822 With CD)
CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822 With CD)
Expert exam prep from leading Cisco authority Todd Lammle

Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the...


Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Bash Pocket Reference: Help for Power Users and Sys Admins
Bash Pocket Reference: Help for Power Users and Sys Admins

It’s simple: if you want to interact deeply with Mac OS X, Linux, and other Unix-like systems, you need to know how to work with the Bash shell. This concise little book puts all of the essential information about Bash right at your fingertips.

You’ll quickly find answers to the annoying questions that...

Linear Regression Analysis: Theory and Computing
Linear Regression Analysis: Theory and Computing

This volume presents in detail the fundamental theories of linear regression analysis and diagnosis, as well as the relevant statistical computing techniques so that readers are able to actually model the data using the methods and techniques described in the book. It covers the fundamental theories in linear regression analysis and is...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy