|
|
|
|
|
| | Secure Systems Development with UMLAttacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.
Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML... | | CONCUR 2008 - Concurrency Theory: 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008, ProceedingsThis book constitutes the refereed proceedings of the 19th International Conference on Concurrency Theory, CONCUR 2008, held in Toronto, Canada, August 19-22, 2008.
The 33 revised full papers presented together with 2 tool papers were carefully reviewed and selected from 120 submissions. The topics include model checking, process calculi,... |
|
|
| | Building Spring 2 Enterprise ApplicationsThis book covers the Spring Framework, the Java application framework of choice for tens of thousands of Java developers worldwide. We feel it is important to introduce you to the Spring Framework by showing you how to use it. So we wrote a book that uses a complex sample application to demonstrate how the Spring Framework is used in a typical... | | |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |