|
|
|
|
|
|
Scripting in Java: Integrating with Groovy and JavaScript
When I wrote the three volumes of Harnessing Java 7 in 2012, I did not include a chapter on the Java Scripting API because of the limited space that I had for each volume. Note the phrase “Java Scripting,” which uses two separate words: “Java” and “Scripting.” “JavaScript” is the name of a... | | Alfresco 3 Web Services
Alfresco 3 is the leading open source enterprise content management system that offers powerful features for interacting with the content in its repository from outside the system. These include the support for the Content Management Interoperability Services (CMIS) implementation, reusable web scripts, and a Web Services API.
This... | | Temporal Logic for Real-Time Systems (Advanced Software Development Series)
This monograph presents a framework for modelling, specifying and verifying
systems composed of real-time discrete event processes. A discrete event system
consists of the plant (the object to be controlled) and a controller. For example,
the plant might consist of machines, robots and conveyors on the factory floor.
The objective of... |
|
HTML5 Advertising
Web advertising is changing. What was once a predominantly Flash-based medium is making the switch to HTML5, with the benefit of a plug-in free environment giving a larger audience for ads, and better integration with the page they are featured on. We live in a time where marketers, designers, and developers are confused as to what they can... | | The Unknown Component Problem: Theory and Applications
The Problem of the Unknown Component: Theory and Applications addresses the issue of designing a component that, combined with a known part of a system, conforms to an overall specification. The authors tackle this problem by solving abstract equations over a language. The most general solutions are studied when both synchronous and... | | A Practical Guide to Trusted ComputingUse Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes... |
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |