05159nam 2200673 450 991078900820332120200520144314.01-78217-761-2(CKB)3710000000089794(EBL)1647191(SSID)ssj0001160444(PQKBManifestationID)11670646(PQKBTitleCode)TC0001160444(PQKBWorkID)11136941(PQKB)10046533(Au-PeEL)EBL1647191(CaPaEBR)ebr10839997(CaONFJC)MIL577443(OCoLC)871189664(CaSebORM)9781782177609(MiAaPQ)EBC1647191(PPN)228034698(EXLCZ)99371000000008979420140306h20142014 uy 0engur|n|---|||||txtccrIBM worklight mobile application development essentials develop efficient mobile applications using IBM Worklight /Muhammad Saif Uddin, Talha Haroon ; cover image by Ronak Dhruv1st editionBirmingham, England :Packt Publishing Ltd,2014.©20141 online resource (144 p.)Professional expertise distilled"Professional expertise distilled"--Cover.Includes index.1-78217-760-4 Cover; Copyright; Credits; About the Authors; Acknowledgement; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with IBM Worklight; The IBM Worklight solution; Worklight capabilities and supported platforms; Components of Worklight; Worklight Studio; Features of the Worklight Studio platform; Worklight Device Runtime; Worklight Server; Worklight Console; Worklight Application Center; Summary; Chapter 2: Installing Worklight; Installing IBM Worklight Consumer Edition; Installing IBM Installation Manager; Installing the IBM Worklight ServerConfiguring the WebSphere Application Server (Liberty profile)Installing IBM Worklight Studio; Installing IBM Worklight Developer Edition; Installing Android SDK; Summary; Chapter 3: Creating a Basic Worklight Application; Creating a simple IBM Worklight application; Worklight project and application structure; Application resources; Rich Page Editor; Adding an environment; Verifying the server configuration; Building the application; Application skins; Previewing an application in the mobile simulator; Summary; Chapter 4: Customizing a Worklight Application; A quick overview of HTML5The IBM Worklight client-side APIThe WLClient JavaScript client library; Exploring Dojo Mobile; Designing your first Dojo application; Adding an environment in IBM Worklight; Application resources; Application-descriptor; The main HTML file; Client scripts and stylesheets; The application icon; The splash screen; The Worklight client property file; Exploring the Android application environment; Summary; Chapter 5: Adding an Adapter; IBM Worklight Adapter concept; Exploring Adapter files; Types of Adapters; HTTP Adapters; SQL Adapters; Invoking the Adapter procedureCalling Java code using an AdapterInvoking Java code from the Adapter; Summary; Chapter 6: Authentication and Security; Worklight security principles, concepts, and terminologies; Challenge handler; Authenticator; The login module; Authentication realms; Security test; Examining generated realms, security test, and login modules; Generating realms; Generating login modules; Generating security tests; Creating adapter-based authentication; Client side - adapter authentication components; Challenge handler in Worklight; Form-based authentication; Security realm; The login module; Security testChallenge handlerCustom authentication; Summary; Chapter 7: Advanced Features of IBM Worklight; Push notification; Device and platforms support; Worklight push notification concepts and terminology; WL client API; WL.BusyIndicator; WL.Logger; WL.SimpleDialog; Cordova plugins; Encrypted Offline Cache; Storage JSONStore; Summary; IndexThis book will guide you through the process of building an application and customizing it with the help of lucid instructions on development, configuration, and administration with a practical, step-by-step approach.If you are a developer who wants to create mobile applications quickly, this is the book for you. Some basic knowledge about of web technologies and client -side languages such as JavaScript, CSS and HTML will serve you well.Mobile computingProgrammingMobile computingSecurity measuresMobile computingProgramming.Mobile computingSecurity measures.005.437Uddin Muhammad Saif1535348Haroon Talha1535349Dhruv Ronak1535350MiAaPQMiAaPQMiAaPQBOOK9910789008203321IBM worklight mobile application development essentials3783489UNINA04024nam 22008535 450 991048346280332120200702045219.03-319-12280-010.1007/978-3-319-12280-9(CKB)3710000000269697(SSID)ssj0001372580(PQKBManifestationID)11780203(PQKBTitleCode)TC0001372580(PQKBWorkID)11305030(PQKB)10912017(DE-He213)978-3-319-12280-9(MiAaPQ)EBC6298891(MiAaPQ)EBC5587583(Au-PeEL)EBL5587583(OCoLC)894505177(PPN)18209782X(EXLCZ)99371000000026969720141017d2014 u| 0engurnn|008mamaatxtccrCryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings /edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XVI, 401 p. 52 illus.) Security and Cryptology ;8813Bibliographic Level Mode of Issuance: Monograph3-319-12279-7 Includes bibliographical references and index.Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work.This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.Security and Cryptology ;8813Data encryption (Computer science)Computer securityComputer communication systemsCoding theoryInformation theoryManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer security.Computer communication systems.Coding theory.Information theory.Management information systems.Computer science.Cryptology.Systems and Data Security.Computer Communication Networks.Coding and Information Theory.Management of Computing and Information Systems.005.82Gritzalis Dimitrisedthttp://id.loc.gov/vocabulary/relators/edtKiayias Aggelosedthttp://id.loc.gov/vocabulary/relators/edtAskoxylakis Ioannisedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483462803321Cryptology and Network Security2968064UNINA