top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Process-centric architecture for enterprise software systems / / Parameswaran Seshan
Process-centric architecture for enterprise software systems / / Parameswaran Seshan
Autore Seshan Parameswaran
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : Auerbach Publications, , 2010
Descrizione fisica 1 online resource (336 p.)
Disciplina 004.2/2
Collana Infosys Press
Soggetto topico Computer architecture
Information technology - Management
ISBN 1-4398-5710-5
1-138-37421-0
0-429-09363-2
1-4398-1629-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Part I: The Process-Centric ArchitectureParadigm; Chapter 1: Introduction; Chapter 2: Evolution of IT Architecture; Chapter 3: Concept of Process-Centric Architecture; Chapter 4: Business Process Management; Chapter 5: Components of PCA; Chapter 6: Process Execution; Chapter 7: Benefits of Process-Centric Architecture; Part II: Architecting IT Systems, The Process-Centric Style (Designing PCA); Chapter 8: The Approach; Chapter 9: SOA for Services; Chapter 10: Standards andTechnologies; Chapter 11: Case Study-Architectural Design Applying PCA
Chapter 12: Implementation ConsiderationsBibliography; Back cover
Record Nr. UNINA-9910784919603321
Seshan Parameswaran  
Boca Raton, Fla. : , : Auerbach Publications, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Process-centric architecture for enterprise software systems / / Parameswaran Seshan
Process-centric architecture for enterprise software systems / / Parameswaran Seshan
Autore Seshan Parameswaran
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, FL, : Auerbach Publications, 2010
Descrizione fisica 1 online resource (336 p.)
Disciplina 004.2/2
Collana Infosys Press
Soggetto topico Computer architecture
Information technology - Management
ISBN 1-4398-5710-5
1-138-37421-0
0-429-09363-2
1-4398-1629-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Part I: The Process-Centric ArchitectureParadigm; Chapter 1: Introduction; Chapter 2: Evolution of IT Architecture; Chapter 3: Concept of Process-Centric Architecture; Chapter 4: Business Process Management; Chapter 5: Components of PCA; Chapter 6: Process Execution; Chapter 7: Benefits of Process-Centric Architecture; Part II: Architecting IT Systems, The Process-Centric Style (Designing PCA); Chapter 8: The Approach; Chapter 9: SOA for Services; Chapter 10: Standards andTechnologies; Chapter 11: Case Study-Architectural Design Applying PCA
Chapter 12: Implementation ConsiderationsBibliography; Back cover
Record Nr. UNINA-9910819842603321
Seshan Parameswaran  
Boca Raton, FL, : Auerbach Publications, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Process-Driven SOA / / Hentrich, Carsten
Process-Driven SOA / / Hentrich, Carsten
Autore Hentrich Carsten
Edizione [1st edition]
Pubbl/distr/stampa Auerbach Publications, , 2016
Descrizione fisica 1 online resource (747 p.)
Disciplina 658.4/038
Collana Infosys press
Soggetto topico Service-oriented architecture (Computer science)
ISBN 1-4665-5130-5
0-429-06710-0
1-4665-5129-1
1-283-59639-3
9786613908841
1-4398-8930-9
Classificazione COM032000COM051230COM060000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Preface; Acknowledgments; About the Authors; 1. Introduction; 2. Service-Oriented Architecture: A Business Perspective; 3. Service-Oriented Architecture: A Technical Perspective; 4. Pattern Language Walk-Through: An Example from the Insurance Business; 5. Decomposing and Executing Business-Driven and Technical Processes; 6. Integration and Adaptation in Process-Driven SOAs; 7. Aligning Business Goals and Service Design; 8. Business Object Integration: How to Deal with the Data?; 9. Process Design: Mapping Domain Views to Technical Views
10. Integrating Events into Process-Driven SOAs11. Invoking Services from Processes; 12. Synchronization of Processes Running in Parallel; Appendix: Related and Referenced Patterns; References; Index
Record Nr. UNINA-9910781523203321
Hentrich Carsten  
Auerbach Publications, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Process-Driven SOA / / Hentrich, Carsten
Process-Driven SOA / / Hentrich, Carsten
Autore Hentrich Carsten
Edizione [1st edition]
Pubbl/distr/stampa Auerbach Publications, , 2016
Descrizione fisica 1 online resource (747 p.)
Disciplina 658.4/038
Collana Infosys press
Soggetto topico Service-oriented architecture (Computer science)
ISBN 1-4665-5130-5
0-429-06710-0
1-4665-5129-1
1-283-59639-3
9786613908841
1-4398-8930-9
Classificazione COM032000COM051230COM060000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Preface; Acknowledgments; About the Authors; 1. Introduction; 2. Service-Oriented Architecture: A Business Perspective; 3. Service-Oriented Architecture: A Technical Perspective; 4. Pattern Language Walk-Through: An Example from the Insurance Business; 5. Decomposing and Executing Business-Driven and Technical Processes; 6. Integration and Adaptation in Process-Driven SOAs; 7. Aligning Business Goals and Service Design; 8. Business Object Integration: How to Deal with the Data?; 9. Process Design: Mapping Domain Views to Technical Views
10. Integrating Events into Process-Driven SOAs11. Invoking Services from Processes; 12. Synchronization of Processes Running in Parallel; Appendix: Related and Referenced Patterns; References; Index
Record Nr. UNINA-9910823641203321
Hentrich Carsten  
Auerbach Publications, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Product release planning : methods, tools, and applications / / Gunther Ruhe
Product release planning : methods, tools, and applications / / Gunther Ruhe
Autore Ruhe Gunther
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2010
Descrizione fisica 1 online resource (546 p.)
Disciplina 658.8/02
Soggetto topico New products - Planning
Product management
Soggetto genere / forma Electronic books.
ISBN 1-4398-5762-8
0-429-12677-8
1-4200-0411-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments; Part A: Foundations; Chapter 1 - Overview and Introduction; Chapter 2 - Decisions and How to Make Them; Chapter 3 - Features and Their Prioritization; Part B: Methods; Chapter 5 - Modeling for Product Release Planning; Chapter 6 - Evolve II: A Systematic Method for Planning Product Releases; Chapter 7 - Re-Planning of Product: Releases; Chapter 8 - Staffing for Product Releases; Chapter 9 - Advanced Topics; Part C: Tools; Chapter 10 - Tool Support; Part D: Applications; Chapter 11 - Case Study: Product Roadmapping
Chapter 12 - Case Study: Staffing for Product ReleasesChapter 13 -Case Study: Adaptable Project Management; Chapter 14 - Application Scenarios; Chapter 15 - How to Get It Started; References; Index
Record Nr. UNINA-9910458592403321
Ruhe Gunther  
Boca Raton : , : Auerbach Publications, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Product release planning : methods, tools, and applications / / Gunther Ruhe
Product release planning : methods, tools, and applications / / Gunther Ruhe
Autore Ruhe Gunther
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2010
Descrizione fisica 1 online resource (546 p.)
Disciplina 658.8/02
Soggetto topico New products - Planning
Product management
ISBN 1-4398-5762-8
0-429-12677-8
1-4200-0411-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments; Part A: Foundations; Chapter 1 - Overview and Introduction; Chapter 2 - Decisions and How to Make Them; Chapter 3 - Features and Their Prioritization; Part B: Methods; Chapter 5 - Modeling for Product Release Planning; Chapter 6 - Evolve II: A Systematic Method for Planning Product Releases; Chapter 7 - Re-Planning of Product: Releases; Chapter 8 - Staffing for Product Releases; Chapter 9 - Advanced Topics; Part C: Tools; Chapter 10 - Tool Support; Part D: Applications; Chapter 11 - Case Study: Product Roadmapping
Chapter 12 - Case Study: Staffing for Product ReleasesChapter 13 -Case Study: Adaptable Project Management; Chapter 14 - Application Scenarios; Chapter 15 - How to Get It Started; References; Index
Record Nr. UNINA-9910791689003321
Ruhe Gunther  
Boca Raton : , : Auerbach Publications, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security for service oriented systems / / Bhavani Thuraisingham
Security for service oriented systems / / Bhavani Thuraisingham
Autore Thuraisingham Bhavani M
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, : Auerbach Publications, 2011
Descrizione fisica 1 online resource (446 p.)
Disciplina 004.6/54
Soggetto topico Service-oriented architecture (Computer science)
Computer networks - Security measures
ISBN 0-429-24963-2
1-4200-7332-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; Acknowledgments; Chapter 1: Introduction; Chapter 2: Service-Oriented Computing; Chapter 3: SOA and Web Services; Chapter 4: Service-Oriented Analysis and Design; Chapter 5: Specialized Web Services; Chapter 6: Semantic Web Services; Chapter 7: Trustworthy Systems; Chapter 8: Secure Service-Oriented Computing; Chapter 9: Secure SOA and Web Services; Chapter 10: Secure Service-Oriented Analysis and Design; Chapter 11: Access Control for Web Services; Chapter 12: Digital Identity Management; Chapter 13: Security Models for Web Services
Chapter 14: Trust Management and Web ServicesChapter 15: Privacy and Web Services; Chapter 16: Integrity Management, Data Provenance, and Web Services; Chapter 17: Secure Semantic Web and Web Services; Chapter 18: Security, XML, and Web Services; Chapter 19: Security, RDF, and Web Services; Chapter 20: Security, Ontologies, and Web Services; Chapter 21: Security, Rules, and Web Services; Chapter 22: Web Services for Secure Data, Information, and Knowledge Management; Chapter 23: Secure Geospatial, Multimedia, and Sensor Web Services; Chapter 24: Web Services for Secure Activity Management
Chapter 25: Secure Specialized Web ServicesChapter 26: Summary and Directions; Appendix A: Data Management Systems: Developments and Trends; Appendix B: Database Management; Appendix C: Secure Objects; Appendix D: Developments with Standards, Products, and Tools; Back Cover
Record Nr. UNINA-9910809833003321
Thuraisingham Bhavani M  
Boca Raton, : Auerbach Publications, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2011
Descrizione fisica 1 online resource (614 p.)
Disciplina 005.8
Altri autori (Persone) PathanAl-Sakib Khan
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Self-organizing systems - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-429-09439-6
1-282-90290-3
9786612902901
1-4398-1920-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks
Chapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks
Chapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks
Chapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover
Record Nr. UNINA-9910459325803321
Boca Raton : , : Auerbach Publications, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2011
Descrizione fisica 1 online resource (614 p.)
Disciplina 005.8
Altri autori (Persone) PathanAl-Sakib Khan
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Self-organizing systems - Security measures
ISBN 0-429-09439-6
1-282-90290-3
9786612902901
1-4398-1920-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks
Chapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks
Chapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks
Chapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover
Record Nr. UNINA-9910785263703321
Boca Raton : , : Auerbach Publications, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2011
Descrizione fisica 1 online resource (614 p.)
Disciplina 005.8
Altri autori (Persone) PathanAl-Sakib Khan
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Self-organizing systems - Security measures
ISBN 0-429-09439-6
1-282-90290-3
9786612902901
1-4398-1920-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks
Chapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks
Chapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks
Chapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover
Record Nr. UNINA-9910800052103321
Boca Raton : , : Auerbach Publications, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui