Process-centric architecture for enterprise software systems / / Parameswaran Seshan |
Autore | Seshan Parameswaran |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : Auerbach Publications, , 2010 |
Descrizione fisica | 1 online resource (336 p.) |
Disciplina | 004.2/2 |
Collana | Infosys Press |
Soggetto topico |
Computer architecture
Information technology - Management |
ISBN |
1-4398-5710-5
1-138-37421-0 0-429-09363-2 1-4398-1629-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Part I: The Process-Centric ArchitectureParadigm; Chapter 1: Introduction; Chapter 2: Evolution of IT Architecture; Chapter 3: Concept of Process-Centric Architecture; Chapter 4: Business Process Management; Chapter 5: Components of PCA; Chapter 6: Process Execution; Chapter 7: Benefits of Process-Centric Architecture; Part II: Architecting IT Systems, The Process-Centric Style (Designing PCA); Chapter 8: The Approach; Chapter 9: SOA for Services; Chapter 10: Standards andTechnologies; Chapter 11: Case Study-Architectural Design Applying PCA
Chapter 12: Implementation ConsiderationsBibliography; Back cover |
Record Nr. | UNINA-9910784919603321 |
Seshan Parameswaran | ||
Boca Raton, Fla. : , : Auerbach Publications, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Process-centric architecture for enterprise software systems / / Parameswaran Seshan |
Autore | Seshan Parameswaran |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, FL, : Auerbach Publications, 2010 |
Descrizione fisica | 1 online resource (336 p.) |
Disciplina | 004.2/2 |
Collana | Infosys Press |
Soggetto topico |
Computer architecture
Information technology - Management |
ISBN |
1-4398-5710-5
1-138-37421-0 0-429-09363-2 1-4398-1629-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Part I: The Process-Centric ArchitectureParadigm; Chapter 1: Introduction; Chapter 2: Evolution of IT Architecture; Chapter 3: Concept of Process-Centric Architecture; Chapter 4: Business Process Management; Chapter 5: Components of PCA; Chapter 6: Process Execution; Chapter 7: Benefits of Process-Centric Architecture; Part II: Architecting IT Systems, The Process-Centric Style (Designing PCA); Chapter 8: The Approach; Chapter 9: SOA for Services; Chapter 10: Standards andTechnologies; Chapter 11: Case Study-Architectural Design Applying PCA
Chapter 12: Implementation ConsiderationsBibliography; Back cover |
Record Nr. | UNINA-9910819842603321 |
Seshan Parameswaran | ||
Boca Raton, FL, : Auerbach Publications, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Process-Driven SOA / / Hentrich, Carsten |
Autore | Hentrich Carsten |
Edizione | [1st edition] |
Pubbl/distr/stampa | Auerbach Publications, , 2016 |
Descrizione fisica | 1 online resource (747 p.) |
Disciplina | 658.4/038 |
Collana | Infosys press |
Soggetto topico | Service-oriented architecture (Computer science) |
ISBN |
1-4665-5130-5
0-429-06710-0 1-4665-5129-1 1-283-59639-3 9786613908841 1-4398-8930-9 |
Classificazione | COM032000COM051230COM060000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Preface; Acknowledgments; About the Authors; 1. Introduction; 2. Service-Oriented Architecture: A Business Perspective; 3. Service-Oriented Architecture: A Technical Perspective; 4. Pattern Language Walk-Through: An Example from the Insurance Business; 5. Decomposing and Executing Business-Driven and Technical Processes; 6. Integration and Adaptation in Process-Driven SOAs; 7. Aligning Business Goals and Service Design; 8. Business Object Integration: How to Deal with the Data?; 9. Process Design: Mapping Domain Views to Technical Views
10. Integrating Events into Process-Driven SOAs11. Invoking Services from Processes; 12. Synchronization of Processes Running in Parallel; Appendix: Related and Referenced Patterns; References; Index |
Record Nr. | UNINA-9910781523203321 |
Hentrich Carsten | ||
Auerbach Publications, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Process-Driven SOA / / Hentrich, Carsten |
Autore | Hentrich Carsten |
Edizione | [1st edition] |
Pubbl/distr/stampa | Auerbach Publications, , 2016 |
Descrizione fisica | 1 online resource (747 p.) |
Disciplina | 658.4/038 |
Collana | Infosys press |
Soggetto topico | Service-oriented architecture (Computer science) |
ISBN |
1-4665-5130-5
0-429-06710-0 1-4665-5129-1 1-283-59639-3 9786613908841 1-4398-8930-9 |
Classificazione | COM032000COM051230COM060000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Preface; Acknowledgments; About the Authors; 1. Introduction; 2. Service-Oriented Architecture: A Business Perspective; 3. Service-Oriented Architecture: A Technical Perspective; 4. Pattern Language Walk-Through: An Example from the Insurance Business; 5. Decomposing and Executing Business-Driven and Technical Processes; 6. Integration and Adaptation in Process-Driven SOAs; 7. Aligning Business Goals and Service Design; 8. Business Object Integration: How to Deal with the Data?; 9. Process Design: Mapping Domain Views to Technical Views
10. Integrating Events into Process-Driven SOAs11. Invoking Services from Processes; 12. Synchronization of Processes Running in Parallel; Appendix: Related and Referenced Patterns; References; Index |
Record Nr. | UNINA-9910823641203321 |
Hentrich Carsten | ||
Auerbach Publications, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Product release planning : methods, tools, and applications / / Gunther Ruhe |
Autore | Ruhe Gunther |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2010 |
Descrizione fisica | 1 online resource (546 p.) |
Disciplina | 658.8/02 |
Soggetto topico |
New products - Planning
Product management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-4398-5762-8
0-429-12677-8 1-4200-0411-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments; Part A: Foundations; Chapter 1 - Overview and Introduction; Chapter 2 - Decisions and How to Make Them; Chapter 3 - Features and Their Prioritization; Part B: Methods; Chapter 5 - Modeling for Product Release Planning; Chapter 6 - Evolve II: A Systematic Method for Planning Product Releases; Chapter 7 - Re-Planning of Product: Releases; Chapter 8 - Staffing for Product Releases; Chapter 9 - Advanced Topics; Part C: Tools; Chapter 10 - Tool Support; Part D: Applications; Chapter 11 - Case Study: Product Roadmapping
Chapter 12 - Case Study: Staffing for Product ReleasesChapter 13 -Case Study: Adaptable Project Management; Chapter 14 - Application Scenarios; Chapter 15 - How to Get It Started; References; Index |
Record Nr. | UNINA-9910458592403321 |
Ruhe Gunther | ||
Boca Raton : , : Auerbach Publications, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Product release planning : methods, tools, and applications / / Gunther Ruhe |
Autore | Ruhe Gunther |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2010 |
Descrizione fisica | 1 online resource (546 p.) |
Disciplina | 658.8/02 |
Soggetto topico |
New products - Planning
Product management |
ISBN |
1-4398-5762-8
0-429-12677-8 1-4200-0411-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments; Part A: Foundations; Chapter 1 - Overview and Introduction; Chapter 2 - Decisions and How to Make Them; Chapter 3 - Features and Their Prioritization; Part B: Methods; Chapter 5 - Modeling for Product Release Planning; Chapter 6 - Evolve II: A Systematic Method for Planning Product Releases; Chapter 7 - Re-Planning of Product: Releases; Chapter 8 - Staffing for Product Releases; Chapter 9 - Advanced Topics; Part C: Tools; Chapter 10 - Tool Support; Part D: Applications; Chapter 11 - Case Study: Product Roadmapping
Chapter 12 - Case Study: Staffing for Product ReleasesChapter 13 -Case Study: Adaptable Project Management; Chapter 14 - Application Scenarios; Chapter 15 - How to Get It Started; References; Index |
Record Nr. | UNINA-9910791689003321 |
Ruhe Gunther | ||
Boca Raton : , : Auerbach Publications, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security for service oriented systems / / Bhavani Thuraisingham |
Autore | Thuraisingham Bhavani M |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton, : Auerbach Publications, 2011 |
Descrizione fisica | 1 online resource (446 p.) |
Disciplina | 004.6/54 |
Soggetto topico |
Service-oriented architecture (Computer science)
Computer networks - Security measures |
ISBN |
0-429-24963-2
1-4200-7332-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; Acknowledgments; Chapter 1: Introduction; Chapter 2: Service-Oriented Computing; Chapter 3: SOA and Web Services; Chapter 4: Service-Oriented Analysis and Design; Chapter 5: Specialized Web Services; Chapter 6: Semantic Web Services; Chapter 7: Trustworthy Systems; Chapter 8: Secure Service-Oriented Computing; Chapter 9: Secure SOA and Web Services; Chapter 10: Secure Service-Oriented Analysis and Design; Chapter 11: Access Control for Web Services; Chapter 12: Digital Identity Management; Chapter 13: Security Models for Web Services
Chapter 14: Trust Management and Web ServicesChapter 15: Privacy and Web Services; Chapter 16: Integrity Management, Data Provenance, and Web Services; Chapter 17: Secure Semantic Web and Web Services; Chapter 18: Security, XML, and Web Services; Chapter 19: Security, RDF, and Web Services; Chapter 20: Security, Ontologies, and Web Services; Chapter 21: Security, Rules, and Web Services; Chapter 22: Web Services for Secure Data, Information, and Knowledge Management; Chapter 23: Secure Geospatial, Multimedia, and Sensor Web Services; Chapter 24: Web Services for Secure Activity Management Chapter 25: Secure Specialized Web ServicesChapter 26: Summary and Directions; Appendix A: Data Management Systems: Developments and Trends; Appendix B: Database Management; Appendix C: Secure Objects; Appendix D: Developments with Standards, Products, and Tools; Back Cover |
Record Nr. | UNINA-9910809833003321 |
Thuraisingham Bhavani M | ||
Boca Raton, : Auerbach Publications, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2011 |
Descrizione fisica | 1 online resource (614 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | PathanAl-Sakib Khan |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Self-organizing systems - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-09439-6
1-282-90290-3 9786612902901 1-4398-1920-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks
Chapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks Chapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks Chapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover |
Record Nr. | UNINA-9910459325803321 |
Boca Raton : , : Auerbach Publications, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2011 |
Descrizione fisica | 1 online resource (614 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | PathanAl-Sakib Khan |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Self-organizing systems - Security measures |
ISBN |
0-429-09439-6
1-282-90290-3 9786612902901 1-4398-1920-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks
Chapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks Chapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks Chapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover |
Record Nr. | UNINA-9910785263703321 |
Boca Raton : , : Auerbach Publications, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security of self-organizing networks : MANET, WSN, WMN, VANET / / editor, Al-Sakib Khan Pathan |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2011 |
Descrizione fisica | 1 online resource (614 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | PathanAl-Sakib Khan |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Self-organizing systems - Security measures |
ISBN |
0-429-09439-6
1-282-90290-3 9786612902901 1-4398-1920-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks
Chapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks Chapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks Chapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover |
Record Nr. | UNINA-9910800052103321 |
Boca Raton : , : Auerbach Publications, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|