COMPONENT-ORIENTED PROGRAMMING
|
|
- Jonah Lamb
- 5 years ago
- Views:
Transcription
1 COMPONENT-ORIENTED PROGRAMMING
2 COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION
3 Copyright 2005 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, , fax , or on the web at Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the U.S. at , outside the U.S. at or fax Wiley also publishes its books in a variety of electronic formats. Some content that appears in print, however, may not be available in electronic format. Library of Congress Cataloging-in-Publication Data: Wang, Andy Ju An. Component-oriented programming / Andy Ju An Wang & Kai Qian. p. cm. A Wiley-Interscience publication. Includes bibliographical references. ISBN Component software. 2. Computer programming. I. Qian, Kai. II. Title. QA76.76.C66W dc Printed in the United States of America
4 CONTENTS Preface ix 1 Introduction What Is COP? Why Is COP Important? What Is a Component? Hardware Components and Software Components, From OOP to COP, Component-Based Software Engineering, Summary, Self-Review Questions, Exercises, 14 References, 14 2 Theory of Components Principles of COP, Infrastructures of COP, Component Models, Connection Models, Deployment Models, Unifying Component Technologies, Summary, Self-Review Questions, Exercises, 35 References, 35 3 COP with JavaBeans Overview of JavaBeans Technology, Component Model of JavaBeans, 38 v
5 vi CONTENTS 3.3 Connection Model of JavaBeans, Deployment Model of JavaBeans, Examples and Lab Practice, Summary, Self-Review Questions, Exercises, 86 References, 87 4 Enterprise JavaBeans Components EJB Architecture, Component Model of EJB, Connection Model of EJB, Deployment Model of EJB, Examples and Lab Practice, Summary, Self-Review Questions, Exercises, Programming Exercises, 144 References, CORBA Components CORBA Component Infrastructure, CORBA Component Model (CCM), Connection Model of CORBA and CCM, Deployment Model of CORBA and CCM, Examples and Lab Practice, Summary, Self-Review Questions, Exercises, Programming Exercises, 192 References, NET Components NET Framework, Component Model of.net, Connection Model of.net, NET Component Deployments, Visual Studio.NET, Examples and Lab Practice, Summary, Self-Review Questions, Exercises, Programming Exercises, 236 References, COP with OSGi Components Overview of OSGi Technology, Component Model of OSGi, 239
6 CONTENTS vii 7.3 Connection Model of OSGi, Deployment Model of OSGi, Examples and Lab Practice, Summary, Self-Review Questions, Exercises, 265 References, Web Services Components Web Services Framework, Component Model of Web Services, Connection Model of Web Services, Web Services Component Deployment, Examples and Lab Practice, Summary, Self-Review Questions, Exercises, Programming Exercises, 314 References, 314 Index 315
7 PREFACE This book is about component-oriented programming (COP for short), a new programming paradigm beyond object-oriented programming. Component-oriented programming offers higher reusability and better modular structure with greater flexibility, compared with object-oriented programming or library-based programming approaches. This book discusses principles of component-oriented programming and provides a unified component infrastructure to describe different component technologies. Hands-on programming practice is emphasized in this book. Readers of this book will learn how to develop reusable software components and how to build a software system out of prebuilt software components. Both authors have been teaching Component-Based Software Development (CBSD) to graduate and undergraduate students for several years. We strongly believe that we need a textbook emphasizing the programming aspect of CBSD or CBSE (Component- Based Software Engineering). Thus, students majoring in computer science, software engineering, or related areas can take this course as one of the major concentrations following OOP (Object-Oriented Programming) and elementary software engineering courses. CBSD is not just a philosophy, a theory, or some standard. It represents a new programming paradigm beyond OOP and library-based programming paradigms this is partially why we chose the title Component Oriented Programming. In a librarybased programming paradigm, multiple layers of software abstractions stack up one on top of the other, whereas in a component-based model, multiple software components plug in side-by-side with one another. In a library-based model, once a module is compiled into the software, it is always available at runtime. In a component-based model, a component can come and go dynamically at runtime. In a library-based paradigm, one most likely must rebuild and repackage the entire set of libraries to fix bugs and add features at compile-time. In a component-based paradigm, new components can be added or existing components can be updated in an incremental way at runtime. In a library-based paradigm, changes made to public interfaces have less impact because one has to rebuild the software in its entirety. In a component-based paradigm, the cost of ix
8 x PREFACE redoing public interfaces can be prohibitive because other components may have relied on them at runtime. We can make a long list of differences between traditional, library-based programming and new, component-based programming. Many software engineers have not realized or appreciated this shift in programming paradigms. As many experts have predicted, CBSE and component-oriented programming will be the future of software development following structured programming, library-based programming, and object-oriented programming. It is essential to make students realize that componentbased software development requires more discipline on the part of developers during the design and programming stages to provide more stability, extensibility, and flexibility. Such disciplined activity and techniques have to be established through well-developed training and practice following component-based software development principles. However, books published on CBSE are not suited to provide such training. Some are highly theoretical, targeting academic researchers, while others emphasize software life cycle and project management; yet others are too specific for particular component technology. In a typical computer science or software engineering curriculum setting in colleges and universities, the course for component-based software development is usually designed for students with previous training on OOP and fundamental software engineering principles. Hence, it is challenging to shift students from the mindset of library-based programming and OOP to the mindset of component-oriented programming. Both authors have followed a programming-centered approach to teaching the Component-Based Software Development course, which has turned out to be successful in emphasizing programming methodology and programming practice in the CBSE context. The programming paradigm is changing from object-oriented programming to component-oriented programming. We predict that in the next few years, component-based development will be the mainstream practice in software engineering. This book will provide in-depth knowledge about component-based development. It intends to introduce component-oriented programming to college students majoring in computer science, software engineering, information technology and to professional software engineers working in the industry as well. We assume that the readers of the book are familiar with at least one high-level programming language. The emphasis will be on component-oriented programming principles, methods, and techniques. Any reader who is interested in component-based software engineering in general will find useful information in this book. Readers can expect to gain the comprehensive knowledge necessary for component software development. Three efforts have been made to help readers understand and master componentoriented programming techniques. First, a unified component infrastructure is used for all component technologies covered in this book, namely, JavaBeans, EJB, COM/DCOM/.NET, CORBA, OSGi, and Web Services. This common component infrastructure contains a component model, a connection model, and a deployment model. It represents standard conventions for component specification, interfaces, composing connectors, architecture, packaging, and deployment. It also helps to apply the component principles to practical component software development following a well-defined format. The unified component infrastructure also serves as a pedagogical tool to keep readers concentrating on technical essentials rather than being distracted by those technical details.
9 PREFACE xi Second, we have paid careful attention to the pedagogical organization of the book. For instance, we put forward briefly at the beginning of each chapter its main objectives, and we explain all potential tricky points in detail in the process of presenting the content. At the end, a brief summary is provided to highlight the key points of the chapter. Self-Review Questions are designed for readers to test their understanding of the materials in each chapter, and key solutions for these questions are supplied. Exercises and Lab Practice are provided at the end of each chapter, serving as an integral part of the book. Third, a supplementary Web site (ftp://ftp.wiley.com/public/sci tech med/component/) is provided containing all examples, laboratory project guidelines, software packages, and developing tools used in the book. Overview of Chapters Chapter 1 is a brief introduction to component-oriented programming and the benefits of component-based software development. Chapter 2 discusses the principles of component-oriented programming, and provides a unified framework for describing different component technologies. Chapter 3 introduces the component infrastructure of JavaBeans. Both BDK (Bean Development Kit) and Bean Builder are discussed. Chapter 4 covers J2EE framework and EJB component architecture. Chapter 5 discusses CORBA (Common Object Request Broker Architecture) component infrastructure. Chapter 6 introduces Microsoft.NET framework and Visual Studio.NET component technology. Chapter 7 covers the component technology proposed by OSGi (Open Service Gateway initiative). Chapter 8 investigates Web services component technology. Acknowledgments Thanks to Cassie Craig of John Wiley & Sons, Inc., for her incredibly positive support in the writing of this text. We want to thank all the other people who helped improve the text, from the reviewers and editors to those who sent suggestions and feedback in the early drafts of this book.
Real-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationMODERN MULTITHREADING
MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationDIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING
DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More informationIP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H
IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More informationOVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.
OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing
More informationLinux Command Line and Shell Scripting Bible. Third Edtion
Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third
More informationMastering UNIX Shell Scripting
Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More informationBeginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood
Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with
More informationJ2EE TM Best Practices Java TM Design Patterns, Automation, and Performance
J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with
More informationMagical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc.
Magical Math G ROOVY G EOMETRY Games and Activities That Make Math Easy and Fun Lynette Long John Wiley & Sons, Inc. G ROOVY G EOMETRY Also in the Magical Math series Dazzling Division Delightful Decimals
More informationDesigning Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationMastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications
Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server
More informationMCITP Windows Server 2008 Server Administrator Study Guide
MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson
More informationFUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE Mostafa Abd-El-Barr King Fahd University of Petroleum & Minerals (KFUPM) Hesham El-Rewini Southern Methodist University A JOHN WILEY & SONS, INC PUBLICATION
More informationCloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:
Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationProfessional ASP.NET 2.0 Databases. Thiru Thangarathinam
Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley
More informationBeginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett
Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter
More informationCOMPUTATIONAL DYNAMICS
COMPUTATIONAL DYNAMICS THIRD EDITION AHMED A. SHABANA Richard and Loan Hill Professor of Engineering University of Illinois at Chicago A John Wiley and Sons, Ltd., Publication COMPUTATIONAL DYNAMICS COMPUTATIONAL
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More informationOracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR
Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by
More informationiwork DUMmIES 2ND EDITION FOR
iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright
More informationDATABASE DESIGN AND DEVELOPMENT
DATABASE DESIGN AND DEVELOPMENT DATABASE DESIGN AND DEVELOPMENT An Essential Guide for IT Professionals PAULRAJ PONNIAH A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley & Sons, Inc.
More informationUPC DISTRIBUTED SHARED MEMORY PROGRAMMING
UPC DISTRIBUTED SHARED MEMORY PROGRAMMING Tarek El-Ghazawi The George Washington University William Carlson IDA Center for Computing Sciences Thomas Sterling California Institute of Technology Katherine
More informationPHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6
Making Everything Easier! 4th Edition PHP & MySQL Learn to: Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Easily install and set up PHP and MySQL using XAMPP Choose a Web host and secure
More informationExploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz
MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,
More informationNetworking. 11th Edition. by Doug Lowe
Networking 11th Edition by Doug Lowe Networking For Dummies, 11th Edition Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright 2016 by John Wiley & Sons,
More informationCapital. Capital Logic Aero. v Student Workbook
Capital v2018.1 Student Workbook 2019 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors
More informationCOMPUTING FOR NUMERICAL METHODS USING VISUAL C++
COMPUTING FOR NUMERICAL METHODS USING VISUAL C++ COMPUTING FOR NUMERICAL METHODS USING VISUAL C++ Shaharuddin Salleh Universiti Teknologi Malaysia Skudai, Johor, Malaysia Albert Y. Zomaya University of
More informationCapital. Capital Logic Generative. v Student Workbook
Capital Capital Logic Generative v2016.1 Student Workbook 2017 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics
More informationSecuring SCADA Systems. Ronald L. Krutz
Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,
More informationPreface. This Book and Simulation Software Bundle Project
Preface This Book and Simulation Software Bundle Project Dear Reader, this book project brings to you a unique study tool for ESD protection solutions used in analog-integrated circuit (IC) design. Quick-start
More informationWireless Sensor and Actuator Networks Algorithms and Protocols for Scalable Coordination and Data Communication Edited by Amiya Nayak and Ivan Stojmenovic A JOHN WILEY & SONS, INC., PUBLICATION Wireless
More informationSecure Web Gateway MIB Data Breakdown
Secure Web Gateway MIB Data Breakdown Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationGuide to RISC Processors
Guide to RISC Processors Sivarama P. Dandamudi Guide to RISC Processors for Programmers and Engineers Sivarama P. Dandamudi School of Computer Science Carleton University Ottawa, ON K1S 5B6 Canada sivarama@scs.carleton.ca
More informationNetwork Performance Analysis
Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and
More informationINFORMATION RETRIEVAL SYSTEMS: Theory and Implementation
INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationThe Internet of Things
The Internet of Things The Internet of Things Connecting Objects to the Web Edited by Hakima Chaouchi First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
More informationLinux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.
DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and
More informationComponent models. Page 1
Component Models and Technology Component-based Software Engineering Ivica Crnkovic ivica.crnkovic@mdh.se Page 1 Overview Introduction ACME Architectural Description Language Java Bean Component Model
More informationDigital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz
Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming by Nasser Kehtarnavaz University
More informationTanner Analog Front End Flow. Student Workbook
Student Workbook 2016 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors and is subject
More informationMULTIMEDIA DATABASE MANAGEMENT SYSTEMS
MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida
More informationJava Quick Syntax Reference. Second Edition. Mikael Olsson
Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):
More informationTopological Structure and Analysis of Interconnection Networks
Topological Structure and Analysis of Interconnection Networks Network Theory and Applications Volume 7 Managing Editors: Ding-Zhu Du, University of Minnesota, U.S.A. and Cauligi Raghavendra, University
More informationCapital. Capital Logic Interactive. v Student Workbook
Capital Capital Logic Interactive v2016.1 Student Workbook Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation
More informationHigh-Performance Oracle Proven Methods for Achieving Optimum Performance and Availability Geoff Ingram Wiley Publishing, Inc. High-Performance Oracle Proven Methods for Achieving Optimum Performance and
More informationCustomizing and Upgrading Linux Second Edition Linda McKinnon Al McKinnon Gearhead Press Wiley Computer Publishing John Wiley & Sons, Inc. Customizing and Upgrading Linux Customizing and Upgrading Linux
More informationHistorical Reliability Data for IEEE 3006 Standards: Power Systems Reliability
IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards
More informationThis page intentionally left blank
Database Concepts This page intentionally left blank Database Concepts Seventh Edition David M. Kroenke David J. Auer Western Washington University Boston Columbus Indianapolis New York San Francisco Hoboken
More informationEMBEDDED SYSTEMS: Jonathan W. Valvano INTRODUCTION TO THE MSP432 MICROCONTROLLER. Volume 1 First Edition June 2015
EMBEDDED SYSTEMS: INTRODUCTION TO THE MSP432 MICROCONTROLLER Volume 1 First Edition June 2015 Jonathan W. Valvano ii Jonathan Valvano First edition 3 rd printing June 2015 The true engineering experience
More informationCOMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM
COMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM COMPUTER SECURITY AND CRYPTOGRAPHY COMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM About the Cover: The term cipher alphabet is used when referring
More informationComputer Science. Computer Science 211. Degrees and Certificates Awarded. A.S. Computer Science Degree Requirements. Program Student Outcomes
Computer Science 211 Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface
More informationLow Level X Window Programming
Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN
More informationTeaching Object-Oriented Programming Concepts Using Visual Basic.NET
Teaching Object-Oriented Programming Concepts Using Visual Basic.NET Ritzhaupt, Albert Dieter;Zucker, Ron James Journal of Information Systems Education; Summer 2006; 17, 2; Research Library pg. 163 Journal
More informationTHE VERILOG? HARDWARE DESCRIPTION LANGUAGE
THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOGf HARDWARE DESCRIPTION LANGUAGE by Donald E. Thomas Carnegie Mellon University and Philip R. Moorby Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS
More informationWindows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson
Windows 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson Acquisitions Editor: Jeff Kellum Development Editor: Gary Schwartz Technical Editors: Troy
More informationTEACH YOURSELF THE BASICS OF ASPEN PLUS
TEACH YOURSELF THE BASICS OF ASPEN PLUS TEACH YOURSELF THE BASICS OF ASPEN PLUS RALPH SCHEFFLAN Chemical Engineering and Materials Science Department Stevens Institute of Technology A JOHN WILEY & SONS,
More informationLOGICAL DATA MODELING
LOGICAL DATA MODELING INTEGRATED SERIES IN INFORMATION SYSTEMS Professor Ramesh Sharda Oklahoma State University Series Editors Prof. Dr. Stefan VoB Universitat Hamburg Expository and Research Monographs
More informationMicrosoft Dynamics GP. Inventory Kardex
Microsoft Dynamics GP Inventory Kardex Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
More informationDeveloping Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation
Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation By the Sun Educational Services Java Technology Team January, 2001 Copyright
More informationPELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX SYSTEM ADMINISTRATION CSIT 2411
PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX SYSTEM ADMINISTRATION CSIT 2411 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: Spring 2010 Catalog Course Description: A study
More informationFUZZY LOGIC WITH ENGINEERING APPLICATIONS
FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY
More informationLAB MANUAL. Craig Zacker.
Free ebooks ==> www.ebook777.com LAB MANUAL Craig Zacker www.ebook777.com Free ebooks ==> www.ebook777.com www.ebook777.com This page is intentionally left blank Free ebooks ==> www.ebook777.com Installing
More informationTessent TestKompress & Adv. Topics. Student Workbook
Student Workbook 2016 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors and is subject
More information"Charting the Course to Your Success!" MOC B Core Solutions of Microsoft Lync Server 2013 Course Summary
MOC 20336 B Core Solutions of Microsoft Lync Course Summary Description This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer a Microsoft Lync solution.
More informationHands-On Oracle Application Express Security
Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.
More informationFunctional Programming in R
Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis
More informationDesign Architect Student Workbook Mentor Graphics Corporation All rights reserved.
Design Architect Student Workbook 1981-2009 Mentor Graphics Corporation All rights reserved. This document contains information that is proprietary to Mentor Graphics Corporation. The original recipient
More informationCorelDRAW X7. Kogent Learning Solutions Inc. Authored by: Published by:
CorelDRAW X7 Authored by: Kogent Learning Solutions Inc. Published by: Copyright by 2014 Dreamtech Press, 19-A, Ansari Road, Daryaganj, New Delhi-110002 This book may not be duplicated in any way without
More informationMicroscan Barcode Reader
Microscan Barcode Reader Device Driver Guide For Research Use Only. Not for use in diagnostic procedures. Original Instructions Notices Agilent Technologies, Inc. 2017 No part of this manual may be reproduced
More informationExperion LX Safety Manager Integration Guide
Experion LX Safety Manager Integration Guide EXDOC-X119-en-110A February 2014 Release 110 Document Release Issue Date EXDOC-X119-en-1 0A 0 February 2014 Disclaimer This document contains Honeywell proprietary
More informationFundamentals of Operating Systems. Fifth Edition
Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business
More informationEnterprise JavaBeans 2.1
Enterprise JavaBeans 2.1 STEFAN DENNINGER and INGO PETERS with ROB CASTANEDA translated by David Kramer APress Media, LLC Enterprise JavaBeans 2.1 Copyright 2003 by Stefan Denninger and Ingo Peters with
More informationSECURITY FOR WIRELESS AD HOC NETWORKS
SECURITY FOR WIRELESS AD HOC NETWORKS SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris Wiley Bicentennial Logo: Richard J. Pacifico Copyright # 2007 by John Wiley & Sons, Inc.
More informationSDH/SONET Explained in Functional Models
SDH/SONET Explained in Functional Models Modeling the Optical Transport Network Huub van Helvoort Networking Consultant, the Netherlands SDH/SONET Explained in Functional Models SDH/SONET Explained in
More informationFileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development
Companion Web Site Example FileMaker Pro 10 application Demos, tips, and additional resources Ray Cologon FileMaker Pro 10 Go from basics to full-scale development Write your own FileMaker applications
More informationPRACTICAL GENETIC ALGORITHMS
PRACTICAL GENETIC ALGORITHMS PRACTICAL GENETIC ALGORITHMS SECOND EDITION Randy L. Haupt Sue Ellen Haupt A JOHN WILEY & SONS, INC., PUBLICATION The book is printed on acid-free paper. Copyright 2004 by
More informationComponent-Level Design. Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman. For non-profit educational use only
Chapter 10 Component-Level Design Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For non-profit
More informationSystemVerilog UVM. Student Workbook
Student Workbook 2017 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors and is subject
More informationGoogle Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice
Making Everything Easier! Google Voice Learn to: Set up and use Google Voice Integrate Google Voice with other Google services such as Gmail and Google Chat Combine Google Voice with your existing phone
More informationIntroduction to componentbased software development
Introduction to componentbased software development Nick Duan 8/31/09 1 Overview What is a component? A brief history of component software What constitute the component technology? Components/Containers/Platforms
More information