Integration Test Plan

Size: px
Start display at page:

Download "Integration Test Plan"

Transcription

1 Integration Test Plan Team B.E.E.F.E.A.T.E.R. Nick Canzoneri Adam Hamilton Georgi Simeonov Nick Wolfgang Matt Wozniski

2 Date: May 1, 2009 Date Description Revision February 17, 2009 Initial revision 1 April 07, 2009 First revision 2 i

3 Contents 1 Introduction Purpose Scope Definitions, Acronyms, and Abbreviations Modules Introduction Project Structure Assumptions and Exclusions Introduction Assumptions Exclusions Testing Procedure Introduction Entry Criteria Exit Criteria Participants Introduction Roles and Responsibilities Reporting References 5 ii

4 1 Introduction 1.1 Purpose This document describes the integration test plan for the Brilliantly Engineered Extensible Framework Enabling AJAX Transaction-based Exchanges Reliably (B.E.E.F.E.A.T.E.R.). B.E.E.F.E.A.T.E.R. is a development scaffold to be used by developers when creating dynamic web-based applications. The B.E.E.F.E.A.T.E.R. project is described in detail in the B.E.E.F.E.A.T.E.R.Requirements Document[1] and B.E.E.F.E.A.T.E.R. Design Document[2]. 1.2 Scope This document describes the integration test procedure and the roles of B.E.E.F.E.A.T.E.R team members and stakeholders. This document is intended for the developers and project stakeholders who will be participants in the test or who will receive test reports. 1.3 Definitions, Acronyms, and Abbreviations Agile A software development methodology that encourages frequent inspection and adaptation of the design and a set of engineering best practices that allow for rapid delivery of high-quality software. AJAX Asynchronous JavaScript and XML. Using AJAX as a technique is the action of using a XML- HttpRequest to get information from the server asynchronously, meaning that the browser engine does not wait for the response from the server. Note that AJAX by design has a same-domain policy, which means that you can only send an XMLHttpRequest to the same domain that the JavaScript code is called from. API Application Programming Interface. An API is composed of the set of functions exported by a library, meant to be called by applications using that library. Client A computer or browser that requests objects from another computer (the server) over the Internet. CSRF Cross-Site Request Forgery, a type of security vulnerability that is exploited when a malicious web site causes a user s browser to perform an unwanted action on a trusted web site. CSS Cascading Style Sheets. It is a language that specifies the presentation of items. Framework A basic conceptual structure used to solve or address complex issues. The framework presented will abstract away the complex implementation details of writing web-based applications, allowing developers to quickly surmount formerly difficult problems. HTML Hypertext Markup Language. It is the primary language used for creating pages on the World Wide Web; other languages like CSS and JavaScript are meant to extend HTML. HTTP Hypertext Transfer Protocol. It is the primary protocol used for requesting web pages from a web server. JavaScript A scripting language that runs on the client. It is used to perform actions on the client and help perform requests to a server. JSON JavaScript Object Notation. It is a data format whose main goal is data interoperability. Modal Dialog A type of dialog that must be dismissed before that dialog s parent window can be interacted with again. Modern browser In this document, the phrase modern browser is used to describe web browsers that support JavaScript version 1.7 or higher and CSS version 2 or higher. This list includes Internet 1

5 Explorer from version 7 on, Firefox from version 2 on, Opera from version 9 on, Safari from version 3 on, and all versions of Google Chrome. Multi-threading The ability to run code with two paths of execution s instructions interlaced, rather than finishing one path before beginning the next sequentially. Mutex A form of execution control that prevents multiple simultaneous threads of execution over a section of code. Polling Requesting a status update. Since HTTP is a pull protocol, the applications will need to request status updates from the server by polling; the server cannot push those status updates. Polling interval The rate at which polling is done. A shorter polling interval means more poll requests per unit time, resulting in greater responsiveness for the application but more strain for the server. POSIX The Portable Operating System Interface. This is the common name for the collection of standards falling under IEEE 1003, which specify the operating system API and interfaces for what are loosely called the UNIX-like Operating Systems. Pull protocol A protocol in which the client-server query is initiated by the client. Push protocol A protocol in which the client-server query is initiated by the server. Round Trip Time A quantifier of network reliability. It measures the average time from the sending of the request to the server until a response from the server is received. Round Trip Timeout A quantifier of network reliability. It is the statistical maximum amount of time a request should take before it is considered to be a timeout. It is calculated from the Round Trip Time plus four standard deviations. Scaffold A programming framework that runs alongside application code to assist the developer by providing functionality. Server A computer or computing system that provides services across a network. SGML Standardized Generalized Markup Language, a metalanguage in which one can develop markup languages. XML, HTML, and XHTML are examples of markup languages that are defined by SGML. State Persistent information stored across a network connection. HTTP is a stateless protocol, meaning that no persistent information is maintained between multiple requests by a user. This poses a design problem for AJAX developers, who need stateful connections. Unit Test Unit tests are highly granular tests that attempt to test all possible paths through a software system and observe that the expected behavior occurs for each case. UNIX A multi-user operating system initially developed by AT&T Bell labs, upon which many of the POSIX standards are based. UNIX-like Unix-like operating systems conform to the POSIX specifications. URL Uniform Resource Locators. These are the addresses by which web pages are located. W3C The World Wide Web Consortium is the international standards organization that governs the standards used on the World Wide Web. W3C compliance means that an application complies to all relevant W3C standards. XHTML Extensible Hypertext Markup Language. XHTML is simply HTML that is written to be XML compliant. XML Extensible Markup Language, a strict subset of SGML meant to be easily machine parsed, human readable, and unambiguous. XSS Cross-Site Scripting, a security vulnerability allowing code injection using a specially formatted URL. 2

6 2 Modules 2.1 Introduction This section describes the modules to be integrated in the B.E.E.F.E.A.T.E.R. project. 2.2 Project Structure The development scaffold exists on the client and server, separated by an HTTP connection. Both the client and server portions of the software are divided into layers. Together, the client and server layers form the scaffold core. On the client side, the scaffold core is comprised of the messaging layer, which reads and writes protocol messages, and the connection management layer, which controls access to and actions upon the HTTP client/server connection. On the server side, the scaffold core is comprised of the messaging layer, which complements the clientside messaging layer, and the authentication / session layer, which verifies and attaches state to incoming HTTP requests. In addition to the scaffold core layers, a development library exists on the client-side of the application, providing extensions to the JavaScript language capabilities. Because our project forms a development scaffold, each individual module operates independently and can be combined in different ways as needed by the applications created with the scaffold. Therefore, our integration testing needs to show that each module can be combined with different combinations of other modules. 3 Assumptions and Exclusions 3.1 Introduction This section describes the assumptions and exclusions present in the integration test procedure. 3.2 Assumptions Each module is assumed to have passed unit tests displaying that its internal logic is working correctly. Integration testing will only test the interaction between modules and will not test the inner workings of each module. 3.3 Exclusions Since the number of ways that modules can be combined is too large to test exhaustively, we will test a carefully selected subset of combinations to build assurance that the modules interact correctly. 3

7 4 Testing Procedure 4.1 Introduction As part of our project, we are creating several demo applications that demonstrate diverse uses of our development scaffold. These demo applications are specifically chosen because they demonstrate different ways to combine the various features of our framework. As a result, these applications provide an implicit integration test of the framework, as each combines a different subset of our scaffold s modules and allows them to work together to accomplish a set task. Thus, our scaffold s modules successfully integrate when our demo applications work correctly and can utilize their selected subset of modules together. 4.2 Entry Criteria Integration testing may begin when: all modules have successfully undergone unit testing the sample integration applications have been completed consent of the project leader and test leader is obtained 4.3 Exit Criteria Integration testing ends successfully when: no defects or deficiencies are observed after all testing is completed Integration testing ends unsuccessfully when: a defect or deficiency is observed during testing the testing team must end testing before all tests can be completed 5 Participants 5.1 Introduction This section describes the roles and responsibilities of team members during integration testing. 5.2 Roles and Responsibilities For the integration tests, the following roles will be assumed by B.E.E.F.E.A.T.E.R. team members: Project Lead Matthew Wozniski Test Lead Nick Canzoneri Testers Adam Hamilton, Nick Wolfgang, Georgi Simeonov 5.3 Reporting If any defects are discovered during integration testing, they must be reported to the Test Lead, who will report the problem to the Project Lead to be addressed during the next meeting. 4

8 6 References 1. Nick Canzoneri, Adam Hamilton, Georgi Simeonov, Nick Wolfgang, Matthew Wozniski. Requirements Document for Team B.E.E.F.E.A.T.E.R., Nick Canzoneri, Adam Hamilton, Georgi Simeonov, Nick Wolfgang, Matthew Wozniski. Design Document for Team B.E.E.F.E.A.T.E.R.,

Requirements Document

Requirements Document Requirements Document Team B.E.E.F.E.A.T.E.R. Nick Canzoneri Adam Hamilton Georgi Simeonov Nick Wolfgang Matt Wozniski Date: May 1, 2009 Date Description Revision November 25, 2008 Initial version 1 February

More information

HTML5 MOCK TEST HTML5 MOCK TEST I

HTML5 MOCK TEST HTML5 MOCK TEST I http://www.tutorialspoint.com HTML5 MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to HTML5 Framework. You can download these sample mock tests at your

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Web basics: HTTP cookies

Web basics: HTTP cookies Web basics: HTTP cookies Myrto Arapinis School of Informatics University of Edinburgh February 11, 2016 1 / 27 How is state managed in HTTP sessions HTTP is stateless: when a client sends a request, the

More information

A network is a group of two or more computers that are connected to share resources and information.

A network is a group of two or more computers that are connected to share resources and information. Chapter 1 Introduction to HTML, XHTML, and CSS HTML Hypertext Markup Language XHTML Extensible Hypertext Markup Language CSS Cascading Style Sheets The Internet is a worldwide collection of computers and

More information

Developing Ajax Web Apps with GWT. Session I

Developing Ajax Web Apps with GWT. Session I Developing Ajax Web Apps with GWT Session I Contents Introduction Traditional Web RIAs Emergence of Ajax Ajax ( GWT ) Google Web Toolkit Installing and Setting up GWT in Eclipse The Project Structure Running

More information

HTML, XHTML, and CSS. Sixth Edition. Chapter 1. Introduction to HTML, XHTML, and

HTML, XHTML, and CSS. Sixth Edition. Chapter 1. Introduction to HTML, XHTML, and HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS Chapter Objectives Describe the Internet and its associated key terms Describe the World Wide Web and its associated key

More information

Developing Applications with Java EE 6 on WebLogic Server 12c

Developing Applications with Java EE 6 on WebLogic Server 12c Developing Applications with Java EE 6 on WebLogic Server 12c Duration: 5 Days What you will learn The Developing Applications with Java EE 6 on WebLogic Server 12c course teaches you the skills you need

More information

The course also includes an overview of some of the most popular frameworks that you will most likely encounter in your real work environments.

The course also includes an overview of some of the most popular frameworks that you will most likely encounter in your real work environments. Web Development WEB101: Web Development Fundamentals using HTML, CSS and JavaScript $2,495.00 5 Days Replay Class Recordings included with this course Upcoming Dates Course Description This 5-day instructor-led

More information

How is state managed in HTTP sessions. Web basics: HTTP cookies. Hidden fields (2) The principle. Disadvantage of this approach

How is state managed in HTTP sessions. Web basics: HTTP cookies. Hidden fields (2) The principle. Disadvantage of this approach Web basics: HTTP cookies Myrto Arapinis School of Informatics University of Edinburgh March 30, 2015 How is state managed in HTTP sessions HTTP is stateless: when a client sends a request, the server sends

More information

Web Systems & Technologies: An Introduction

Web Systems & Technologies: An Introduction Web Systems & Technologies: An Introduction Prof. Ing. Andrea Omicini Ingegneria Due, Università di Bologna a Cesena andrea.omicini@unibo.it 2006-2007 Web Systems Architecture Basic architecture information

More information

Lesson 12: JavaScript and AJAX

Lesson 12: JavaScript and AJAX Lesson 12: JavaScript and AJAX Objectives Define fundamental AJAX elements and procedures Diagram common interactions among JavaScript, XML and XHTML Identify key XML structures and restrictions in relation

More information

Web 2.0, AJAX and RIAs

Web 2.0, AJAX and RIAs Web 2.0, AJAX and RIAs Asynchronous JavaScript and XML Rich Internet Applications Markus Angermeier November, 2005 - some of the themes of Web 2.0, with example-sites and services Web 2.0 Common usage

More information

,

, Weekdays:- 1½ hrs / 3 days Fastrack:- 1½hrs / Day [Class Room and Online] ISO 9001:2015 CERTIFIED ADMEC Multimedia Institute www.admecindia.co.in 9911782350, 9811818122 Welcome to one of the highly professional

More information

Part of this connection identifies how the response can / should be provided to the client code via the use of a callback routine.

Part of this connection identifies how the response can / should be provided to the client code via the use of a callback routine. What is AJAX? In one sense, AJAX is simply an acronym for Asynchronous JavaScript And XML In another, it is a protocol for sending requests from a client (web page) to a server, and how the information

More information

Content Security Policy

Content Security Policy About Tim Content Security Policy New Tools for Fighting XSS Pentester > 10 years Web Applications Network Security Products Exploit Research Founded Blindspot Security in 2014 Pentesting Developer Training

More information

Unit Notes. ICAWEB501A Build a dynamic website Topic 4 Test web application

Unit Notes. ICAWEB501A Build a dynamic website Topic 4 Test web application Unit Notes ICAWEB501A Build a dynamic website Topic 4 Test web application Copyright, 2014 by TAFE NSW - North Coast Institute Date last saved: 10 March 2014 by Amanda Walker Version: 1.0 # of Pages =

More information

Web basics: HTTP cookies

Web basics: HTTP cookies Web basics: HTTP cookies Myrto Arapinis School of Informatics University of Edinburgh November 20, 2017 1 / 32 How is state managed in HTTP sessions HTTP is stateless: when a client sends a request, the

More information

RKN 2015 Application Layer Short Summary

RKN 2015 Application Layer Short Summary RKN 2015 Application Layer Short Summary HTTP standard version now: 1.1 (former 1.0 HTTP /2.0 in draft form, already used HTTP Requests Headers and body counterpart: answer Safe methods (requests): GET,

More information

powered by Series of Tubes Senator Ted Stevens talking about the Net Neutrality Bill Jul 17, powered by

powered by Series of Tubes Senator Ted Stevens talking about the Net Neutrality Bill Jul 17, powered by Page 1 Lecture Notes 1: The Internet and World Wide Web CSE 190 M (Web Programming), Spring 2007 University of Washington Reading: Sebesta Ch. 1 sections 1.1-1.5.2, 1.7-1.8.5, 1.8.8, 1.9 What is the Internet?

More information

Requirements Specification

Requirements Specification Requirements Specification Smart Scheduling Requested by: Dr. Robert Yoder Associate Professor of Computer Science Computer Science Department Head Siena College Tom Mottola Jason Czajkowski Brian Maxwell

More information

Chapter 10 Web-based Information Systems

Chapter 10 Web-based Information Systems Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 10 Web-based Information Systems Role of the WWW for IS Initial

More information

Chrome Extension Security Architecture

Chrome Extension Security Architecture Chrome Extension Security Architecture Presenter: Jienan Liu Network, Intelligence & security Lab outline Chrome extension introduction Threats towards extension Chrome extension s security architecture

More information

Web Technology for Test and Automation Applications

Web Technology for Test and Automation Applications Web Technology for Test and Automation Applications Fanie Coetzer - FSE Demo Operator Technician Engineers Your boss Test Sequencer 3 Goal I know nothing I know what it takes to get started on web applications

More information

CSCI 6312 Advanced Internet Programming

CSCI 6312 Advanced Internet Programming CSCI 6312 Advanced Internet Programming Section 01, Spring 2018, W, 5:55pm - 8:25pm Instructor: Emmett Tomai Office: ENGR 3.2100 Phone: 665-7229 Email: emmett.tomai@utrgv.edu Office hours: W 1 3pm, TR

More information

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary INTERNET ENGINEERING HTTP Protocol Sadegh Aliakbary Agenda HTTP Protocol HTTP Methods HTTP Request and Response State in HTTP Internet Engineering 2 HTTP HTTP Hyper-Text Transfer Protocol (HTTP) The fundamental

More information

Tabular Presentation of the Application Software Extended Package for Web Browsers

Tabular Presentation of the Application Software Extended Package for Web Browsers Tabular Presentation of the Application Software Extended Package for Web Browsers Version: 2.0 2015-06-16 National Information Assurance Partnership Revision History Version Date Comment v 2.0 2015-06-16

More information

Ajax Ajax Ajax = Asynchronous JavaScript and XML Using a set of methods built in to JavaScript to transfer data between the browser and a server in the background Reduces the amount of data that must be

More information

Cleveland State University Department of Electrical and Computer Engineering. CIS 408: Internet Computing

Cleveland State University Department of Electrical and Computer Engineering. CIS 408: Internet Computing Cleveland State University Department of Electrical and Computer Engineering CIS 408: Internet Computing Catalog Description: CIS 408 Internet Computing (-0-) Pre-requisite: CIS 265 World-Wide Web is now

More information

Web Systems & Technologies: An Introduction

Web Systems & Technologies: An Introduction Web Systems & Technologies: An Introduction Prof. Ing. Andrea Omicini Ingegneria Due, Università di Bologna a Cesena andrea.omicini@unibo.it 2005-2006 Web Systems Architecture Basic architecture information

More information

Chapter 9. Web Applications The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill

Chapter 9. Web Applications The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 9 Web Applications McGraw-Hill 2010 The McGraw-Hill Companies, Inc. All rights reserved. Chapter Objectives - 1 Explain the functions of the server and the client in Web programming Create a Web

More information

ASSESSMENT SUMMARY XHTML 1.1 (W3C) Date: 27/03/ / 6 Doc.Version: 0.90

ASSESSMENT SUMMARY XHTML 1.1 (W3C) Date: 27/03/ / 6 Doc.Version: 0.90 ASSESSMENT SUMMARY XHTML 1.1 (W3C) Date: 27/03/2017 1 / 6 Doc.Version: 0.90 TABLE OF CONTENTS 1. INTRODUCTION... 3 2. ASSESSMENT SUMMARY... 3 3. ASSESSMENT RESULTS... 5 4. ASSESSMENT OBSERVATIONS... 5

More information

Group 1. SAJAX: The Road to Secure and Efficient Applications. - Final Project Report -

Group 1. SAJAX: The Road to Secure and Efficient Applications. - Final Project Report - Group 1 SAJAX: The Road to Secure and Efficient Applications - Final Project Report - Thu Do, Matt Henry, Peter Knolle, Ahmad Yasin George Mason University, 2006/07/15 SAJAX: The Road to Secure and Efficient

More information

Ajax Ajax Ajax = Asynchronous JavaScript and XML Using a set of methods built in to JavaScript to transfer data between the browser and a server in the background Reduces the amount of data that must be

More information

Web Site Design and Development. CS 0134 Fall 2018 Tues and Thurs 1:00 2:15PM

Web Site Design and Development. CS 0134 Fall 2018 Tues and Thurs 1:00 2:15PM Web Site Design and Development CS 0134 Fall 2018 Tues and Thurs 1:00 2:15PM By the end of this course you will be able to Design a static website from scratch Use HTML5 and CSS3 to build the site you

More information

Computer Security 3e. Dieter Gollmann. Chapter 18: 1

Computer Security 3e. Dieter Gollmann.  Chapter 18: 1 Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann Chapter 18: 1 Chapter 18: Web Security Chapter 18: 2 Web 1.0 browser HTTP request HTML + CSS data web server backend systems Chapter

More information

EasyCrypt passes an independent security audit

EasyCrypt passes an independent security audit July 24, 2017 EasyCrypt passes an independent security audit EasyCrypt, a Swiss-based email encryption and privacy service, announced that it has passed an independent security audit. The audit was sponsored

More information

Announcements. 1. Class webpage: Have you been reading the announcements? Lecture slides and coding examples will be posted

Announcements. 1. Class webpage: Have you been reading the announcements? Lecture slides and coding examples will be posted Announcements 1. Class webpage: Have you been reading the announcements? Lecture slides and coding examples will be posted 2. Install Komodo Edit on your computer right away. 3. Bring laptops to next class

More information

Security in a Mainframe Emulator. Chaining Security Vulnerabilities Until Disaster Strikes (twice) Author Tim Thurlings & Meiyer Goren

Security in a Mainframe Emulator. Chaining Security Vulnerabilities Until Disaster Strikes (twice) Author Tim Thurlings & Meiyer Goren Security in a Mainframe Emulator Chaining Security Vulnerabilities Until Disaster Strikes (twice) Author Tim Thurlings & Meiyer Goren October 25, 2017 Table of Contents Introduction... 2 About this paper...

More information

Index LICENSED PRODUCT NOT FOR RESALE

Index LICENSED PRODUCT NOT FOR RESALE Index LICENSED PRODUCT NOT FOR RESALE A Absolute positioning, 100 102 with multi-columns, 101 Accelerometer, 263 Access data, 225 227 Adding elements, 209 211 to display, 210 Animated boxes creation using

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 2, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2465 1 Assignment

More information

Internet programming Lab. Lecturer Mariam A. Salih

Internet programming Lab. Lecturer Mariam A. Salih Internet programming Lab. Lecturer Mariam A. Salih The Internet : The Internet is a worldwide network of computer systems through which information can be easily shared. Browsers : To view information

More information

TIME SCHEDULE MODULE TOPICS PERIODS. HTML Document Object Model (DOM) and javascript Object Notation (JSON)

TIME SCHEDULE MODULE TOPICS PERIODS. HTML Document Object Model (DOM) and javascript Object Notation (JSON) COURSE TITLE : ADVANCED WEB DESIGN COURSE CODE : 5262 COURSE CATEGORY : A PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 HTML Document Object Model (DOM) and javascript

More information

The Business Value of Open Standards. Michael(tm) Smith

The Business Value of Open Standards. Michael(tm) Smith The Business Value of Open Standards Michael(tm) Smith mike@w3.org Key W3C standards for the Web HTTP HTML and XHTML CSS The W3C DOM HTTP Development of HTTP (Hypertext Transfer Protocol) was coordinated

More information

ANAND COMMUNICATION CARE M 342, RAGHUBIR NAGAR, NEW DELHI

ANAND COMMUNICATION CARE M 342, RAGHUBIR NAGAR, NEW DELHI Favicon Title Protocol: SSL URL / IP Address Body Top Level Domain Name Domain Name Country Path Title Tag Meta Description Post Date / Time Display URL Anatomy of URL: https://www.google.co.in/search?

More information

REST AND AJAX. Introduction. Module 13

REST AND AJAX. Introduction. Module 13 Module 13 REST AND AJAX Introduction > Until now we have been building quite a classic web application: we send a request to the server, the server processes the request, and we render the result and show

More information

Automated Web Application Testing Using Selenium

Automated Web Application Testing Using Selenium Worcester Polytechnic Institute Digital WPI Major Qualifying Projects (All Years) Major Qualifying Projects March 2017 Automated Web Application Testing Using Selenium Benjamin I. Chaney Worcester Polytechnic

More information

Delivery Options: Attend face-to-face in the classroom or remote-live attendance.

Delivery Options: Attend face-to-face in the classroom or remote-live attendance. XML Programming Duration: 5 Days Price: $2795 *California residents and government employees call for pricing. Discounts: We offer multiple discount options. Click here for more info. Delivery Options:

More information

= a hypertext system which is accessible via internet

= a hypertext system which is accessible via internet 10. The World Wide Web (WWW) = a hypertext system which is accessible via internet (WWW is only one sort of using the internet others are e-mail, ftp, telnet, internet telephone... ) Hypertext: Pages of

More information

Master Project Software Engineering: Team-based Development WS 2010/11

Master Project Software Engineering: Team-based Development WS 2010/11 Master Project Software Engineering: Team-based Development WS 2010/11 Implementation, September 27 th, 2011 Glib Kupetov Glib.Kupetov@iese.fraunhofer.de Tel.: +49 (631) 6800 2128 Sebastian Weber Sebastian.Weber@iese.fraunhofer.de

More information

ThingLink User Guide. Andy Chen Eric Ouyang Giovanni Tenorio Ashton Yon

ThingLink User Guide. Andy Chen Eric Ouyang Giovanni Tenorio Ashton Yon ThingLink User Guide Yon Corp Andy Chen Eric Ouyang Giovanni Tenorio Ashton Yon Index Preface.. 2 Overview... 3 Installation. 4 Functionality. 5 Troubleshooting... 6 FAQ... 7 Contact Information. 8 Appendix...

More information

Hypertext Markup Language, or HTML, is a markup

Hypertext Markup Language, or HTML, is a markup Introduction to HTML Hypertext Markup Language, or HTML, is a markup language that enables you to structure and display content such as text, images, and links in Web pages. HTML is a very fast and efficient

More information

Overview Cross-Site Scripting (XSS) Christopher Lam Introduction Description Programming Languages used Types of Attacks Reasons for XSS Utilization Attack Scenarios Steps to an XSS Attack Compromises

More information

Web Design. Basic Concepts

Web Design. Basic Concepts Web Design Basic Concepts Web Design Web Design: Web design is the creation of a Web page using hypertext or hypermedia to be viewed on the World Wide Web. Web sites may be relatively simple, or highly

More information

Acceptance Test. Smart Scheduling. Empire Unlimited. Requested by:

Acceptance Test. Smart Scheduling. Empire Unlimited. Requested by: Smart Scheduling Requested by: Dr. Robert Yoder Computer Science Department Head Siena College Department of Computer Science Prepared by: Meghan Servello Thomas Mottola Jonathan Smith Jason Czajkowski

More information

Penetration Test Report

Penetration Test Report Penetration Test Report Feb 12, 2018 Ethnio, Inc. 6121 W SUNSET BLVD LOS angeles, CA 90028 Tel (888) 879-7439 ETHN.io Summary This document contains the most recent pen test results from our third party

More information

Contents. 1. Using Cherry 1.1 Getting started 1.2 Logging in

Contents. 1. Using Cherry 1.1 Getting started 1.2 Logging in 1 Contents 1. Using Cherry 1.1 Getting started 1.2 Logging in 2. Site Page Hierarchy Management 2.1 Page Addition 2.2 Page Deletion 2.3 Editing Page Details 3. Page Content Modification 3.1 Page Revisions

More information

Delivery Options: Attend face-to-face in the classroom or via remote-live attendance.

Delivery Options: Attend face-to-face in the classroom or via remote-live attendance. XML Programming Duration: 5 Days US Price: $2795 UK Price: 1,995 *Prices are subject to VAT CA Price: CDN$3,275 *Prices are subject to GST/HST Delivery Options: Attend face-to-face in the classroom or

More information

VINEPILOT. Project Design Specification. v2.0 - The Savvy-gnon Team

VINEPILOT. Project Design Specification. v2.0 - The Savvy-gnon Team VINEPILOT Project Design Specification v2.0 - The Savvy-gnon Team Amy Chen hsuanchen@umail.ucsb.edu Iris Eleni Moridis iriselenimoridis@gmail.com Richard Waltman rtwaltman@umail.ucsb.edu Chien Wang chienkaiwang0827@gmail.com

More information

An Overview of. Eric Bollens ebollens AT ucla.edu Mobile Web Framework Architect UCLA Office of Information Technology

An Overview of. Eric Bollens ebollens AT ucla.edu Mobile Web Framework Architect UCLA Office of Information Technology An Overview of Eric Bollens ebollens AT ucla.edu Mobile Web Framework Architect UCLA Office of Information Technology August 23, 2011 1. Design Principles 2. Architectural Patterns 3. Building for Degradation

More information

Web Application with AJAX. Kateb, Faris; Ahmed, Mohammed; Alzahrani, Omar. University of Colorado, Colorado Springs

Web Application with AJAX. Kateb, Faris; Ahmed, Mohammed; Alzahrani, Omar. University of Colorado, Colorado Springs Web Application with AJAX Kateb, Faris; Ahmed, Mohammed; Alzahrani, Omar University of Colorado, Colorado Springs CS 526 Advanced Internet and Web Systems Abstract Asynchronous JavaScript and XML or Ajax

More information

PRISMTECH. RESTful DDS. Expanding the reach of the information backbone. Powering Netcentricity

PRISMTECH. RESTful DDS. Expanding the reach of the information backbone. Powering Netcentricity PRISMTECH Powering Netcentricity RESTful DDS Expanding the reach of the information backbone Reinier Torenbeek Senior Solutions Architecht reinier.torenbeek@prismtech.com RESTful DDS Introduction What

More information

Ajax Enabled Web Application Model with Comet Programming

Ajax Enabled Web Application Model with Comet Programming International Journal of Engineering and Technology Volume 2. 7, July, 2012 Ajax Enabled Web Application Model with Comet Programming Rajendra Kachhwaha 1, Priyadarshi Patni 2 1 Department of I.T., Faculty

More information

Department of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System

Department of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System Department of Computer Science and Engineering The University of Texas at Arlington Team: TimeKeepers Project: Team Members: Dineth Hettiarachchi Damber Khadka Devkishen Sisodia Samir Shrestha Tasneem

More information

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology Securing Cloud Applications with a Distributed Web Application Firewall www.riverbed.com 2013 Riverbed Technology Primary Target of Attack Shifting from Networks and Infrastructure to Applications NETWORKS

More information

20480C: Programming in HTML5 with JavaScript and CSS3. Course Code: 20480C; Duration: 5 days; Instructor-led. JavaScript code.

20480C: Programming in HTML5 with JavaScript and CSS3. Course Code: 20480C; Duration: 5 days; Instructor-led. JavaScript code. 20480C: Programming in HTML5 with JavaScript and CSS3 Course Code: 20480C; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This course provides an introduction to HTML5, CSS3, and JavaScript. This

More information

DDC Learning Web Design with Adobe CS5 Georgia Edition 2011

DDC Learning Web Design with Adobe CS5 Georgia Edition 2011 A Correlation of DDC Learning Web Design with Adobe CS5 Georgia Edition 2011 To the Georgia Performance Standards for Fundamentals of Web Design FORMAT FOR CORRELATION TO THE GEORGIA PERFORMANCE STANDARDS

More information

Java Applets, etc. Instructor: Dmitri A. Gusev. Fall Lecture 25, December 5, CS 502: Computers and Communications Technology

Java Applets, etc. Instructor: Dmitri A. Gusev. Fall Lecture 25, December 5, CS 502: Computers and Communications Technology Java Applets, etc. Instructor: Dmitri A. Gusev Fall 2007 CS 502: Computers and Communications Technology Lecture 25, December 5, 2007 CGI (Common Gateway Interface) CGI is a standard for handling forms'

More information

MRK260. Week Two. Graphic and Web Design

MRK260. Week Two. Graphic and Web Design MRK260 Week Two Graphic and Web Design This weeks topics BASIC HTML AND CSS MRK260 - Graphic & Web Design - Week Two 2 Lesson Summary What is HTML? Introduction to HTML Basics Introduction to CSS Introduction

More information

COMSC-030 Web Site Development- Part 1. Part-Time Instructor: Joenil Mistal

COMSC-030 Web Site Development- Part 1. Part-Time Instructor: Joenil Mistal COMSC-030 Web Site Development- Part 1 Part-Time Instructor: Joenil Mistal Chapter 1 1 HTML and Web Page Basics Are you interested in building your own Web pages? This chapter introduces you to basic HTML

More information

Semantic Web Lecture Part 1. Prof. Do van Thanh

Semantic Web Lecture Part 1. Prof. Do van Thanh Semantic Web Lecture Part 1 Prof. Do van Thanh Overview of the lecture Part 1 Why Semantic Web? Part 2 Semantic Web components: XML - XML Schema Part 3 - Semantic Web components: RDF RDF Schema Part 4

More information

The Now Platform Reference Guide

The Now Platform Reference Guide The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service

More information

A Closer Look at XPages in IBM Lotus Domino Designer 8.5 Ray Chan Advisory I/T Specialist Lotus, IBM Software Group

A Closer Look at XPages in IBM Lotus Domino Designer 8.5 Ray Chan Advisory I/T Specialist Lotus, IBM Software Group A Closer Look at XPages in IBM Lotus Domino Designer 8.5 Ray Chan Advisory I/T Specialist Lotus, IBM Software Group 2008 IBM Corporation Agenda XPage overview From palette to properties: Controls, Ajax

More information

Certification Report

Certification Report Certification Report Standard Edition v2.8.2 RELEASE Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

5/19/2015. Objectives. JavaScript, Sixth Edition. Introduction to the World Wide Web (cont d.) Introduction to the World Wide Web

5/19/2015. Objectives. JavaScript, Sixth Edition. Introduction to the World Wide Web (cont d.) Introduction to the World Wide Web Objectives JavaScript, Sixth Edition Chapter 1 Introduction to JavaScript When you complete this chapter, you will be able to: Explain the history of the World Wide Web Describe the difference between

More information

[MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document

[MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document [MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation.

More information

Improving Web Security:

Improving Web Security: Finding and fixing vulnerabilities in web security mechanisms Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell and Dawn Song Stanford Computer Security Lab Improving Web Security: Introduction

More information

Languages in WEB. E-Business Technologies. Summer Semester Submitted to. Prof. Dr. Eduard Heindl. Prepared by

Languages in WEB. E-Business Technologies. Summer Semester Submitted to. Prof. Dr. Eduard Heindl. Prepared by Languages in WEB E-Business Technologies Summer Semester 2009 Submitted to Prof. Dr. Eduard Heindl Prepared by Jenisha Kshatriya (Mat no. 232521) Fakultät Wirtschaftsinformatik Hochshule Furtwangen University

More information

Assignment: Seminole Movie Connection

Assignment: Seminole Movie Connection Assignment: Seminole Movie Connection Assignment Objectives: Building an application using an Application Programming Interface (API) Parse JSON data from an HTTP response message Use Ajax methods and

More information

WEB SECURITY WORKSHOP TEXSAW Presented by Solomon Boyd and Jiayang Wang

WEB SECURITY WORKSHOP TEXSAW Presented by Solomon Boyd and Jiayang Wang WEB SECURITY WORKSHOP TEXSAW 2014 Presented by Solomon Boyd and Jiayang Wang Introduction and Background Targets Web Applications Web Pages Databases Goals Steal data Gain access to system Bypass authentication

More information

CS WEB TECHNOLOGY

CS WEB TECHNOLOGY CS1019 - WEB TECHNOLOGY UNIT 1 INTRODUCTION 9 Internet Principles Basic Web Concepts Client/Server model retrieving data from Internet HTM and Scripting Languages Standard Generalized Mark up languages

More information

Cross-Browser Functional Testing Best Practices

Cross-Browser Functional Testing Best Practices White Paper Application Delivery Management Cross-Browser Functional Testing Best Practices Unified Functional Testing Best Practices Series Table of Contents page Introduction to Cross-Browser Functional

More information

MASTERS COURSE IN FULL STACK WEB APPLICATION DEVELOPMENT W W W. W E B S T A C K A C A D E M Y. C O M

MASTERS COURSE IN FULL STACK WEB APPLICATION DEVELOPMENT W W W. W E B S T A C K A C A D E M Y. C O M MASTERS COURSE IN FULL STACK WEB APPLICATION DEVELOPMENT W W W. W E B S T A C K A C A D E M Y. C O M COURSE OBJECTIVES Enable participants to develop a complete web application from the scratch that includes

More information

Ranking Vulnerability for Web Application based on Severity Ratings Analysis

Ranking Vulnerability for Web Application based on Severity Ratings Analysis Ranking Vulnerability for Web Application based on Severity Ratings Analysis Nitish Kumar #1, Kumar Rajnish #2 Anil Kumar #3 1,2,3 Department of Computer Science & Engineering, Birla Institute of Technology,

More information

1Site Development Foundations Objectives and Locations

1Site Development Foundations Objectives and Locations Appendix-1 1Site Development Foundations Objectives and Locations Domain 2.1 Demonstrate knowledge required to create a Web page. 2.1.1 Relate the history of markup languages to current techniques and

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

Introduction to XML. Asst. Prof. Dr. Kanda Runapongsa Saikaew Dept. of Computer Engineering Khon Kaen University

Introduction to XML. Asst. Prof. Dr. Kanda Runapongsa Saikaew Dept. of Computer Engineering Khon Kaen University Introduction to XML Asst. Prof. Dr. Kanda Runapongsa Saikaew Dept. of Computer Engineering Khon Kaen University http://gear.kku.ac.th/~krunapon/xmlws 1 Topics p What is XML? p Why XML? p Where does XML

More information

AJAX Programming Overview. Introduction. Overview

AJAX Programming Overview. Introduction. Overview AJAX Programming Overview Introduction Overview In the world of Web programming, AJAX stands for Asynchronous JavaScript and XML, which is a technique for developing more efficient interactive Web applications.

More information

CIS 4360 Secure Computer Systems XSS

CIS 4360 Secure Computer Systems XSS CIS 4360 Secure Computer Systems XSS Professor Qiang Zeng Spring 2017 Some slides are adapted from the web pages by Kallin and Valbuena Previous Class Two important criteria to evaluate an Intrusion Detection

More information

Robust Defenses for Cross-Site Request Forgery

Robust Defenses for Cross-Site Request Forgery Robust Defenses for Cross-Site Request Forgery Tsampanaki Nikoleta Lilitsis Prodromos Gigis Petros Paper Authors: Adam Barth, Collin Jackson, John C. Mitchell Outline What is CSRF attack? What is a login

More information

ICAWEB429A Create a markup language document to specification

ICAWEB429A Create a markup language document to specification ICAWEB429A Create a markup language document to specification Release: 1 ICAWEB429A Create a markup language document to specification Modification History Release Release 1 Comments This Unit first released

More information

Announcements. 1. Class webpage: Have you been reading the announcements? Lecture slides and coding examples will be posted

Announcements. 1. Class webpage: Have you been reading the announcements? Lecture slides and coding examples will be posted Announcements 1. Class webpage: Have you been reading the announcements? Lecture slides and coding examples will be posted 2. Campus is closed on Monday. 3. Install Komodo Edit on your computer this weekend.

More information

Entry Level Assessment Blueprint Web Design

Entry Level Assessment Blueprint Web Design Blueprint Web Design Test Code: 3750 / Version: 01 Specific Competencies and Skills Tested in this Assessment: Internet Basics Describe the process of information exchange between web server and client

More information

Web Application Security

Web Application Security Web Application Security Rajendra Kachhwaha rajendra1983@gmail.com September 23, 2015 Lecture 13: 1/ 18 Outline Introduction to AJAX: 1 What is AJAX 2 Why & When use AJAX 3 What is an AJAX Web Application

More information

Web Standards Mastering HTML5, CSS3, and XML

Web Standards Mastering HTML5, CSS3, and XML Web Standards Mastering HTML5, CSS3, and XML Leslie F. Sikos, Ph.D. orders-ny@springer-sbm.com www.springeronline.com rights@apress.com www.apress.com www.apress.com/bulk-sales www.apress.com Contents

More information

Certification Report

Certification Report Certification Report Nutanix Virtual Computing Platform v3.5.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Financial. AngularJS. AngularJS.

Financial. AngularJS. AngularJS. Financial http://killexams.com/exam-detail/ Section 1: Sec One (1 to 50) Details:This section provides a huge collection of Angularjs Interview Questions with their answers hidden in a box to challenge

More information

Web Design and Application Development

Web Design and Application Development Yarmouk University Providing Fundamental ICT Skills for Syrian Refugees (PFISR) Web Design and Application Development Dr. Abdel-Karim Al-Tamimi altamimi@yu.edu.jo Lecture 01 A. Al-Tamimi 1 Lecture Overview

More information

Ajax- XMLHttpResponse. Returns a value such as ArrayBuffer, Blob, Document, JavaScript object, or a DOMString, based on the value of

Ajax- XMLHttpResponse. Returns a value such as ArrayBuffer, Blob, Document, JavaScript object, or a DOMString, based on the value of Ajax- XMLHttpResponse XMLHttpResponse - A Read only field Returns a value such as ArrayBuffer, Blob, Document, JavaScript object, or a DOMString, based on the value of XMLHttpRequest.responseType. This

More information

RIA Security - Broken By Design. Joonas Lehtinen IT Mill - CEO

RIA Security - Broken By Design. Joonas Lehtinen IT Mill - CEO RIA Security - Broken By Design Joonas Lehtinen IT Mill - CEO a system is secure if it is designed to be secure and there are no bugs no system should be designed to be insecure not all bugs are security

More information