• Book

    UML 2 - Modélisation des objets

    Auteur: Laurent Debrauwer

    UML 2 - Modélisation des objets

    • Auteur: Laurent Debrauwer
    • ISBN: 978 2 7460 5474 5

    Ce livre est extrait du titre UML2 - Initiation, exemples et corrigés dans la collection Ressources Informatiques aux Editions ENI. Si vous pratiquez la modélisation de systèmes, il vous donnera les moyens d'apprendre UML 2 et de vous exercer. Si vous êtes débutant, aucun pré-requis particulier n'est nécessaire. Si vous connaissez déjà la première version d'UML, le livre vous apprendra à tirer profit des extensions apportées par la version 2. Si vous avez déjà travaillé avec le modèle entités-relations, vous découvrirez la puissance apportée par UML 2 en modélisation des objets.

  • Book

    UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design

    Auteur: Jim Arlow, Ila Neustadt

    UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design

    • Auteur: Jim Arlow, Ila Neustadt
    • ISBN: 0 321 32127 8

    "This book manages to convey the practical use of UML 2 in clear and understandable terms with many examples and guidelines. Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and reference for the experienced practitioner."--Roland Leibundgut, Technical Director, Zuehlke Engineering Ltd."This book is a good starting point for organizations and individuals who are adopting UP and need to understand how to provide visualization of the different aspects needed to satisfy it. "--Eric Naiburg, Market Manager, Desktop Products, IBM Rational SoftwareThis thoroughly revised edition provides an indispensable and practical guide to the complex process of object-oriented analysis and design using UML 2. It describes how the process of OO analysis and design fits into the software development lifecycle as defined by the Unified Process (UP).UML 2 and the Unified Process contains a wealth of practical, powerful, and useful techniques that you can apply immediately. As you progress through the text, you will learn OO analysis and design techniques, UML syntax and semantics, and the relevant aspects of the UP. The book provides you with an accurate and succinct summary of both UML and UP from the point of view of the OO analyst and designer.This book providesChapter roadmaps, detailed diagrams, and margin notes allowing you to focus on your needsOutline summaries for each chapter, making it ideal for revision, and a comprehensive index that can be used as a referenceNew to this edition:Completely revised and updated for UML 2 syntaxEasy to understand explanations of the new UML 2 semanticsMore real-world examplesA new section on the Object Constraint Language (OCL)Introductory material on the OMG's Model Driven Architecture (MDA)The accompanying website providesA complete example of a simple e-commerce systemOpen source tools for requirements engineering and use case modelingIndustrial-strength UML course materials based on the book

  • Book

    UML 2 Semantics and Applications

    Auteur: Kevin Lano

    UML 2 Semantics and Applications

    • Auteur: Kevin Lano
    • ISBN: 978–0–470–40908–4

    With an up-to-date view of the results of UML semantics and the practical applications of semantics development, this book presents the only coherent and integrated account of the leading UML 2 semantics work and its applications. With contributions from renowned experts in the area of UML 2 semantics and its applications, the book covers semantics of UML 2 diagrams, OCL, state machine diagrams, interactions, use cases, and activities. "UML Semantics and Applications" is an excellent reference for researchers and students in the model-driven development community.

  • Book

    IoT Standards with Blockchain: Enterprise Methodology for Internet of Things

    Auteur: Venkatesh Upadrista

    IoT Standards with Blockchain: Enterprise Methodology for Internet of Things

    • Auteur: Venkatesh Upadrista
    • ISBN: 978-1-4842-7271-8

    Implement a standardized end-to-end IoT implementation based on best practices and proven successes in IoT across multiple industries. With this book you'll discover the three business strategies for enterprises to adopt and remain relevant in the marketspace ?the Customer Engagement strategy, the Business Transformation strategy, and the Business Productivity Improvement strategy. Pick the right strategy for your enterprise to ensure a clear mission and vision is established based on which IoT roadmap can be defined. Subsequently all business processes pertaining to the chosen business strategy are investigated to define use cases where IoT can be adopted to achieve that business strategy. Start by learning the generic industry perspective on digital transformation using IoT. Then move on to the IoT Standards Reference Model. It’s an abstract framework consisting of an interlinked set of clearly defined components for enterprises to successfully implement an IoT solution. The IoT Standards Reference Model can be applied for IoT use cases across any industry and is kept abstract in order to enable many, potentially different, IoT architectures to be implemented based on the model.

  • Book

    The Internet of Things

    Auteur: Rob van Kranenburg

    The Internet of Things

    • Auteur: Rob van Kranenburg
    • ISBN: 978-90-78146-06-3

    Cities across the world are about to enter the next phase of their development. A near invisible network of radio frequency identification tags (RFID) is being deployed on almost every type of consumer item. These tiny, traceable chips, which can be scanned wirelessly, are being produced in their billions and are capable of being connected to the internet in an instant. This so-called ambient intelligence promises to create a global network of physical objects every bit as pervasive and ubiquitous as the worldwide web itself. Some are already calling this controversial network the internet of things. Van Kranenburg examines what impact RFID, and other systems, will have on our cities and our wider society; while also ruminating on what alternative network technologies could help safeguard our privacy and empower citizens to take power back into their own hands. Its both a timely warning and a call to arms.

  • Book

    PHP and MySQL Programming. From Beginner to Pro

    Auteur: Eric Garcia

    PHP and MySQL Programming. From Beginner to Pro

    • Auteur: Eric Garcia
    • ISBN:

    "PHP and MySQL Programming: From Beginner to Pro: Unlocking the Power of Server-Side Scripting" is your comprehensive guide to mastering the fundamentals of PHP and MySQL and harnessing their full potential to create dynamic, data-driven web applications. This book is meticulously designed to transform beginners with a basic understanding of web development into proficient developers who can confidently navigate the complexities of server-side scripting and database management. Starting with the basics, this guide introduces you to the core concepts of PHP programming, from syntax and variable types to control structures and functions. You'll learn how to craft PHP scripts that interact seamlessly with web pages, managing form data, sessions, and cookies to create a dynamic user experience. Parallelly, the book delves into MySQL, teaching you how to design, create, and manage databases that serve as the backbone for storing and retrieving data for your web applications. As you progress, "PHP and MySQL Programming" gradually introduces more advanced topics, ensuring a smooth learning curve. You'll explore effective database interaction using PHP, implementing CRUD operations, and mastering SQL queries to manipulate data efficiently. The book also covers essential security practices to protect your applications from common vulnerabilities, ensuring you're equipped with the knowledge to develop secure, reliable web solutions. Practical examples and real-world projects are woven throughout the chapters, allowing you to apply the concepts you've learned in meaningful ways. By the end of this journey, you'll have a solid foundation in PHP and MySQL, armed with the skills to develop interactive websites, manage user data, and create web applications that respond in real-time to user input.

  • Book

    MySQL Crash Course: A Hands-On Introduction to Database Development

    Auteur: Rick Silva

    MySQL Crash Course: A Hands-On Introduction to Database Development

    • Auteur: Rick Silva
    • ISBN: 978-1-7185-0301-4

    With databases lurking in the background of every website, knowing how to manage them with MySQL is a no-brainer. This practical, hands-on introduction teaches readers all they need to know.MySQL Crash Course is a fast-paced, no-nonsense introduction to relational database development. It’s filled withpractical examples and expert advice that will have you up and running quickly.You’ll learn the basics of SQL, how to create a database, craft SQL queries to extract data, and work with events,procedures, and functions. You’ll see how to add constraints to tables to enforce rules about permitted data and useindexes to accelerate data retrieval. You’ll even explore how to call MySQL from PHP, Python, and Java.Three final projects will show you how to build a weather database from scratch, use triggers to prevent errors in anelection database, and use views to protect sensitive data in a salary database.You’ll also learn how...

  • Book

    Designing Event-Driven Systems: Concepts and Patterns for Streaming Services with Apache Kafka

    Auteur: Ben Stopford

  • Book

    Internet of Things Vulnerabilities and Recovery Strategies

    Auteur: Fahim Masoodi (editor) et al.

    Internet of Things Vulnerabilities and Recovery Strategies

    • Auteur: Fahim Masoodi (editor) et al.
    • ISBN: 9781032473314

    The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security. The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

  • Book

    Internet of Things Security and Privacy

    Auteur: Ali Ismail Awad, et al.

    Internet of Things Security and Privacy

    • Auteur: Ali Ismail Awad, et al.
    • ISBN: 9781003199410

    The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course.

  • Book

    Communication Technologies and Security Challenges in IoT: Present and Future (Internet of Things)

    Auteur: Ajay Prasad, et al.

    Communication Technologies and Security Challenges in IoT: Present and Future (Internet of Things)

    • Auteur: Ajay Prasad, et al.
    • ISBN: 978-981-97-0052-3

    This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.

  • Book

    The Internet of Things: Connecting Objects to the Web

    Auteur: Hakima Chaouchi

    The Internet of Things: Connecting Objects to the Web

    • Auteur: Hakima Chaouchi
    • ISBN: 978-1-84821-140-7

    Internet of Things: Connecting Objects… puts forward the technologies and the networking architectures which make it possible to support the Internet of Things. Amongst these technologies, RFID, sensor and PLC technologies are described and a clear view on how they enable the Internet of Things is given. This book also provides a good overview of the main issues facing the Internet of Things such as the issues of privacy and security, application and usage, and standardization.