E-Book, Englisch, 352 Seiten, E-Book
Safonov Using Aspect-Oriented Programming for Trustworthy Software Development
1. Auflage 2008
ISBN: 978-0-470-28310-3
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 352 Seiten, E-Book
Reihe: Quantitative Software Engineering Series
ISBN: 978-0-470-28310-3
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Learn how to successfully implement trustworthy computing tasksusing aspect-oriented programming
This landmark publication fills a gap in the literature by notonly describing the basic concepts of trustworthy computing (TWC)and aspect-oriented programming (AOP), but also exploring theircritical interrelationships. The author clearly demonstrates howtypical TWC tasks such as security checks, in-and-out conditions,and multi-threaded safety can be implemented using AOP.
Following an introduction, the book covers:
* Trustworthy computing, software engineering, and computerscience
* Aspect-oriented programming and Aspect.NET
* Principles and case studies that apply AOP to TWC
Coverage includes Aspect.NET, the AOP framework developed by theauthor for the Microsoft.NET platform, currently used in seventeencountries. The author discusses the basics of Aspect.NETarchitecture, its advantages compared to other AOP tools, and itsfunctionality. The book has extensive practical examples and casestudies of trustworthy software design and code using theAspect.NET framework. In addition, the book explores other softwaretechnologies and tools for using AOP for trustworthy softwaredevelopment, including Java and AspectJ.
This book also includes a valuable chapter dedicated to ERATO,the author's teaching method employed in this book, which hasenabled thousands of students to quickly grasp and apply complexconcepts in computing and software engineering, while the finalchapter presents an overall perspective on the current state of AOPand TWC with a view toward the future.
Software engineers, architects, developers, programmers, andstudents should all turn to this book to learn this tested andproven method to create more secure, private, and reliablecomputing.