Oauth 2 In Action

Download Oauth 2 In Action ebook PDF or Read Online books in PDF, EPUB, and Mobi Format. Click Download or Read Online button to Oauth 2 In Action book pdf for free now.

Oauth 2 In Action

Author : Justin Richer
ISBN : 161729327X
Genre : Computers
File Size : 73.85 MB
Format : PDF, ePub, Mobi
Download : 443
Read : 452

OAuth 2 is like the web version of a valet key. Instead of unsafe password-sharing, OAuth offers a much more secure delegation protocol. OAuth is used everywhere, from large providers like Facebook and Google, to small APIs at startups, and even cloud services, it's the worldwide standard. OAuth 2 is the must-know security protocol on the web today. "OAuth 2 in Action" teaches practical use and deployment of this protocol from the perspective of a client, authorization server, and resource server. It begins with an overview of OAuth and a look at its components and interactions. Using hands-on examples, it shows how to build a first OAuth client, followed by an authorization server, and then a protected resource. The second part of the book dives into crucial implementation vulnerability, and more advanced topics. By the end of this book, anyone will be able to build and deploy applications that use OAuth on both the client and server sides. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
Category: Computers

Microservices Security In Action

Author : Prabath Siriwardena
ISBN : 9781617295959
Genre : Computers
File Size : 37.94 MB
Format : PDF, ePub
Download : 487
Read : 262

Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. Summary Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. With proper planning, design, and implementation, you can reap the benefits of microservices while keeping your application data—and your company’s reputation—safe! About the book Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You’ll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you’re finished reading, you’ll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they’re secure! What's inside Microservice security concepts Edge services with an API gateway Deployments with Docker, Kubernetes, and Istio Security testing at the code level Communications with HTTP, gRPC, and Kafka About the reader For experienced microservices developers with intermediate Java skills. About the author Prabath Siriwardena is the vice president of security architecture at WSO2. Nuwan Dias is the director of API architecture at WSO2. They have designed secure systems for many Fortune 500 companies. Table of Contents PART 1 OVERVIEW 1 Microservices security landscape 2 First steps in securing microservices PART 2 EDGE SECURITY 3 Securing north/south traffic with an API gateway 4 Accessing a secured microservice via a single-page application 5 Engaging throttling, monitoring, and access control PART 3 SERVICE-TO-SERVICE COMMUNICATIONS 6 Securing east/west traffic with certificates 7 Securing east/west traffic with JWT 8 Securing east/west traffic over gRPC 9 Securing reactive microservices PART 4 SECURE DEPLOYMENT 10 Conquering container security with Docker 11 Securing microservices on Kubernetes 12 Securing microservices with Istio service mesh PART 5 SECURE DEVELOPMENT 13 Secure coding practices and automation
Category: Computers

Oauth 2 0 Cookbook

Author : Adolfo Eloy Nascimento
ISBN : 9781788290630
Genre : Computers
File Size : 45.58 MB
Format : PDF, Mobi
Download : 677
Read : 372

Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies. About This Book Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. Use Spring Security and Spring Security OAuth2 to implement your own OAuth 2.0 provider Learn how to implement OAuth 2.0 native mobile clients for Android applications Who This Book Is For This book targets software engineers and security experts who are looking to develop their skills in API security and OAuth 2.0. Prior programming knowledge and a basic understanding of developing web applications are necessary. As this book's recipes mostly use Spring Security and Spring Security OAuth2, some prior experience with Spring Framework will be helpful. What You Will Learn Use Redis and relational databases to store issued access tokens and refresh tokens Access resources protected by the OAuth2 Provider using Spring Security Implement a web application that dynamically registers itself to the Authorization Server Improve the safety of your mobile client using dynamic client registration Protect your Android client with Proof Key for Code Exchange Protect the Authorization Server from COMPUTERS / Cloud Computing redirection In Detail OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications. The book starts by presenting you how to interact with some public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. You will also be able to implement your own OAuth 2.0 provider with Spring Security OAuth2. Next, the book will cover practical scenarios regarding some important OAuth 2.0 profiles such as Dynamic Client Registration, Token Introspection and how to revoke issued access tokens. You will then be introduced to the usage of JWT, OpenID Connect, and how to safely implement native mobile OAuth 2.0 Clients. By the end of this book, you will be able to ensure that both the server and client are protected against common vulnerabilities. Style and approach With the help of real-world examples, this book provides step by step recipes for troubleshooting and extending your API security. The book also helps you with accessing and securing data on mobile, desktop, and cloud apps with OAuth 2.0.
Category: Computers

Pro Asp Net Web Api Security

Author : Badrinarayanan Lakshmiraghavan
ISBN : 9781430257820
Genre : Computers
File Size : 43.25 MB
Format : PDF, Kindle
Download : 905
Read : 911

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP. With such wide accessibility, securing your code effectively needs to be a top priority. You will quickly find that the WCF security protocols you’re familiar with from .NET are less suitable than they once were in this new environment, proving themselves cumbersome and limited in terms of the standards they can work with. Fortunately, ASP.NET Web API provides a simple, robust security solution of its own that fits neatly within the ASP.NET MVC programming model and secures your code without the need for SOAP, meaning that there is no limit to the range of devices that it can work with – if it can understand HTTP, then it can be secured by Web API. These SOAP-less security techniques are the focus of this book. What you’ll learn Identity management and cryptography HTTP basic and digest authentication and Windows authentication HTTP advanced concepts such as web caching, ETag, and CORS Ownership factors of API keys, client X.509 certificates, and SAML tokens Simple Web Token (SWT) and signed and encrypted JSON Web Token (JWT) OAuth 2.0 from the ground up using JWT as the bearer token OAuth 2.0 authorization codes and implicit grants using DotNetOpenAuth Two-factor authentication using Google Authenticator OWASP Top Ten risks for 2013Who this book is for No prior experience of .NET security is needed to read this book. All security related concepts will be introduced from first-principles and developed to the point where you can use them confidently in a professional environment. A good working knowledge of and experience with C# and the .NET framework are the only prerequisites to benefit from this book. Table of Contents Welcome to ASP.NET Web API Building RESTful Services Extensibility Points HTTP Anatomy and Security Identity Management Encryption and Signing Custom STS through WIF Knowledge Factors Ownership Factors Web Tokens OAuth 2.0 Using Live Connect API OAuth 2.0 From the Ground Up OAuth 2.0 Using DotNetOpenAuth Two-Factor Authentication Security Vulnerabilities Appendix: ASP.NET Web API Security Distilled
Category: Computers

Mastering Oauth 2 0

Author : Charles Bihis
ISBN : 9781784392307
Genre : Computers
File Size : 65.79 MB
Format : PDF, ePub
Download : 438
Read : 977

Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework About This Book Learn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Facebook, Google, Instagram, Slack, Box, and more Master the finer details of this complex protocol to maximize the potential of your application while maintaining the utmost of security Step through the construction of a real-world working application that logs you in with your Facebook account to create a compelling infographic about the most important person in the world—you! Who This Book Is For If you are an application developer, software architect, security engineer, or even a casual programmer looking to leverage the power of OAuth, Mastering OAuth 2.0 is for you. Covering basic topics such as registering your application and choosing an appropriate workflow, to advanced topics such as security considerations and extensions to the specification, this book has something for everyone. A basic knowledge of programming and OAuth is recommended. What You Will Learn Discover the power and prevalence of OAuth 2.0 and use it to improve your application's capabilities Step through the process of creating a real-world application that interacts with Facebook using OAuth 2.0 Examine the various workflows described by the specification, looking at what they are and when to use them Learn about the many security considerations involved with creating an application that interacts with other service providers Develop your debugging skills with dedicated pages for tooling and troubleshooting Build your own rich, powerful applications by leveraging world-class technologies from companies around the world In Detail OAuth 2.0 is a powerful authentication and authorization framework that has been adopted as a standard in the technical community. Proper use of this protocol will enable your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. Want to log your user in to your application with their Facebook account? Want to display an interactive Google Map in your application? How about posting an update to your user's LinkedIn feed? This is all achievable through the power of OAuth. With a focus on practicality and security, this book takes a detailed and hands-on approach to explaining the protocol, highlighting important pieces of information along the way. At the beginning, you will learn what OAuth is, how it works at a high level, and the steps involved in creating an application. After obtaining an overview of OAuth, you will move on to the second part of the book where you will learn the need for and importance of registering your application and types of supported workflows. You will discover more about the access token, how you can use it with your application, and how to refresh it after expiration. By the end of the book, you will know how to make your application architecture robust. You will explore the security considerations and effective methods to debug your applications using appropriate tools. You will also have a look at special considerations to integrate with OAuth service providers via native mobile applications. In addition, you will also come across support resources for OAuth and credentials grant. Style and approach With a focus on practicality and security, Mastering OAuth 2.0 takes a top-down approach at exploring the protocol. Discussed first at a high level, examining the importance and overall structure of the protocol, the book then dives into each subject, adding more depth as we proceed. This all culminates in an example application that will be built, step by step, using the valuable and practical knowledge you have gained.
Category: Computers

Ibm Enterprise Content Management And Box

Author : Whei-Jen Chen
ISBN : 9780738455075
Genre : Computers
File Size : 36.35 MB
Format : PDF
Download : 421
Read : 427

The integration of IBM® Enterprise Content Management (ECM) products with the Box for secure file sharing and collaboration opens new possibilities for achieving higher levels of capability within ECM. This IBM RedpaperTM publication describes how the integration of Box, IBM Content Navigator, IBM Case Manager, IBM Datacap, and IBM StoredIQ® products enables higher maturity in ECM, and distills the capabilities provided by each integration and the combination as a whole. By leveraging these IBM ECM technologies with Box, clients can realize the power of hybrid capabilities between on-premises and cloud systems. This paper shows you how to create an integrated, end-to-end solution that uses the capabilities of those IBM ECM products in conjunction with Box.
Category: Computers

Spring Security In Action

Author : Laurentiu Spilca
ISBN : 1617297739
Genre : Computers
File Size : 42.75 MB
Format : PDF, Mobi
Download : 327
Read : 758

Spring Security in Action shows you how to use Spring Security to create applications you can be confident will withstand even the most dedicated attacks. Starting with essential “secure by design” principles, you’ll learn common software vulnerabilities and how to avoid them right from the design stage. Through hands-on projects, you’ll learn to manage system users, configure secure endpoints, and use, OAuth2 and OpenID Connect for authentication and authorization. As you go, you’ll learn how to adapt Spring Security to different architectures, such as configuring Spring Security for Reactive applications and container-based applications orchestrated with Kubernetes. When you’re done, you’ll have a complete understanding of how to use Spring Security to protect your Java enterprise applications from common threats and attacks. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
Category: Computers

Soapui Cookbook

Author : Rupert Anderson
ISBN : 9781784398712
Genre : Computers
File Size : 22.92 MB
Format : PDF, Mobi
Download : 879
Read : 176

This book is aimed at developers and technical testers who are looking for a quick way to take their SoapUI skills and understanding to the next level. Even if you are new to SoapUI but have basic Java skills and a reasonable grasp of RESTFul and Soap web services, then you should have no problem making use of this book.
Category: Computers

Go Programming Blueprints

Author : Mat Ryer
ISBN : 9781783988037
Genre : Computers
File Size : 29.92 MB
Format : PDF, Mobi
Download : 369
Read : 858

Intended for seasoned Go programmers who want to put their expertise in Go to use to solve big, real-world, modern problems. With a basic understanding of channels and goroutines, you will hone your skills to build tools and programs that are quick and simple. You need not be an expert in distributed systems or technologies in order to deliver solutions capable of great scale. It is assumed that you are familiar with the basic concepts of Go.
Category: Computers

Professional Sharepoint 2013 Development

Author : Reza Alirezaei
ISBN : 9781118495827
Genre : Computers
File Size : 41.49 MB
Format : PDF, Kindle
Download : 108
Read : 1205

Thorough coverage of development in SharePoint 2013 A team of well-known Microsoft MVPs joins forces in this fullyupdated resource, providing you with in-depth coverage ofdevelopment tools in the latest iteration of the immensely popularSharePoint. From building solutions to building custom workflow andcontent management applications, this book shares field-tested bestpractices on all aspect of SharePoint 2013 development. Offers a thorough look at Windows Azure and SharePoint2013 Includes new chapters on Application Life Cycle Management,developing apps in SharePoint, and building PerformancePointDashboards in SharePoint Professional SharePoint 2013 Development is an essentialSharePoint developer title.
Category: Computers

Hacking Exposed Mobile

Author : Neil Bergman
ISBN : 9780071817028
Genre : Computers
File Size : 66.67 MB
Format : PDF
Download : 350
Read : 333

Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists
Category: Computers

Beginning Mobile Application Development In The Cloud

Author : Richard Rodger
ISBN : 9781118203354
Genre : Computers
File Size : 68.94 MB
Format : PDF, Kindle
Download : 702
Read : 827

Learn how to build apps for mobile devices on Cloud platforms The marketplace for apps is ever expanding, increasing the potential to make money. With this guide, you'll learn how to build cross-platform applications for mobile devices that are supported by the power of Cloud-based services such as Amazon Web Services. An introduction to Cloud-based applications explains how to use HTML5 to create cross-platform mobile apps and then use Cloud services to enhance those apps. You'll learn how to build your first app with HTML5 and set it up in the Cloud, while also discovering how to use jQuery to your advantage. Highlights the skills and knowledge you need to create successful apps for mobile devices with HTML5 Takes you through the steps for building web applications for the iPhone and Android Details how to enhance your app through faster launching, touch vs. click, storage capabilities, and a cache Looks at how best to use JSON, FourSquare, jQuery, AJAX, and more Shares tips for creating hybrid apps that run natively If you're interested in having your application be one of the 200,000+ apps featured in the iPhone store or the 50,000+ in the Android store, then you need this book.
Category: Computers

Developing With Google

Author : Jennifer Murphy
ISBN : 9781449312268
Genre : Computers
File Size : 60.41 MB
Format : PDF, Docs
Download : 689
Read : 389

Provides information on using the Google+ API to integrate Google+ with an existing website or create an application.
Category: Computers

Developer S Guide To Social Programming

Author : Mark D. Hawker
ISBN : 0321680928
Genre : Computers
File Size : 37.16 MB
Format : PDF, Mobi
Download : 982
Read : 1024

In The Developer’s Guide to Social Programming, Mark Hawker shows developers how to build applications that integrate with the major social networking sites. Unlike competitive books that focus on a single social media platform, this book covers all three leading platforms: Facebook, OpenSocial, and Twitter. Hawker identifies the characteristics of superior, highly engaging social media applications, and shows how to use the Facebook platform, Google Friend Connect, and the Twitter API to create them. You’ll find practical solutions and code for addressing many common social programming challenges, from site registration to search, blog commenting to creating location-based applications. Hawker concludes by walking you through building a complete, integrated social application: one that works seamlessly across all leading platforms, and draws on powerful features from each. Coverage includes Working with the Twitter API, including the Search API, Lists API, and Retweets API Authenticating users with Twitter OAuth Mastering the Facebook API, FQL, and XFBML Utilizing the Facebook JavaScript Library for creating dynamic content, and animation Exploring the Google Friend Connect JavaScript API, and integrating with the OpenSocial API Using Facebook’s tools for sharing, social commenting, stream publishing, and live conversation Using the PHP OpenSocial Client Library with Google Friend Connect Creating, testing, and submitting Google Friend Connect gadgets
Category: Computers

Real Time Web Application Development

Author : Rami Vemula
ISBN : 9781484232705
Genre : Computers
File Size : 38.63 MB
Format : PDF, ePub, Docs
Download : 880
Read : 1183

Design, develop, and deploy a real-world web application by leveraging modern open source technologies. This book shows you how to use ASP.NET Core to build cross-platform web applications along with SignalR to enrich the application by enabling real-time communication between server and clients. You will use Docker to containerize your application, integrate with GitHub to package the application, and provide continuous deployment to Azure’s IaaS platform. Along the way, Real-Time Web Application Development covers topics including designing a Materialize CSS theme, using a test-driven development approach with xUnit.net, and securing your application with the OAuth 2.0 protocol. To further your understanding of the technology, you will learn logging and exception handling; navigation using view components; and how to work with forms and validations. The rich code samples from this book can be used to retrofit or upgrade existing ASP.NET Core applications. What You Will Learn Design and develop a real-world web application Implement security and data storage with OAuth2 and Azure Table Storage Orchestrate real-time notifications through SignalR Use GitHub and Travis CI for continuous integration of code Master Docker containerization and continuous deployment with Docker Cloud to Azure Linux virtual machines Who This Book Is For Developers and software engineers interested in learning an end-to-end approach to application development using Microsoft technologies.
Category: Computers

Professional Twitter Development

Author : Daniel Crenna
ISBN : 0470574917
Genre : Computers
File Size : 44.31 MB
Format : PDF, ePub
Download : 387
Read : 909

Twitter is rapidly moving up the social networking food chain and is currently outranked by only Facebook and MySpace. It features a programming API that allows you to build Web sites and applications (both desktop and mobile) for reading and posting to Twitter, finding other Twitter users, aggregating Twitter content, and other uses. This book walks you through the process of combining many programming tools in order to build exciting, useful, and profitable applications. You'll begin with a look at RESTful services and examine how to structure your queries, handle asynchronous operations, use headers, and post binary data. From there, author and TweetSharp developer Daniel Crenna explains how to authenticate with the OAuth specification for Web and Windows applications. Twitter is growing in popularity at a rapid pace and this book shows you how to take advantage of its programming API to build applications Explains the various ways to design a Twitter application, including caching, third party application interoperability, real-time data binding, push vs. pull data scenarios, and more Takes an in-depth look at TweetSharp, a .NET library for developing Twitter applications-whose creator is also the author of this book Walks you through requesting and retrieving responses from Twitter's API Warns you of considerations to take into account regarding authentication and security Professional Twitter Development shows you how to get the most out of Twitter so that you can build your own applications for this exciting new platform.
Category: Computers

Home Automation With Raspberry Pi Projects Using Google Home Amazon Echo And Other Intelligent Personal Assistants

Author : Donald Norris
ISBN : 9781260440362
Genre : Technology & Engineering
File Size : 21.19 MB
Format : PDF, Docs
Download : 829
Read : 567

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Gain the skills needed to create a hi-tech home―affordably and easily This hands-on guide shows, step by step, how to use the powerful Raspberry Pi for home automation. Written in an easy-to-follow style, the book features DIY projects for Amazon Echo, Google Home, smart lightbulbs and thermostats, and more. Home Automation with Raspberry Pi: Projects Using Google Home, Amazon Echo, and Other Intelligent Personal Assistants lays out essential skills for hobbyists and makers of all ages and experience levels. You will discover how to build gadgets that can work in conjunction with―or in some cases replace―commercially available smart home products. Inside, you’ll learn how to: •Design and build custom home automation devices •Interface a Google Home device to your Raspberry Pi •Connect Google Voice Assistant to RasPi •Incorporate GPIO control using the Amazon Echo •Navigate home automation operating systems •Use Z-Wave in your RasPi HA projects •Apply fuzzy logic techniques to your projects •Work with sensors and develop home security systems •Utilize two open-source AI applications, Mycroft and Picroft •Tie your projects together to create an integrated home automation system
Category: Technology & Engineering

Developing Mobile Web Arcgis Applications

Author : Matthew Sheehan
ISBN : 9781784392000
Genre : Computers
File Size : 35.88 MB
Format : PDF, Kindle
Download : 979
Read : 307

This guide is invaluable to those just starting out with GIS development but will also benefit GIS professionals wishing to expand their development skills to include mobile apps.
Category: Computers

Learning Apex Programming

Author : Matt Kaufman
ISBN : 9781782173984
Genre : Computers
File Size : 52.76 MB
Format : PDF, ePub
Download : 454
Read : 393

If you are a developer who has some object-oriented programming experience, Learning Apex Programming is the perfect book for you. This book is most appropriate for developers who wish to gain an understanding of the Force.com platform and how to use Apex to create business applications.
Category: Computers

Web Engineering

Author : Sven Casteleyn
ISBN : 9783319082455
Genre : Computers
File Size : 78.60 MB
Format : PDF, Kindle
Download : 981
Read : 644

This book constitutes the refereed proceedings of the 14th International Conference on Web Engineering, ICWE 2014, held in Toulouse, France, in July 2014. The 20 full research papers, 13 late breaking result papers, 15 poster papers, and 4 contributions to the PhD symposium presented were carefully reviewed and selected from 100 submissions. Moreover 3 tutorials and 3 workshops are presented. The papers focus on six research tracks, namely cross-media and mobile Web applications, HCI and the Web, Modelling and Engineering Web applications, quality aspects of Web applications, social Web applications, Web applications composition and mashups.
Category: Computers