An open-source and Java-technologies approach to Web applications

Download
Author
Siripala, Seksit.
Date
2003-09Advisor
Rowe, Neil C.
Second Reader
Kreeger, Gary L.
Metadata
Show full item recordAbstract
Web applications have become a critical component of the global information infrastructure. In government organizations, proprietary software is currently being replaced by open-source. This thesis explores using open-source and Java technologies to implement Web applications. A prototype of the framework was implemented for a military information site. Implementation was straightforward and performance of the prototype was excellent, demonstrating advantages in terms of reliability, portability, maintainability, and economy.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Counter Directed Energy Warfare (CDEW)
Blau, Joseph A.; Johnson, Bonnie W.; Cohn, Keith; Green, John (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N003-ADirected Energy Weapons (DEW) will proliferate and become a threat exploited by adversaries due to high potential mission success and low cost compared to traditional weapons. Counter DEW (CDEW) methods and capabilities ...