Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Research on Web Information Systems Quality

Buy
Web information systems engineering resolves the multifaceted issues of Web-based systems development; however, as part of an emergent yet prolific industry, Web site quality assurance is a continually adaptive process needing a comprehensive reference tool to merge all cutting-edge research and innovations.

The Handbook of Research on Web Information Systems Quality integrates invaluable research on the models, measures, and methodologies of Web information systems, software quality, and Web engineering into one practical guide to Web information systems quality, making this handbook of research an essential addition to all library collections.

About the Author

Coral Calero has a PhD in computer science and is associate professor at the Escuela Superior de Informatica of the Castilla-La Mancha University in Ciudad Real. She is a member of the Alarcos Research Group, in the same University, specialized in information systems, databases, and software engineering. Her research interests include advanced databases design, database quality, software metrics, and database metrics. She is author of papers in national and international conferences on this subject. She has published in Information Systems Journal, Software Quality Journal, Information and Software Technology Journal, and SIGMOD Record Journal. She has organized the Web services quality workshop (WISE Conference, Rome 2003) and database maintenance and reengineering workshop (ICSM Conference, Montreal 2002).

Mª Ángeles Moraga has a PhD in computer science. She received her MSc in computer science and her technical degree in computer science by the University of Castilla-La Mancha (UCLM). Nowadays she is assistant professor at the Escuela Superior de Informática of the University of Castilla-La Mancha in Ciudad Real (Spain). She is a member of the Alarcos Research Group, in the same University, specialized in information systems, databases, and software engineering. Her research interests are portals, portlets, software quality, and measures.

Mario Piattini has an MSc and a PhD in computer science (Politechnical University of Madrid) and a MSc in Psychology (UNED). He is also a certified information system auditor and a certified information system manager by ISACA (Information System Audit and Control Association) as well as a full professor in the Department of Computer Science at the University of Castilla-La Mancha (Ciudad Real, Spain). Furthermore, he is the author of several books and papers on databases, software engineering, and information systems. He is a co-editor of several international books including Advanced Databases Technology and Design (2000, Artech House, UK), Information and database quality (2002, Kluwer Academic Publishers, Norwell, USA), Component-based software quality: methods and techniques (2004, Springer, Germany), and Conceptual Software Metrics (Imperial College Press, UK, 2005). He leads the ALARCOS research group of the Department of Computer Science at the University of Castilla-La Mancha (Ciudad Real, Spain). His research interests include advanced databases, database quality, software metrics, security and audit, and software maintenance.

(HTML tags aren't allowed.)

Radical Project Management
Radical Project Management
Radical Project Management introduces eXtreme Project Management (xpm), the first radically new approach to project management in decades! Traditional project management is inward looking, static, and doesn't respond to rapid, constant change. xpm looks outward to stakeholders, management, and clients, and...
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now involves some...

Neutron Applications in Earth, Energy and Environmental Sciences (Neutron Scattering Applications and Techniques)
Neutron Applications in Earth, Energy and Environmental Sciences (Neutron Scattering Applications and Techniques)

Neutron Applications in Earth, Energy and Environmental Sciences offers a comprehensive overview of the wide ranging applications of neutron scattering techniques to elucidate the fundamental materials properties at the nano-, micro- and meso-scale, which underpin research in the related fields of Earth, Energy and Environmental...


The Essential Guide to Managing Small Business Growth
The Essential Guide to Managing Small Business Growth

A cliché it may be but we are living in ever more turbulent times. Business decision-making has become more challenging and unpredictable than ever: we experience unforeseen and often cataclysmic changes in consumer demand, both at home and in export markets; customers continue to demand more, more quickly and for less; new laws and...

Numerical Methods in Engineering with MATLAB
Numerical Methods in Engineering with MATLAB
This book is targeted primarily toward engineers and engineering students of advanced
standing (sophomores, seniors and graduate students). Familiarity with a
computer language is required; knowledge of basic engineering subjects is useful, but
not essential.

The text attempts to place emphasis on numerical methods, not
...
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts....

©2021 LearnIT (support@pdfchm.net) - Privacy Policy