Core PHP and PHP frameworks: comparative analysis of two approaches for backend development
The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.
Подобные документы
Обзор популярных средств программного обеспечения. Основные особенности методологии Rapid Application Development. CASE средства. Применение объектно-ориентированных методов. Среды разработки, использующие принципы RAD. Жизненный цикл методологии RAD.
реферат, добавлен 08.05.2014The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019Research of digitalization as the leading global trend of modern economic development. Promising areas of IT application in agricultural enterprises. The place of online IT services in the innovative renewal of the crop production industry in Ukraine.
статья, добавлен 30.08.2022The invention of the computer. Babbage's demonstration model mechanical calculator. Sequence of operations for column. The logical structure of the Analytical Engine. The programming language. Mechanical calculation device based on the design in 1853.
реферат, добавлен 17.12.2015Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
статья, добавлен 09.04.2022- 84. Automation of data from video cameras of small and medium-sized unmanned aerial vehicles processing
The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.
статья, добавлен 28.01.2017 The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.
презентация, добавлен 24.11.2016The application of NBIC technologies, combining ideas of nano-, bio-, information and communication technologies and robotics. Prospects of using these technologies in the management of production processes, interaction between the state and society.
статья, добавлен 31.05.2021The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012История развития ASP.NET. Особенность изменения модели разработки веб-приложений. Основные типы веб-фреймворков. Обратная передача страницы. Серверные элементы управления. Контроль за генерируемой разметкой HTML. Разделение обработки и визуализации.
презентация, добавлен 14.11.2023Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
дипломная работа, добавлен 02.09.2016Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.
статья, добавлен 28.09.2016An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.
статья, добавлен 30.04.2018Краткая характеристика процессоров, используемых в современных ПК типа IBM PC. Поколение процессора, основные проектировщики и производители. Устройство магнитной (дисковой и ленточной) и магнитооптической памяти. Особенности архитектуры Intel Core.
реферат, добавлен 09.09.2012Исследование истории возникновения и развития процессоров. Характеристика их передовых разработчиков на современном рынке. Изучение функциональных особенностей процессора Intel Core i7. Рассмотрение основ влияния количества ядер на работоспособность.
презентация, добавлен 01.04.2015Створення програмного комплексу для пацієнтів з можливістю імпорту медичних рецептів у централізовану інформаційну систему з подальшою генерацією графіку нагадувань вживання препарату. Інформаційна система побудована на платформах .NET Core та Angular.
статья, добавлен 29.08.2023Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
статья, добавлен 09.08.2022Проектування програми Сollections Frameworkна Java: розробка її структури, алгоритму роботи, структур даних, а також основних процедур програми. Опис роботи даної програми та текст програмного коду. Опис вигляду вікон програми в процесі виконання.
курсовая работа, добавлен 16.05.2019International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014