Auswahl der wissenschaftlichen Literatur zum Thema „Web extensions“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Web extensions" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Web extensions"

1

Picazo-Sanchez, Pablo, Juan Tapiador und Gerardo Schneider. „After you, please: browser extensions order attacks and countermeasures“. International Journal of Information Security 19, Nr. 6 (21.11.2019): 623–38. http://dx.doi.org/10.1007/s10207-019-00481-8.

Der volle Inhalt der Quelle
Annotation:
AbstractBrowser extensions are small applications executed in the browser context that provide additional capabilities and enrich the user experience while surfing the web. The acceptance of extensions in current browsers is unquestionable. For instance, Chrome’s official extension repository has more than 63,000 extensions, with some of them having more than 10M users. When installed, extensions are pushed into an internal queue within the browser. The order in which each extension executes depends on a number of factors, including their relative installation times. In this paper, we demonstrate how this order can be exploited by an unprivileged malicious extension (i.e., one with no more permissions than those already assigned when accessing web content) to get access to any private information that other extensions have previously introduced. We propose a solution that does not require modifying the core browser engine, since it is implemented as another browser extension. We prove that our approach effectively protects the user against usual attackers (i.e., any other installed extension) as well as against strong attackers having access to the effects of all installed extensions (i.e., knowing who did what). We also prove soundness and robustness of our approach under reasonable assumptions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tarkiainen, Anssi, Hanna‐Kaisa Ellonen und Olli Kuivalainen. „Complementing consumer magazine brands with internet extensions?“ Internet Research 19, Nr. 4 (14.08.2009): 408–24. http://dx.doi.org/10.1108/10662240910981371.

Der volle Inhalt der Quelle
Annotation:
PurposeThe purpose of this paper is to increase understanding of the effects of web site extension on the parent‐magazine brand in the context of experiential goods, and to identify factors that are related to success.Design/methodology/approachThe paper focuses on the relationship between consumers' experiences on magazine web sites and their loyalty towards the print magazine.FindingsThere are different ways in which the web site can complement the print version. The first mechanism is related to engaging in more frequent communication with the magazine's readers, and the second is related to consumer‐initiated interaction between other readers. In both cases something is offered that cannot be obtained from the print magazine, but is assumed to complement it.Originality/valueThe paper increases understanding of brand extensions with regard to experiential goods, but more research is needed on the factors that are related to extension success.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ter Louw, Mike, Jin Soon Lim und V. N. Venkatakrishnan. „Enhancing web browser security against malware extensions“. Journal in Computer Virology 4, Nr. 3 (12.01.2008): 179–95. http://dx.doi.org/10.1007/s11416-007-0078-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Marwaha, Preeti, Hema Banati und Punam Bedi. „UDDI Extensions for Temporally Customized Web Services“. Procedia Technology 10 (2013): 184–90. http://dx.doi.org/10.1016/j.protcy.2013.12.351.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

AUGENBROE, GODFRIED, HANS VERHEIJ und GERHARD SCHWARZMÜLLER. „Project web sites with design management extensions“. Engineering, Construction and Architectural Management 9, Nr. 3 (März 2002): 259–71. http://dx.doi.org/10.1108/eb021221.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Martin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch und Hailin Wu. „The privacy practices of Web browser extensions“. Communications of the ACM 44, Nr. 2 (Februar 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Walsh, Patrick, und Antonio Williams. „To Extend or Not Extend a Human Brand: An Analysis of Perceived Fit and Attitudes Toward Athlete Brand Extensions“. Journal of Sport Management 31, Nr. 1 (Januar 2017): 44–60. http://dx.doi.org/10.1123/jsm.2015-0314.

Der volle Inhalt der Quelle
Annotation:
While athletes have been building and leveraging their brands for many years by introducing brand extensions, research on sport brand extensions has primarily focused on factors that influence the success of team-related extensions. However, as there is potential risk involved when introducing brand extensions, it is important for athletes to understand how consumers respond to extensions they may introduce. Through the use of self-administered web-based surveys this study provides the initial examination of this topic by exposing participants (n = 292) to hypothetical brand extensions and investigating factors that may influence perceived fit and attitudes toward athlete brand extensions. Partial least squares path modeling suggests that athlete prestige had the most significant effect on fit and attitudes for a brand extension that is considered to be a fit with an athlete’s image, while athlete attachment had the most influence on fit and attitudes for a brand extension with low perceived fit.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

De Sarkar, Tanmay. „The prevalence of web browser extensions use in library services: an exploratory study“. Electronic Library 33, Nr. 3 (01.06.2015): 334–54. http://dx.doi.org/10.1108/el-04-2013-0063.

Der volle Inhalt der Quelle
Annotation:
Purpose – The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the features, purposes of use and types of browser extensions prevalent among libraries in different regions, the paper seeks to measure the degree of implementation of browser extensions. Design/methodology/approach – Stratified sampling method was followed to select academic libraries, and convenient sampling method was applied to select public libraries from four continents – Asia, Oceania, Europe and North America. Two-step web content analysis was applied to gather data along the select dimensions. Findings – The study contributes to the recent advances in application of browser extension with numerous examples focussing on the relevance of different approaches adopted by the libraries. Providing a framework of proportionate implementation along checkpoints, the study also highlights degree of acceptance of browser extension among libraries in different regions. Research limitations/implications – The investigation was restricted to libraries having English websites and confined to four continents only. This study aims at improving understanding among the librarians about the intended use and application of browser extension and helping them benchmark their effort in support of education, research and training. The current investigation expands the scope of future research on remaining regions and website whose contents are in non-English language to attain a broader perspective of its implementation. Originality/value – The article may guide library professionals to use, develop and promote the implementation of browser extension in libraries. The checkpoints used here may serve as bedrock for framing questionnaire and interview schedule for conducting future research examining users’ perception of browser extension in the context of library resources and usage pattern, to fully comprehend its practicability and usefulness.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Rankin, Jeff H., und Irina Kondratova. „Mobile multimodal extensions to collaborative Web-based systems“. Canadian Journal of Civil Engineering 33, Nr. 12 (01.12.2006): 1470–79. http://dx.doi.org/10.1139/l06-096.

Der volle Inhalt der Quelle
Annotation:
The development of leading-edge multimodal (e.g., concurrent text, voice, and video capabilities) mobile applications as a technology that holds promise for the construction industry is described. Because of the complexity of the products, the relatively short execution time frame, and the number of parties involved, the information exchanged throughout an architectural, engineering, and construction (AEC) project is extensive. Efficiently managing this information exchange is a significant impediment to increasing the overall productivity of the industry. The technology focus of this paper extends today's tools by addressing one of the unique characteristics of the industry: the need for mobility of real-time information in an integrated and collaborative environment. Mobile computing devices have the capabilities and characteristics for wide use in real-time communication of project information to project repositories or between project participants. As the industry moves away from the desktop and laptop Web paradigms toward the mobile Web paradigm, the availability of real-time complete information exchange with the project information repository presents new opportunities for decision-making in the AEC industry. To facilitate more widespread use of the solution applications described, extensive usability research in light of the various processes in the AEC industry is needed; a preliminary framework for this purpose is presented.Key words: project information management, collaborative information systems, mobile computing, multimodal functionality.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yu, Chun Mei, Jian Hua Sun, Hao Chen und Xiang Hua Xu. „Privilege Separation in Browser Extensions Based on Web Workers“. Advanced Materials Research 989-994 (Juli 2014): 4675–79. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4675.

Der volle Inhalt der Quelle
Annotation:
In this paper, we propose to use Web Workers [1], isolated parallel threads in current browser working in the background, to enforce privilege separation in chrome extensions. Our tests show that our design is applicable to most chrome extensions (those not using the jquery library) and achieves a reduction in TCB up to 77 percent for our examples. Our implementation shows that our design is efficient enough to enforce privilege separation in chrome extensions and not needs to modify the browser or learn new high-level languages.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Web extensions"

1

Joelsson, Tomas. „Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications“. Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.

Der volle Inhalt der Quelle
Annotation:
Mobile web browsers of today have many of the same capabilities as their desktop counterparts. However, among the capabilities they lack is a way for web applications to interact with local devices. While today’s mobile phones commonly include GPS receivers and digital cameras, these local devices are currently not accessible from within the browser. The only means of utilizing these devices is by using standalone applications, but such applications lack the versatility of web browsers. If a mobile browser could utilize these local devices, then a mobile application could run within the browser, thus avoiding the need for specialized client software. This thesis suggests an approach for adding such capabilities to mobile browsers. In the proposed method, scripted access to local device functionality is facilitated by a local Java application. This application acts as a proxy server and allows the browser to call methods exposed by the local Java APIs. Both the benefits and some security concerns of this approach are examined. The benefits are further highlighted through two example web applications which utilize local devices.
I dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zaccheus, Stan-Erik. „A framework for creating observable web services“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177576.

Der volle Inhalt der Quelle
Annotation:
In the intelligence community, intelligence is defined as the right information to the right party at the right time. This definition also applies to business intelligence used by government and financial institutions, patient information used by healthcare providers and meteorological and geological reports provided by research institutions and environmental agencies. Modern software development has to tackle the problems associated with building large and complex distributed systems that have to deliver business value in a reliable and timely fashion; even the best prediction has no value if it is delivered after the fact. It is imperative that the producers in a larger system are responsible for publishing their output to minimize the lead-time for consumers. Using regular web services, the consumer can only check for new data by polling the producer. In a system with many consumers, resources are wasted handling these status requests. Instead of the client interacting with service provider, the client should be reacting to it. The reactive programming model supports building systems with these properties. On the .NET platform, the Reactive Extensions library provides functionality for creating reactive applications by composing functions that operate on asynchronous event streams. The library provides powerful tools for building reactive programs, unfortunately it does not contain an abstraction for inter-process event streams that is needed for building distributed reactive systems. This thesis presents the design and implementation of a framework for creating and using observable web services as a means to bridge the inter-process gap that exist when building a system using Reactive Extensions. The solution is based on a conceptual modeled created by extending the web service architecture. The solution is implemented as a framework made up by two parts; a service component used for creating observable web services and client component that connects to an observable web service and generates code used for subscribing to events exposed by that service. The client subscription functionality integrates with Reactive Extensions, making it possible to build reactive and distributed systems. Integration tests are used to verify that the implementation fulfils the requirements specified for the conceptual model.
I underrättelsevärlden definieras en underrättelse som väsentlig information förmedlad till rätt instans vid rätt tidpunkt. Samma definition gäller för omvärldsanalys som används av regeringar och finansinstitut, patientinformation som används av vårdaktörer och metrologiska och geologiska rapporter som tillhandahålls av forskningsinstitut och miljöorganisationer. Modern mjukvaruutveckling måste lösa problem associerade med att bygga stora, komplexa och distribuerade system som på ett tillförlitligt sätt ska leverera företagsnytta i rätt tid; även den bästa förutsägelsen är utan värde om den levereras för sent. Det är absolut nödvändigt producenter i ett större system ansvarar för att publicera sitt data så att konsumenter kan agera med så lite ledtid som möjligt. Vid användande av vanliga webtjänster måste klienten aktivt fråga om ny data finns tillgänglig. I ett system med många användare slösas resurser på att hantera statusefterfrågningar. Istället för att klienten interagerar interaktivt med tjänsten, borde den istället reagera reaktivt. Med den reaktiva programmeringsmodellen stöds systemkonstruktion med dessa egenskaper. På .NET-plattformen tillhandahåller kodbiblioteket Reactive Extensions funktionalitet för att skapa reaktiva applikationer genom skapandet av funktioner som arbetar med asynkrona händelseströmmar. Biblioteket tillhandahåller kraftfulla verktyg för utformningen av reaktiva program, dock innehåller den inte en abstraktion för arbete med händelseströmmar som rör sig mellan olika processer, en nödvändighet för skapandet av distribuerade reaktiva system. Denna uppsats presenterar den bakomliggande designen och implementationen av ett ramverk för skapandet och användandet av observerbara webtjänster vars syfte är att brygga händelseströmmar mellan olika processer. Lösningen är baserad på en konceptuell modell som bygger på arkitekturen för webbtjänster. Den är implementerad som ett ramverk som består av två delar; en tjänstekomponent som används för att skapa observerbara webbtjänster och klientkomponent som ansluter till en observerbar webbtjänst och genererar kod som används för att prenumerera på händelser som exponeras av denna tjänst. Prenumerationsfunktionaliteten är skapad för att fungera med Reactive Extensions och gör det möjligt att bygga reaktiva och distribuerade system. Integrationstest används för att kontrollera att ramverket uppfyller de krav som anges för den konceptuella modellen.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jarosch, Dennis. „Effects and opportunities of native code extensions for computationally demanding web applications“. Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2012. http://dx.doi.org/10.18452/16451.

Der volle Inhalt der Quelle
Annotation:
Das World Wide Web befindet sich im Wandel von interaktiven Webseiten hin zu Web- Applikationen. Eine steigende Zahl von Anwendern führt täglich Aufgaben ausschließlich mit Hilfe des Web-Browsers durch. Dadurch wird das Web zu einer bedeutenden Plattform für Anwendungsentwicklung. Dieser Plattform fehlt jedoch heute noch die Rechenleistung nativer Applikationen. Microsoft Xax und Google Native Client (NaCl) sind zwei neue, unabhängige Technologien zur Entwicklung nativer Web-Applikationen. Sie ermöglichen die Erweiterung herkömmlicher Web-Applikationen durch kompilierten nativen und dennoch betriebssystemunabhängigen Programmcode. Die vorliegende Dissertation untersucht die Vor- und Nachteile nativer Web-Applikationen und analysiert zudem das tatsächliche Leistungsvermögen im Vergleich zu konventionellen JavaScript Web-Applikationen. Dazu wird eine experimentelle Leistungsanalyse von nativen Applikationen in C, JavaScript Web-Applikationen und NaCl nativen Web-Applikationen anhand vier unterschiedlicher Vergleichstests durchgeführt. Dabei werden die folgenden Leistungsaspekte betrachtet: mathematische Operationen (seriell und parallel), 3D-Grafikoperationen und Datenverarbeitung. Die Ergebnisse der Leistungsanalyse zeigen, dass NaCl Stärken in mathematischen und 3D-Grafikoperationen zu Grunde liegen, jedoch erhebliche Schwächen bei der Datenverarbeitung aufweist. Entsprechende Lösungsansätze zur Optimierung der Anwendung werden erarbeitet und erörtert. Eine Bewertung anhand technischer und nicht-technischer Kriterien komplementiert die Ergebnisse der Leistungsanalyse. Darüber hinaus werden die technischen, politischen und strategischen Treiber für NaCls Marktdurchdringung diskutiert.
The World Wide Web is amidst a transition from interactive websites to web applications. An increasing number of users perform their daily computing tasks entirely within the web browser, turning the Web into an important platform for application development. The Web as a platform, however, lacks the computational performance of native applications. This problem has motivated the inception of Microsoft Xax and Google Native Client (NaCl), two independent projects that facilitate the development of native web applications. These allow the extension of conventional web applications with compiled native code, while maintaining operating system portability. This dissertation determines the benefits and drawbacks of native web applications. It also examines the actual performance capabilities of JavaScript web applications. An experimental performance analysis is undertaken in order to determine and compare the performance characteristics of native C applications, JavaScript web applications, and NaCl native web applications. Four application benchmarks consider different performance aspects: number crunching (serial and parallel), 3D graphics performance, and data processing. The results confirm that NaCl''s performance in computational tasks and 3D graphics is impeccable. On the other hand, it shows substantial limitations in data processing. These are evaluated and possible solutions are discussed. The results of the performance analysis are complemented with an evaluation on the basis of technical and non-technical criteria and a discussion of the technical, political, and strategic drivers for NaCl.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dodda, Srinivasa Rao. „Improvements and extensions of a web-tool for finding candidate genes associated with rheumatoid arthritis“. Thesis, University of Skövde, School of Humanities and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-26.

Der volle Inhalt der Quelle
Annotation:

QuantitativeTraitLocus (QTL) is a statistical method used to restrict genomic regions contributing to specific phenotypes. To further localize genes in such regions a web tool called “Candidate Gene Capture” (CGC) was developed by Andersson et al. (2005). The CGC tool was based on the textual description of genes defined in the human phenotype database OMIM. Even though the CGC tool works well, the tool was limited by a number of inconsistencies in the underlying database structure, static web pages and some gene descriptions without properly defined function in the OMIM database. Hence, in this work the CGC tool was improved by redesigning its database structure, adding dynamic web pages and improving the prediction of unknown gene function by using exon analysis. The changes in database structure diminished the number of tables considerably, eliminated redundancies and made data retrieval more efficient. A new method for prediction of gene function was proposed, based on the assumption that similarity between exon sequences is associated with biochemical function. Using Blast with 20380 exon protein sequences and a threshold E-value of 0.01, 639 exon groups were obtained with an average of 11 exons per group. When estimating the functional similarity, it was found that on the average 72% of the exons in a group had at least one Gene Ontology (GO) term in common.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Priefer, Dennis [Verfasser], und Gabriele [Akademischer Betreuer] Taentzer. „Applying Model-Driven Engineering to Development Scenarios for Web Content Management System Extensions / Dennis Priefer ; Betreuer: Gabriele Taentzer“. Marburg : Philipps-Universität Marburg, 2021. http://d-nb.info/1240383894/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Somé, Dolière Francis. „Sécurité et vie privée dans les applications web“. Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.

Der volle Inhalt der Quelle
Annotation:
Dans cette thèse, nous nous sommes intéressés aux problématiques de sécurité et de confidentialité liées à l'utilisation d'applications web et à l'installation d'extensions de navigateurs. Parmi les attaques dont sont victimes les applications web, il y a celles très connues de type XSS (ou Cross-Site Scripting). Les extensions sont des logiciels tiers que les utilisateurs peuvent installer afin de booster les fonctionnalités des navigateurs et améliorer leur expérience utilisateur. Content Security Policy (CSP) est une politique de sécurité qui a été proposée pour contrer les attaques de type XSS. La Same Origin Policy (SOP) est une politique de sécurité fondamentale des navigateurs, régissant les interactions entre applications web. Par exemple, elle ne permet pas qu'une application accède aux données d'une autre application. Cependant, le mécanisme de Cross-Origin Resource Sharing (CORS) peut être implémenté par des applications désirant échanger des données entre elles. Tout d'abord, nous avons étudié l'intégration de CSP avec la Same Origin Policy (SOP) et démontré que SOP peut rendre CSP inefficace, surtout quand une application web ne protège pas toutes ses pages avec CSP, et qu'une page avec CSP imbrique ou est imbriquée dans une autre page sans ou avec un CSP différent et inefficace. Nous avons aussi élucidé la sémantique de CSP, en particulier les différences entre ses 3 versions, et leurs implémentations dans les navigateurs. Nous avons ainsi introduit le concept de CSP sans dépendances qui assure à une application la même protection contre les attaques, quelque soit le navigateur dans lequel elle s'exécute. Finalement, nous avons proposé et démontré comment étendre CSP dans son état actuel, afin de pallier à nombre de ses limitations qui ont été révélées dans d'autres études. Les contenus tiers dans les applications web permettent aux propriétaires de ces contenus de pister les utilisateurs quand ils naviguent sur le web. Pour éviter cela, nous avons introduit une nouvelle architecture web qui une fois déployée, supprime le pistage des utilisateurs. Dans un dernier temps, nous nous sommes intéressés aux extensions de navigateurs. Nous avons d'abord démontré que les extensions qu'un utilisateur installe et/ou les applications web auxquelles il se connecte, peuvent le distinguer d'autres utilisateurs. Nous avons aussi étudié les interactions entre extensions et applications web. Ainsi avons-nous trouvé plusieurs extensions dont les privilèges peuvent être exploités par des sites web afin d'accéder à des données sensibles de l'utilisateur. Par exemple, certaines extensions permettent à des applications web d'accéder aux contenus d'autres applications, bien que cela soit normalement interdit par la Same Origin Policy. Finalement, nous avons aussi trouvé qu'un grand nombre d'extensions a la possibilité de désactiver la Same Origin Policy dans le navigateur, en manipulant les entêtes CORS. Cela permet à un attaquant d'accéder aux données de l'utilisateur dans n'importe qu'elle autre application, comme par exemple ses mails, son profile sur les réseaux sociaux, et bien plus. Pour lutter contre ces problèmes, nous préconisons aux navigateurs un système de permissions plus fin et une analyse d'extensions plus poussée, afin d'alerter les utilisateurs des dangers réels liés aux extensions
In this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jarosch, Dennis [Verfasser], Robert [Akademischer Betreuer] Funk und Ph D. Michael [Akademischer Betreuer] Seadle. „Effects and opportunities of native code extensions for computationally demanding web applications / Dennis Jarosch. Gutachter: Robert Funk ; Michael Seadle, Ph.D“. Berlin : Humboldt Universität zu Berlin, Philosophische Fakultät I, 2012. http://d-nb.info/1019361786/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Norberg, Tobias, Andreas Oskarsson und Martin Kling. „Web application development : a study on UML Web Application Extension“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1689.

Der volle Inhalt der Quelle
Annotation:
The complexity of Web sites are increasing and transforming into Web applications that contain business logic, interactivity, transaction handling and states. This phenomenon forces the Web developers to adapt more traditional software engineering techniques to keep the Web applications error free, maintainable, reusable, well documented etc. Many Web developers do not use any engineering techniques at all and design mainly to create as fashionable applications as possible with no regards on the application?s functionality. This results in applications that are hard to maintain and with poor functionality. The purpose with this thesis was to see if the use of a more traditional software engineering technique, namely the Unified Modeling Language with the newly added Web Application Extension, resulted in a Web application with good design regarding the maintainability of the application. To investigate the maintainability of an application, the maintainability was further divided into three sub criteria: extensibility, reusability and documentation. These three criteria were then applied on a case study were a Web application was designed. From the analysis of the final design, using the three criteria, the maintainability was derived. The result of the entire investigation showed that the UML WAE had a good support for extensibility, fair support for reusability and very good support for documentation. From these results the main conclusion was derived, that the use of UML WAE resulted in good design regarding the maintainability. However, the result is limited to our case study and the design created in that case. The result may have been different if the three criteria had been applied on a different case. Another aspect to consider is that the quality of a design is often dependent on the knowledge of the persons that carry out the design.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Branderský, Gabriel. „Knihovna znovupoužitelných komponent a utilit pro framework Angular 2“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363860.

Der volle Inhalt der Quelle
Annotation:
Táto práca sa zaoberá vytvorením knižnice znovapoužiteľných komponent a utilít určené na použitie v dátavo-intenzívnych aplikáciach. Jednou typickou komponentou pre také aplikácie je tabuľka, ktorá je považovaná za hlavnú komponentu knižnice. Pre zaistenie vysokej kohezie sú všetky ostatné komponenty a utility sú s nou úzko prepojené. Výsledná sada komponent je použiteľná deklaratívným spôsobom a umožnuje rôzne konfigurácie. Uživateľské rozhranie je tiež prizpôsobené na dátovo-intenzívne aplikácie s rôznymi prvkami.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Alkhateeb, Faisal. „Interroger RDF(S) avec des expressions régulières“. Phd thesis, Université Joseph Fourier (Grenoble), 2008. http://tel.archives-ouvertes.fr/tel-00293206.

Der volle Inhalt der Quelle
Annotation:
RDF est un langage de représentation des connaissances dédié à l'annotation des ressources dans le Web Sémantique. Bien que RDF peut être lui-même utilisé comme un langage de requêtes pour interroger une base de connaissances RDF (utilisant la conséquence RDF), la nécessité d'ajouter plus d'expressivité dans les requêtes a conduit à définir le langage de requêtes SPARQL. Les requêtes SPARQL sont définies à partir des patrons de graphes qui sont fondamentalement des graphes RDF avec des variables. Les requêtes SPARQL restent limitées car elles ne permettent pas d'exprimer des requêtes avec une séquence non-bornée de relations (par exemple, Existe-t-il un itinéraire d'une ville A à une ville B qui n'utilise que les trains ou les bus?"). Nous montrons qu'il est possible d'étendre la syntaxe et la sémantique de RDF, définissant le langage PRDF (pour Path RDF) afin que SPARQL puisse surmonter cette limitation en remplaçant simplement les patrons de graphes basiques par des graphes PRDF. Nous étendons aussi PRDF à CPRDF (pour Constrained Path RDF) permettant d'exprimer des contraintes sur les sommets des chemins traversés (par exemple, "En outre, l'une des correspondances doit fournir une connexion sans fil."). Nous avons fourni des algorithmes corrects et complets pour répondre aux requêtes (la requête est un graphe PRDF ou CPRDF, la base de connaissances est un graphe RDF) basés sur un homomorphisme particulier, ainsi qu'une analyse détaillée de la complexité. Enfin, nous utilisons les graphes PRDF ou CPRDF pour généraliser les requêtes SPARQL, définissant les extensions PSPARQL et CPSPARQL, et fournissons des tests expérimentaux en utilisant une implémentation complète de ces deux langages.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Web extensions"

1

Barr, Catherine. Web assessment development assistant further extensions. [s.l: The Author], 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Inc, ebrary, Hrsg. TYPO3 extension development: Developer's guide to creating feature-rich extensions using the TYPO3 API. Birmingham, UK: Packt Pub., 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sarkar, Suhreed. Joomla! 1.5 top extensions cookbook. Birmingham [England]: Packt Pub., 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ray, West, Hrsg. Building Dreamweaver 4 and Dreamweaver UltraDev 4 extensions. Berkeley, Calif: Osborne/McGraw-Hill, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Inc, ebrary, Hrsg. Joomla! 1.5 JavaScript jQuery: Enhance your Joomla! sites with the power of jQuery extensions, plugins, and more. Birmingham, U.K: Packt Pub., 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

James, Kennard, und ebrary Inc, Hrsg. Mastering Joomla! 1.5 extension and framework development: The professional guide to programming Joomla! : extend the power of Joomla! by adding components, modules, plugins, and other extensions. Birmingham, U.K: Packt Open Source, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Heinemann, Frédéric. BSP Extensions: how to master Web reporting with HTMLB: How to use undocumented HTMLB elements ; Web application development to manage code fragments. hierarchical navigation, table selection, detail display, comprehensive search templates, and much more. Fort Lee, NJ [u.a.]: Galileo Press, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Learning Joomla! 1.5 extension development. Birmingham: Packt, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dreamweaver extension wang ye te xiao jue zhao. Taibei Shi: Qi feng zi xun gu fen you xian gong si, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Stauffer, Todd. The complete idiot's guide to Macintosh OS 8.5. Indianapolis, Ind: Que Alpha Books, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Web extensions"

1

Wootton, Cliff. „Client Browser Extensions“. In The Web Professional’s Handbook, 180–99. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-5362-4_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zakas, Nicholas C. „DOM Extensions“. In Professional Javascript® for Web Developers, 357–80. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722176.ch11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kent, Allan, David Powers und Rachel Andrew. „Dreamweaver Extensions“. In PHP Web Development with Macromedia Dreamweaver MX 2004, 247–94. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0701-6_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Tao, Cui, Natalya F. Noy, Harold R. Solbrig, Nigam H. Shah, Mark A. Musen und Christopher G. Chute. „Proposed SKOS Extensions for BioPortal Terminology Services“. In The Semantic Web, 342–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29923-0_23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Richards, Robert. „Other XML Technologies and Extensions“. In Pro PHP XML and Web Services, 811–38. Berkeley, CA: Apress, 2006. http://dx.doi.org/10.1007/978-1-4302-0139-7_21.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

deHaan, Jen, Peter deHaan, Simon Horwith, Curtis Hermann, Massimo Foti und Eduardo Zubler. „Dreamweaver MX 2004 Extensions“. In ColdFusion Web Development with Macromedia Dreamweaver MX 2004, 279–302. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0685-9_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Andrew, Rachel, Rob Turnbull, Alan Foley und Drew McLellan. „Dreamweaver MX 2004 Extensions“. In ASP Web Development with Macromedia Dreamweaver MX 2004, 321–46. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0722-1_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Calì, Andrea, Georg Gottlob und Thomas Lukasiewicz. „Datalog Extensions for Tractable Query Answering over Ontologies“. In Semantic Web Information Management, 249–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04329-1_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gleim, Lars, Liam Tirpitz und Stefan Decker. „HTTP Extensions for the Management of Highly Dynamic Data Resources“. In The Semantic Web, 212–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77385-4_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Sydow, Marcin. „Extensions of PageRank. The RBS Algorithm“. In Intelligent Information Processing and Web Mining, 389–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39985-8_40.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Web extensions"

1

Pardal, Miguel. „Core Mechanisms for Web Services Extensions“. In Third International Conference on Next Generation Web Services Practices (NWeSP'07). IEEE, 2007. http://dx.doi.org/10.1109/nwesp.2007.10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Adams, Carlisle, und Sharon Boeyen. „UDDI and WSDL extensions for Web service“. In the 2002 ACM workshop. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/764792.764798.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Perera, Srinath, und Dennis Gannon. „Enabling Web Service extensions for scientific workflows“. In 2006 Workshop on Workflows in Support of Large-Scale Science (WORKS06). IEEE, 2006. http://dx.doi.org/10.1109/works.2006.5282346.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Villoldo, Enric Jaen, Joan Serrat-Fernandez und Emilio Luque. „Improving Web Services Interoperability with Binding Extensions“. In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.108.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu und Jian Huang. „Alpaca: AR Graphics Extensions for Web Applications“. In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.00036.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu und Jian Huang. „Alpaca: AR Graphics Extensions for Web Applications“. In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.1581207820146.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Obimbo, Charlie, Yong Zhou und Randy Nguyen. „Analysis of Vulnerabilities of Web Browser Extensions“. In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00029.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Some, Doliere Francis. „EmPoWeb: Empowering Web Applications with Browser Extensions“. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00058.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sjösten, Alexander, Steven Van Acker und Andrei Sabelfeld. „Discovering Browser Extensions via Web Accessible Resources“. In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3029806.3029820.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Xing, Xinyu, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci und Wenke Lee. „Understanding Malvertising Through Ad-Injecting Browser Extensions“. In WWW '15: 24th International World Wide Web Conference. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2015. http://dx.doi.org/10.1145/2736277.2741630.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Web extensions"

1

Dusseault, L., Hrsg. HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV). RFC Editor, Juni 2007. http://dx.doi.org/10.17487/rfc4918.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Clemm, G., J. Crawford und J. Whitehead. Binding Extensions to Web Distributed Authoring and Versioning (WebDAV). Herausgegeben von J. Reschke. RFC Editor, April 2010. http://dx.doi.org/10.17487/rfc5842.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Clemm, G., J. Amsden, T. Ellison, C. Kaler und J. Whitehead. Versioning Extensions to WebDAV (Web Distributed Authoring and Versioning). RFC Editor, März 2002. http://dx.doi.org/10.17487/rfc3253.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Daboo, C. CardDAV: vCard Extensions to Web Distributed Authoring and Versioning (WebDAV). RFC Editor, August 2011. http://dx.doi.org/10.17487/rfc6352.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wilson, D., Daniel Breton, Lauren Waldrop, Danney Glaser, Ross Alter, Carl Hart, Wesley Barnes et al. Signal propagation modeling in complex, three-dimensional environments. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40321.

Der volle Inhalt der Quelle
Annotation:
The Signal Physics Representation in Uncertain and Complex Environments (SPRUCE) work unit, part of the U.S. Army Engineer Research and Development Center (ERDC) Army Terrestrial-Environmental Modeling and Intelligence System (ARTEMIS) work package, focused on the creation of a suite of three-dimensional (3D) signal and sensor performance modeling capabilities that realistically capture propagation physics in urban, mountainous, forested, and other complex terrain environments. This report describes many of the developed technical capabilities. Particular highlights are (1) creation of a Java environmental data abstraction layer for 3D representation of the atmosphere and inhomogeneous terrain that ingests data from many common weather forecast models and terrain data formats, (2) extensions to the Environmental Awareness for Sensor and Emitter Employment (EASEE) software to enable 3D signal propagation modeling, (3) modeling of transmitter and receiver directivity functions in 3D including rotations of the transmitter and receiver platforms, (4) an Extensible Markup Language/JavaScript Object Notation (XML/JSON) interface to facilitate deployment of web services, (5) signal feature definitions and other support for infrasound modeling and for radio-frequency (RF) modeling in the very high frequency (VHF), ultra-high frequency (UHF), and super-high frequency (SHF) frequency ranges, and (6) probabilistic calculations for line-of-sight in complex terrain and vegetation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Neves, Mateus C. R., Felipe De Figueiredo Silva und Carlos Otávio Freitas. The Effect of Extension Services and Credit on Agricultural Production in Bolivia, Peru, and Colombia. Inter-American Development Bank, Juli 2021. http://dx.doi.org/10.18235/0003404.

Der volle Inhalt der Quelle
Annotation:
In this paper we estimate the average treatment effect from access to extension services and credit on agricultural production in selected Andean countries (Bolivia, Peru, and Colombia). More specifically, we want to identify the effect of accessibility, here represented as travel time to the nearest area with 1,500 or more inhabitants per square kilometer or at least 50,000 inhabitants, on the likelihood of accessing extension and credit. To estimate the treatment effect and identify the effect of accessibility on these variables, we use data from the Colombian and Bolivian Agricultural Censuses of 2013 and 2014, respectively; a national agricultural survey from 2017 for Peru; and geographic information on travel time. We find that the average treatment effect for extension is higher compared to that of credit for farms in Bolivia and Peru, and lower for Colombia. The average treatment effects of extension and credit for Peruvian farms are $2,387.45 and $3,583.42 respectively. The average treatment effect for extension and credit are $941.92 and $668.69, respectively, while in Colombia are $1,365.98 and $1,192.51, respectively. We also find that accessibility and the likelihood of accessing these services are nonlinearly related. Results indicate that higher likelihood is associated with lower travel time, especially in the analysis of credit.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Beatty, William D., und III. Department of Defense, Inc. Are We Ready To Become An Extension of Corporate America. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada362978.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Avellán, Leopoldo M., Vitor Goncalves Cavalcanti, Pedro M. Garberi, Luis T. Marcano und Abraham R. Montilla. Why Is the Number of IDB Projects with Extensions beyond 24 Months Increasing?: Should We Be Concerned? Inter-American Development Bank, August 2018. http://dx.doi.org/10.18235/0001317.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Brianne, Selman, Brian Fauteux und Andrew deWaard. A User-Centric Case for Rights Reversions and Other Mitigations: The Cultural Capital Project Submission to ISED Consultation on Term Extension. University of Winnipeg Library, März 2021. http://dx.doi.org/10.36939/ir.202103091613.

Der volle Inhalt der Quelle
Annotation:
Term extension is unlikely to benefit any but the largest of rightsholders, and indeed, in general independent creators typically do not benefit greatly from the promised financial exploitation promised by copyrights. This has been made even more evident by the COVID pandemic - while copyrighted works are consumed more than ever, independent creators have sunk further into poverty. We propose mitigation strategies for term extension that would help the people who are creating Canada’s cultural landscape, as well as additional actions that would alleviate additional current copyright losses.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ahmadi, S. Real-Time Transport Protocol (RTP) Payload Format for the Variable-Rate Multimode Wideband (VMR-WB) Extension Audio Codec. RFC Editor, Februar 2006. http://dx.doi.org/10.17487/rfc4424.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie