References
- Danilo Ardagna, Giuliano Casale, Michele Ciavotta, Jaun F. Perez, Weikun Wang: Quality-of-service in cloud computing: modelling techniques and their applications. Journal of Internet Services and Applications, Springer Open Journal. pp. 1-17. (2014).
- Chen-Fang Tsai, Shin-Li Lu, Jen-Hsiang Chen: A New Quality Chart to Im- prove the Efficiency of Cloud Resource Management. In: 12th International Conference on e-Business Engineering, IEEE Explore, pp. 434-438. IEEE Ex- plore Digital Library (2015).
- Rajiv Chopra: Testing Web Applications: The state of art and future trends. 1st Edn. Cambridge International Science Publishing, UK (2016).
- Rashmi, G. Sahoo, Shaban Mehfuz: A Software Engineering Approach for Cloud Migration. In: Rajiv Ranjan, Raj Kumar Buyya, Anirban Basu. Advances in Cloud Computing, Proceedings of the International Conference on ACC, pp. 71-76. Universities Press (2012).
- Vikrant Karvir, Umer Ansari, Larry Beser, Gary Harris, Yousuf Hasan, Manish Jain: Cloud Deployment Considerations for Service Providers. In: Rajiv Ranjan, Raj Kumar Buyya, Anirban Basu. Advances in Cloud Computing, Proceedings of the International Conference on ACC, pp. 134-140. Universi- ties Press (2012).
- Hung Q. Nguyen: Testing Applications on the Web. 1st edn. Wiley Computer Publishing, USA (2001).
- Peter Anderton: Cloud Migration: An Incremental Approach. PC Quest, pp. 25-27 (2011).
- Shumpy Saini: Software Testing: New Methodologies. PC Quest, pp. 73-74, (2011).
- C. Xavier: Web Technology and Design. Reprint Edition New Age International Publishers, (2015).
- Arshad Noor: A Secure WebApplication Architecture for the Cloud. In: Rajiv Ranjan, Raj Kumar Buyya, Anirban Basu. Advances in Cloud Computing, Proceedings of the International Conference on ACC, pp. 150-151. Universities Press (2012).
- Rajiv Chopra, Sushila Madan: Testing Websites using P3R2 Model. Inter- national Journal of Computer Science Issues, IJCSI. Vol. 9 issue 4. pp- 248-253. (2012).
- Rajiv Chopra: Cloud Computing. Mercury learning and Information, USA (2019).
- P. L. K. Priyadarsini: A Survey on some Applications of Graph Theory in Cryptography. Journal of Discrete Mathematical Sciences and Cryptography, Vol. 18 issue 3, pp. 209-217. (2015). doi: 10.1080/09720529.2013.878819
- Kumar Abhishek: Set-Valued Graphs-A Survey. Journal of Discrete Mathemati- cal Sciences and Cryptography, Vol. 18 issue 1-2, pp. 55-80. (2015). doi: 10.1080/09720529.2014.894306
- Ali Mesbah, Arie Van Deursen: Migrating Multi-Page Web Applications to Single Page Ajax Interfaces. In: 11th European Conference on Software Main- tenance and Reengineering, IEEE 2007, pp 181-190.
- Rajiv Chopra, Kapila Kapoor: Regression Testing of a Relational Database. In IndiaCom-2009, pp 423-24 and 432.
- Mc Cabe et. al: Using Cyclomatic Path Analysis to Detect Security Vulner- abilities. In: White Paper, 2011, pp 2-9.
- Glenford J. Myers: The Art of Software Testing, Wiley India, 2009.
- Rajiv Chopra: Web Security, Internet Security and Cyber Security: A Report. In: 2nd International Conference on Emerging Trends of Engineering, Science, Management and its Applications, pp 18-22, Volume 4, Special Issue, Proc. published by Pearson Inc., March 2015.
- Rajiv Chopra, Sushila Madan: Locating a Pin in a Haystack before the Customer Finds. In: International Journal of Applied Information Systems (IJAIS), linked to Harvard University, pp 47-49, Volume 8, No. 2, Jan. 2015.
- Rajiv Chopra: Security during Secure Software Development Life Cycle. In: International Conference on Engineering Technology, Management and Applied Sciences (ICETMAS-15), pp 1-4, Volume-1, Special Issue, and Proc. published by McGraw Hill (MGH), September 2015.
- Symantec’s : Internet Security Threat Report, Vol. 17, pp 1-52, 2011.