• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2586
  • 1642
  • 1321
  • 1039
  • 381
  • 226
  • 192
  • 138
  • 110
  • 101
  • 101
  • 94
  • 55
  • 49
  • 49
  • Tagged with
  • 9669
  • 1733
  • 1150
  • 1135
  • 1073
  • 1048
  • 769
  • 658
  • 616
  • 599
  • 566
  • 524
  • 488
  • 470
  • 466
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
731

The effect of the consumer protection act on the "voetstoots" clause in the South African law and comparison to the Belgium law

Mattheus, I. (Ilze) January 2014 (has links)
No Abstract Available / Dissertation (LLM)--University of Pretoria, 2014. / lmchunu2014 / Mercantile Law / unrestricted
732

Characterisation of the proteolytic activity in the digestive system of the field slug Deroceras reticulatum as a target for novel methods of control

Walker, Anthony John January 1997 (has links)
No description available.
733

The impact of Bedouin agricultural gardens on biodiversity in South Sinai, Egypt

Norfolk, Olivia January 2015 (has links)
This project assesses the impact of traditional Bedouin agricultural gardens on biodiversity within the St Katherine Protectorate, South Sinai, Egypt. The Bedouin harvest rainwater from intermittent flash floods, allowing them to cultivate a wide range of trees and crops throughout the year. Rainwater harvesting techniques such as these can improve crop yields and enhance food security in arid regions, but this is one of the first studies to address the impact upon dependent wildlife. The results showed that the irrigated gardens support a more diverse plant community than the surrounding unmanaged habitat, providing an abundance of floral resources which in-turn enhance pollinator abundance and species richness. The inclusion of a diversity of culturally important minority crops had a dramatic effect upon the structure of plant-pollinator visitation networks, with cultivated plants supplementing the resources provided by wild flowers. The presence of simultaneously flowering crops also had a positive effect upon pollination services to the primary crop (almond), by attracting higher densities of wild pollinators into the gardens and facilitating enhanced fruit set. The higher abundance of resources within the gardens also had a positive impact upon birds in the region, with gardens supporting higher densities and species richness than the unmanaged habitat. Gardens were particularly important for migratory species, providing an important stop-over for numerous small passerines. In conclusion this study provides evidence that irrigated agriculture in arid environments has the potential to increase biodiversity above that found in the un-managed environment. The implications on a local scale are that traditional Bedouin practices can have a positive influence on wildlife within the Protectorate, thus initiatives to fund and support gardeners should be encouraged. On a wider scale the results suggest that rainwater harvesting may provide a sustainable mechanism for increasing food security in arid regions, offering a low-cost strategy for increasing agricultural productivity that does not undermine the biodiversity on which it depends.
734

Application of the access path model with specific reference to the SAP R/3 environment

Pretorius, Maria Rebecca 07 October 2014 (has links)
M.Com. (Computer Auditing) / The management and control of modern day computer systems are becoming more and more trying due to the complexity of systems. This renders the traditional approach to evaluating controls in complex computer systems, inadequate and heightens the need for an alternative audit approach. The complex SAP R/3 environment will be evaluated in terms of security and validity of users and processes. This will be achieved through the use of an alternative audit approach namely, the application of the Access Path and Path Context Models (Boshoff 1985, 1990). The research methodology used during this research may indicate universal application implications for similar complex environments, although this has not yet been proved. The research showed that there are many control features available in the different software c.omponents of the SAP R/3 environment, that can be applied to control access and validity of users and processes. The duplication of control features provided by the software components, requires a global approach to security inthe defined environment. Only when evaluating the environment as a whole, will it be able to make the most effective security decisions. The use of the control matrices developed during this research will ease the global evaluation of the SAP R/3 environment. Although further research is required, the above has proven the usefulness of both the research methodology and the resultant model and matrices.
735

The automatic generation of information security profiles

Pottas, Dalenca 07 October 2014 (has links)
D.Phil. (Computer Science) / Security needs have changed considerably in the past decade as the economics of computer usage necessitates increased business reliance on computers. As more individuals need computers to perform their jobs, more detailed security controls are needed to offset the risk inherent in granting more people access to computer systems. Traditionally, computer security administrators have been tasked with configuring' , security systems by setting controls on the actions of users. This basically entails the compilation of access rules (contained in security profiles), which state who can access what resources in what way. The task of building these rules is of considerable magnitude and is in general not well understood. Adhoc approaches, characterized by exhaustive interviewing and endless printouts of organizational data repositories, are usually followed. In the end, too much is left to the discretion of the security administrators...
736

Packaged software : security and controls audit review

Van Heerden, Chris 15 September 2015 (has links)
M.Com. / In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate a high level of integration and include security and control features to ensure that the integrity of input, processing, output and storage are maintained. Computer auditors are required to evaluate these advanced packaged software to ensure that the security and control features are adequate and comply with organisational standards. Furthermore, they must ensure that the integrity of information systems programs and data are maintained ...
737

Design and implementation of a prototype to include security activities as part of application systems design

Kasselman, André 20 November 2014 (has links)
M.Com. (Information systems) / This study has its origin in the growing need for information systems to be classified as 'secure'. With the increasing use of Computer Aided Software Engineering (CASE) tools in the design of application systems for commercial use, the risks that exist in terms of information security have become more prominent. The importance of considering security during the analysis and design of an information system, in other words, on a logical level, is increasing daily. Usually security features are added to existing application systems on an ad hoc basis. Security design activities should become such an integrated part of systems analysis and design activities on a logical level, that a complete integration of the two fields, security and computer aided software engineering, can be achieved. The aim of this dissertation is to study the literature to discover existing approaches to this integration, and to extract the strengths from them and expand on those strengths in order to compile an approach that is completely implementable in the form of a prototype data flow design tool (DFD tool). The proposed approach to the secure analysis and design of an application system of a logical level, which is presented in Chapter 4, is designed in conjunction with H.A.S. Booysen [Booysen, Kasselman, Eloff - 1994]. Existing CASE-tools have also been studied by the author to determine their current capabilities, especially in terms of security definition activities, but also in terms of their support to the systems analyst during the analysis and design phases of the project life cycle when developing a target application system.
738

'n Model vir inligtingsekerheidsdokumentasie

Du Toit, Louisa Maria 20 November 2014 (has links)
M.Sc. (Informatics) / A need has been identified for guidelines to Top Management on the implementation of an Information Security Policy and its associated documentation. In this dissertation, the Model for Information Security Documentation (lSD-model) for the organisation and content of documentation on information security is proposed. The proposed model is divided into three distinct levels respectively containing the Information Security Policy Document, the Goal Documents and the Application Guideline Documents. A document is placed on the different levels of the ISO-model according to the amount of detailed information it contains and the management level mainly concerned with that document. Guidelines are given regarding the content and format of each of the levels. Particular emphasis is laid on the Information Security Policy Document, which is the highest level, and a number of existing Information Security Policy Documents are evaluated according to the guidelines given for the lSD-model. Finally, a comparison is made between C. C. Wood's guidelines on Information Security Policies and those given for the ISO-model.
739

Information hiding for media authentication and covert communication

Wu, Haotian 01 January 2007 (has links)
No description available.
740

The prototype carbon Fund, a public/ private collaboration in the emerging environmental market

Maheo, Solen January 2007 (has links)
Magister Legum - LLM / This paper addresses the issue of the primary Prototype Carbon Fund objectives , which are High-Quality Emmissions reductions ; knowledge dissermination; Public-private parterships. The researcher further invesigates whether, eight years after its creation, the Prototype Carbon Fund is a success. / South Africa

Page generated in 0.0918 seconds