Spelling suggestions: "subject:"5oftware devevelopment life cycle (SDLC)"" "subject:"5oftware devevelopment life eycle (SDLC)""
1 |
Integrating secure programming concepts in introductory programming coursesJama, Fartun January 2020 (has links)
The number of vulnerable systems with exploitable security defects has increased. This led to an increase in the demand for secure software systems. Software developers lack security experiences to design and build secure software, some even believe security is not their responsibility. Despite the increased need for teaching security and secure programming, security is not well integrated into the undergraduate computing curriculum and is only offered as part of a program or as an elective course. The aim of this project is to outline the importance of incorporating security and secure programming concepts in programming courses starting from the introductory courses. By evaluating the students' security consideration and knowledge regarding software security. As a result, based on the knowledge students lack regarding software security, security and secure programming concepts are identified which need to be integrated into the programming courses.
|
2 |
Electronic data interchange : an implementation methodologyMeyer, Ettienne 11 1900 (has links)
The purpose of the research is to propose and evaluate a
methodology for implementing EDI to assist organisations in
reaping the anticipated benefits. The research involved the
systematic analysis of the state of the art of EDI and
paradigms of methodologies, to define a model for the EDI
implementation methodology, and to define criteria for
evaluating such a model. The methodology was developed and
modelled utilising the software process model, as adopted by
Boehm (1988) and later duPlessis and van der Walt (1992),
as a framework. Next a synthesis of the assimilated
knowledge and brainstorming of project teams involved in
EDI pilot projects, was used to systematically develop an EDI
implementation methodology. The methodology was evaluated
by utilising it in the implementation of EDI between two
organisations, Computer Equipment Brokers (PTY) and
Marksec (PTY). It was concluded that the methodology was
efficient for implementing EDI. / Computing / M. Sc. (Information Systems)
|
3 |
Electronic data interchange : an implementation methodologyMeyer, Ettienne 11 1900 (has links)
The purpose of the research is to propose and evaluate a
methodology for implementing EDI to assist organisations in
reaping the anticipated benefits. The research involved the
systematic analysis of the state of the art of EDI and
paradigms of methodologies, to define a model for the EDI
implementation methodology, and to define criteria for
evaluating such a model. The methodology was developed and
modelled utilising the software process model, as adopted by
Boehm (1988) and later duPlessis and van der Walt (1992),
as a framework. Next a synthesis of the assimilated
knowledge and brainstorming of project teams involved in
EDI pilot projects, was used to systematically develop an EDI
implementation methodology. The methodology was evaluated
by utilising it in the implementation of EDI between two
organisations, Computer Equipment Brokers (PTY) and
Marksec (PTY). It was concluded that the methodology was
efficient for implementing EDI. / Computing / M. Sc. (Information Systems)
|
Page generated in 0.0699 seconds