• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • Tagged with
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Integrating secure programming concepts in introductory programming courses

Jama, Fartun January 2020 (has links)
The number of vulnerable systems with exploitable security defects has increased. This led to an increase in the demand for secure software systems. Software developers lack security experiences to design and build secure software, some even believe security is not their responsibility. Despite the increased need for teaching security and secure programming, security is not well integrated into the undergraduate computing curriculum and is only offered as part of a program or as an elective course. The aim of this project is to outline the importance of incorporating security and secure programming concepts in programming courses starting from the introductory courses. By evaluating the students' security consideration and knowledge regarding software security. As a result, based on the knowledge students lack regarding software security, security and secure programming concepts are identified which need to be integrated into the programming courses.
2

Electronic data interchange : an implementation methodology

Meyer, Ettienne 11 1900 (has links)
The purpose of the research is to propose and evaluate a methodology for implementing EDI to assist organisations in reaping the anticipated benefits. The research involved the systematic analysis of the state of the art of EDI and paradigms of methodologies, to define a model for the EDI implementation methodology, and to define criteria for evaluating such a model. The methodology was developed and modelled utilising the software process model, as adopted by Boehm (1988) and later duPlessis and van der Walt (1992), as a framework. Next a synthesis of the assimilated knowledge and brainstorming of project teams involved in EDI pilot projects, was used to systematically develop an EDI implementation methodology. The methodology was evaluated by utilising it in the implementation of EDI between two organisations, Computer Equipment Brokers (PTY) and Marksec (PTY). It was concluded that the methodology was efficient for implementing EDI. / Computing / M. Sc. (Information Systems)
3

Electronic data interchange : an implementation methodology

Meyer, Ettienne 11 1900 (has links)
The purpose of the research is to propose and evaluate a methodology for implementing EDI to assist organisations in reaping the anticipated benefits. The research involved the systematic analysis of the state of the art of EDI and paradigms of methodologies, to define a model for the EDI implementation methodology, and to define criteria for evaluating such a model. The methodology was developed and modelled utilising the software process model, as adopted by Boehm (1988) and later duPlessis and van der Walt (1992), as a framework. Next a synthesis of the assimilated knowledge and brainstorming of project teams involved in EDI pilot projects, was used to systematically develop an EDI implementation methodology. The methodology was evaluated by utilising it in the implementation of EDI between two organisations, Computer Equipment Brokers (PTY) and Marksec (PTY). It was concluded that the methodology was efficient for implementing EDI. / Computing / M. Sc. (Information Systems)

Page generated in 0.0569 seconds