Spelling suggestions: "subject:"5oftware protection"" "subject:"1software protection""
1 |
Copyright protection of computer software in the People's Republic of China conforming to international practice /Peng, Xiaohui. January 1999 (has links)
Thesis (LL. M.)--York University, Osgoode Hall Law School, 1999. Graduate Programme in Law. / Includes bibliographical references (leaves 1-5 at end). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://wwwlib.umi.com/cr/yorku/fullcit?pMQ39220.
|
2 |
An alternative and more adequate model of software protection /Moreno, Palmira Granados. January 1900 (has links)
Thesis (LL. M.)--University of Toronto, 2005. / Includes bibliographical references.
|
3 |
A dynamic integrity verification scheme for tamper-resistance softwareWoo, Yan. January 2005 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
|
4 |
Sofware reliability and safety engineering analysis for aerospace systemsShezi, Malusi P.N. 30 August 2010 (has links)
M.Ing. / This dissertation is intended to make a contribution to the engineering intellectual pool of knowledge by offering a perspective on the subject of software development that encompasses safety (i.e. quality, qualification and reliability). Software development will be examined in light of developments made in recent years in three engineering disciplines: quality, qualification and reliability. These developments will be infused into an established system engineering process currently in use in Denel Dynamics (referred to as ‘the organization’). This dissertation will probe how the concept of software quality is addressed and ensured in the organization. With the aid of current (best) practices and processes; techniques and systems, the author intends to present a different perspective on the development of quality software products from the current view of the organization, by addressing software safety, reliability and cost. The author believes that software quality, with particular emphasis on reliability, if systematically administered in a structured and controlled manner in an organization, will yield products for global markets that are both safe and cost-efficient. In the following chapters, software reliability will be discussed in detail in a quantitative and/or qualitative manner to explain the case presented. It is envisioned that the information collated in this dissertation will be used by all involved in the software product life cycle, such as first-time programme or project managers, programmers and decision makers, to help make informed decisions that will ensure the organization realizes the best return on its investment.
|
5 |
A dynamic integrity verification scheme for tamper-resistancesoftwareWoo, Yan., 胡昕. January 2005 (has links)
published_or_final_version / abstract / Computer Science / Master / Master of Philosophy
|
6 |
An event-trace language for software decoys /Fragkos, Georgios. January 2002 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002. / Thesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
|
7 |
Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /Råman, Jari. January 2006 (has links)
Diss.: Rovaniemi : Lapin yliopisto. / Includes bibliographical references and index.
|
8 |
Three essays on managing information systems security : patch management, learning dynamics, and security software market /Zhang, Guo Ying, January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (leaves 91-98).
|
9 |
Packaged software : security and controls audit reviewVan Heerden, Chris 15 September 2015 (has links)
M.Com. / In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate a high level of integration and include security and control features to ensure that the integrity of input, processing, output and storage are maintained. Computer auditors are required to evaluate these advanced packaged software to ensure that the security and control features are adequate and comply with organisational standards. Furthermore, they must ensure that the integrity of information systems programs and data are maintained ...
|
10 |
An evaluation of integrity control facilities in an AS/400 environmentBosman, Michael Louis 23 September 2014 (has links)
M.Com. (Computer Auditing) / Both the auditor, faced with the task of determining an effective and efficient audit approach, as well as management, charged with implementing and monitoring need purer security, need to evaluate integrity controls. This need to evaluate integrity controls is increasing, due to the growing complexity of computer environments, the breakdown of the paper audit trail, and the replacement of application controls by integrity controls. By applying the Access Path and Path Context Models, an evaluation was performed of integrity controls and risks in an AS/400 environment. The operating system (08/400) was delineated into functional categories to assist in the evaluation, in a manner consistent with that outlined in the Access Path Model. It was found that sufficient integrity control facilities exist in an AS/400 environment to meet the control objectives, although several risks were identified which could only be addressed by application controls.
|
Page generated in 0.0893 seconds