Spelling suggestions: "subject:"xrf"" "subject:"esrf""
1 |
Implementing a web-based bookingsystem using GoVu, Phi-Long January 2016 (has links)
The project investigated the advantages and disadvantages of Go while abooking system for Tieto was developed. The frameworks and APIs AngularJS,REST, JSON and mongoDB were used during the development of thebooking system. The result was a fully working stand-alone booking systemwith a login functionality. The back-end server was written in Go while thefront-end client was written in JavaScript using AngularJS. / Projektet undersökte fördelarna och nackdelar med Go medan ett bokningssystemför Tieto utvecklades. Under utvecklingen av bokningssystemet såanvändes ramverken och APIerna AngularJS, REST, JSON och mongoDB.Resultatet blev ett fullt fungerande fristående bokningssystem med supportför inloggning. Back-end servern var skriven i Go medan front-end klientenvar skriven i JavaScript med AngularJS.
|
2 |
Investigating the current state of securityfor small sized web applicationsLundberg, Karl Johan January 2012 (has links)
It is not uncommon to read about hacker attacks in the newspaper today. The hackers are targeting governments and enterprises, and motives vary. It may be political or economic reasons, or just to gain reputation. News about smaller systems is, unsurprisingly, not as common. Does this mean that security is less relevant of smaller systems? This report investigates the threat model of smaller web applications, to answer that very question.Different attacks are described in the detail needed for explaining their threat but the intention is not to teach the reader to write secure code. The report does, however, provide the reader with a rich source of references for that purpose. After describing some of the worst threats, the general cloud threat model is analyzed. This is followed by a practical analysis of a cloud system, and the report is closed with general strategies for countering threats.The severe destruction that a successful attack may cause and the high prevalence of those attacks motivates some security practices to be performed whenever software is produced. Attacks against smaller companies are more common now than ever before
|
Page generated in 0.0409 seconds