Search
Now showing items 1-10 of 32
Angiotensin-I-converting enzyme and prolyl endopeptidase inhibitory peptides from marine processing by-products
(2011)
Like many natural resource-based processing industries, the seafood processing sector gives
rise to a significant volume of organic waste, Environmental issues, economic concerns and
legal restrictions regarding the ...
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(2012)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
The capabilities of XML and its interaction with legacy databases
(2003)
This thesis endeavours to establish which of the applications within the Extensible
Markup Language (XML) available at present, meet the requirements of a modem
business engaging in Electronic Commerce (E-Commerce) ...
Synthesis and characterisation of novel astaxanthin metal complexes
(2015-10)
Astaxanthin is produced in a wide range of organisms, its extractability from the native
Irish brown crab (Cancer pagurus) was carried out using glacial acetic acid. The
extractable natural astaxanthin yield is quantified ...
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(2015-05)
In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ...
A comparison between Cloud Solutions with focus on DevOps tooling
(2015-05)
The DevOps philosophy keeps gaining popularity due to its practices that allow
companies to quickly deliver software changes to their customers. Along with this
advent, Cloud Solutions continue to expand their customer ...
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(2010)
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...
Evaluating elliptic curve cryptography for use on java card
(2003)
Smart cards are used as trusted storage and data processing systems to store cryptographic
private keys and other valuable information. Java Card promises the ease of programming
in Java to the world of smart cards. ...
Threat modelling for legacy enterprise applications
(2013)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...