Search
Now showing items 1-10 of 22
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(2012)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
The capabilities of XML and its interaction with legacy databases
(2003)
This thesis endeavours to establish which of the applications within the Extensible
Markup Language (XML) available at present, meet the requirements of a modem
business engaging in Electronic Commerce (E-Commerce) ...
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(2015-05)
In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ...
A comparison between Cloud Solutions with focus on DevOps tooling
(2015-05)
The DevOps philosophy keeps gaining popularity due to its practices that allow
companies to quickly deliver software changes to their customers. Along with this
advent, Cloud Solutions continue to expand their customer ...
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(2010)
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...
Evaluating elliptic curve cryptography for use on java card
(2003)
Smart cards are used as trusted storage and data processing systems to store cryptographic
private keys and other valuable information. Java Card promises the ease of programming
in Java to the world of smart cards. ...
Threat modelling for legacy enterprise applications
(2013)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
Automated real-time animation
(2008)
Producing animation for the computer game/entertainment industry is a time-
consuming, difficult process. One approach to maximizing the utility of previously
animated sequences is to blend and warp pre-existing sequences ...
Magnumserver pages: improvements and extensions to java server pages
(2005)
Today vast amounts of services and information are provided by the WWW. By its very
nature, the information involved is changeable; hence static web pages are no longer
adequate and methods of coping with dynamic ...