Show simple item record

dc.contributor.author DARADKEH, Yousef Ibrahim
dc.contributor.author ARISTOVA, Svetlana Mikhailovna
dc.contributor.author KOROLEV, Petr Mikhailovich
dc.date.accessioned 2020-12-07T20:34:58Z
dc.date.available 2020-12-07T20:34:58Z
dc.date.issued 2017
dc.identifier.citation DARADKEH, Yousef Ibrahim, ARISTOVA, Svetlana Mikhailovna, KOROLEV, Petr Mikhailovich. Threats to internal application security. In: Microelectronics and Computer Science: proc. of the 9th intern. conf., October 19-21, 2017. Chişinău, 2017, pp. 386-388. ISBN 978-9975-4264-8-0. en_US
dc.identifier.isbn 978-9975-4264-8-0
dc.identifier.uri http://repository.utm.md/handle/5014/11960
dc.description.abstract Practice on development the business applications for companies are presented; issues of audit threats to information systems counterpointed as good and bad news for business and engineers. Ways to exploit the vulnerability discussed. Audit is to minimize potential damage to the company from incorrect performance of the software that supports a given business process. What should we worry about with internal applications? Authors of the paper do answer on this. en_US
dc.language.iso en en_US
dc.publisher Technical University of Moldova en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject auditing custom-made application security en_US
dc.subject threats to business process en_US
dc.subject application threat model en_US
dc.title Threats to internal application security en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Browse

My Account