Repository logo
  • English
  • Català
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
    Communities & Collections
    All of DSpace
  • English
  • Català
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Mushi, Magreth Jubilate"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Development of in-house applications security analyzer (iasa)
    (University of Dar es Salaam, 2008) Mushi, Magreth Jubilate
    In-house developed applications security has become a major concern in recent years. Hackers are using new techniques to gain access to sensitive data, disable applications and administer other malicious activities aimed at the applications. The need to secure applications is imperative for use in today's world. Until recently, applications security was an afterthought; developers were typically focused on functionality and features, waiting to implement security at the end of development. This approach to applications security has proven to be disastrous; much vulnerability has gone undetected allowing applications to be attacked and damaged. From Chapter two, it is clear that, developers are not effective in ensuring security is implemented in in-house developed applications, while at the same time most IT professionals (84.5%) employed in organizations have less than 5 years of IT experience, which is not enough to ensure that the applications developed and installed in their systems are secure. The study was about analyzing in-house developed applications to determine possible flaws in those applications and design and implement an analyzer which will be used to scan the application codes, discover the possible flaws and provide recommendations on how to mitigate them. A tool named Meg Application Analyzer has been developed specifically for this task. Meg Application Analyzer uses static analysis to inspect Java byte code for occurrences of bug patterns. Static analysis means that Meg Application Analyzer can find bugs by simply inspecting a program's code; executing the program is not necessary, which makes it very easy to use.

About Library

The University of Dar es Salaam Library is a vital source of scholarly information that facilitates users to get access to learning and research resources during their studies. It provides access to a wide range of resources in both print and digital formats and conducive reading environment for users, regardless of their physical conditions. All registered users are eligible to access library resources and can borrow print materials from general shelves for a specific period of time.

Useful Links

Koha Staff Login

University Research Repository

WebMail

Aris

Book Study Room

Mara Oral History

Hansard

SOCIAL MEDIA

Instagram

Facebook

Twitter

YouTube

WhatsApp

Ask Librarian

Contact Us

Postal Address
P.O.Box 35092
Dar es Salaam

Call Us: +255 22 2410500/9 Ext. 2165 ; Direct line +255 22 2410241

Fax No:: +255 22 2410241

Email:: directorlibrary@udsm.ac.tz

2025 University of Dar es Salaam - University Of Dar Es Salaam Library
Term of use / Privacy Policy