UJDigispace Repository

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Sort by: Order: Results:

  • Van der Merwe, Jacobus (1998)
    Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations allow non-employees to ...
  • Coetzee, Marijke (2001)
    Information can be considered a company’s most valued asset and should be protected as such. In the past, companies allowed very limited access to corporate information. Today, the rapid growth of the Internet increases ...
  • Prinsloo, Jacobus Johannes (1999)
    The present study was undertaken in the realm of the Internet working environment, with its focus on measures by which to secure executable code in the Web-browsing environment. The principal aim of this study was to ...
  • Venter, Diederik Petrus (2003)
    Information constitutes one of an organisation’s most valuable assets. It provides the modern organisation with a competitive edge and in some cases, is a requirement merely to survive. An organisation has to protect its ...
  • Dreyer, Lucas Cornelius Johannes (1996)
    In a society that is becoming increasingly reliant on information, it is necessary for information to be stored efficiently and safely. Database technology is used to store large chunks of information efficiently, while ...
  • Von Solms, Elmarie (2001)
    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information ...
  • Scarcella, Vincenzo (2002)
    The automated fabrication of a prototype three-dimensional part from a three-dimensional drawing can be regarded as rapid prototyping. There are two basic types of rapid prototyping: subtractive fabrication and additive ...
  • Janse van Vuuren, Hendrika Francina (1995)
    This study was conducted with the purpose of finding a thorough understanding, within the framework of business management, the integrating of the Information System strategy and Information Technology strategy, into the ...
  • De Bruin, Ludwig (2014)
    Data is generated at an ever-increasing rate and it has become difficult to process or analyse it in its raw form. The most data is generated by processes or measuring equipment, resulting in very large volumes of data ...
  • Van Niekerk, G.J. (2000)
    Layered Manufacturing (LM), also known as "Rapid Prototyping", is that process in terms of which a computer-designed model is created layer by layer with the aid of specific LM hardware. Telemanufacturing constitutes an ...
  • O'Reilly, Grant Blaise (2002)
    Knowledge in organizations today is considered as one of the most important assets the organization possesses. A considerable part of this knowledge is the knowledge possessed by the individuals employed by the organization. ...
  • Zhang, Xiaomei (2003)
    The present research study will be dedicated to expounding an integrated event-based scheduling model, which model will, in turn, be based on an object-oriented method and a knowledge-based methodology. In order to complete ...
  • Hodgkinson, Warren (2005)
    One of the fastest developing areas in the entertainment industry is digital animation. Television programmes and movies frequently use 3D animations to enhance or replace actors and scenery. With the increase in computing ...
  • Andrade, Christopher Grant (2007)
    Determining the identity of a person has become vital in today’s world. Emphasis on security has become increasingly more common in the last few decades, not only in Information Technology, but across all industries. One ...
  • Tolnai, Annette (2008)
    The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a part of our daily lives, the more we expose ourselves and our ...
  • Hattingh, Pieter (2012)
  • Grobler, Martha Maria (2009)
  • Du Preez, Johan Frederik (2006)
    The need for a more secure cyber future is apparent in the information age that we live in. Information is fast becoming, and already is, one of the biggest assets in all domains of life. Access to information and ...
  • Grimm, Nicholas Justin (2014)
    This research has the aim of creating a low-cost, contactless, micro-payment framework to support micro-payments for the informal taxi industry in South Africa. The informal taxi industry is a prime example of an industry ...

Search UJDigispace


Browse

My Account