UJDigispace Repository

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Sort by: Order: Results:

  • Botha, Reinhardt A (1997)
    Client/Server computing is currently one of the buzzwords in the computer industry. The client/server environment can be defined as an open systems environment. This openness of the client/server environment makes it a ...
  • Von Solms, Rossouw (1993)
    Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization. These information resources and ...
  • Tvrz, Frankie (2008)
    Mobile handheld devices are moving from being peripheral devices and are now fulfilling functionality provided by laptops and desktops. The capability and functionality of handheld devices have improved. This makes the ...
  • Chetty, Jacqueline (2004)
    The Internet has come a long way from its humble beginnings of being used as a simple way of transporting data within the US army and other academic organizations. With the exploding growth of the Internet and the ...
  • Jordaan, Ansa (2004)
    This dissertation will be limited to the compilation of an Information Security Policy Architecture for a Tertiary Institution. An Information Security Policy Architecture for a Tertiary Institution is probably the most ...
  • Assefa, Sorene (2009)
    Knowledge sharing technique has been revolutionized over the past years, and the use of Information and Communication Technologies (ICTs) is one of the main contributors to this revolution. One of the knowledge sharing ...
  • Van Niekerk, Liesel (2005)
    The small, medium and micro enterprise (SMME) environment of South Africa contributes 42% to the national gross domestic product. This is a high number for a largely under-regulated environment. The corporate governance ...
  • Van der Merwe, Jacobus (1998)
    Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations allow non-employees to ...
  • Coetzee, Marijke (2001)
    Information can be considered a company’s most valued asset and should be protected as such. In the past, companies allowed very limited access to corporate information. Today, the rapid growth of the Internet increases ...
  • Prinsloo, Jacobus Johannes (1999)
    The present study was undertaken in the realm of the Internet working environment, with its focus on measures by which to secure executable code in the Web-browsing environment. The principal aim of this study was to ...
  • Venter, Diederik Petrus (2003)
    Information constitutes one of an organisation’s most valuable assets. It provides the modern organisation with a competitive edge and in some cases, is a requirement merely to survive. An organisation has to protect its ...
  • Dreyer, Lucas Cornelius Johannes (1996)
    In a society that is becoming increasingly reliant on information, it is necessary for information to be stored efficiently and safely. Database technology is used to store large chunks of information efficiently, while ...
  • Von Solms, Elmarie (2001)
    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information ...
  • Scarcella, Vincenzo (2002)
    The automated fabrication of a prototype three-dimensional part from a three-dimensional drawing can be regarded as rapid prototyping. There are two basic types of rapid prototyping: subtractive fabrication and additive ...
  • Hertenberger, Manfred Paul (1995)
    This study addresses the topic of integration between CASE tools and software engineering methodologies. Specific attention is given to the object-oriented paradigm to solve the problem of integration. The component ...
  • Janse van Vuuren, Hendrika Francina (1995)
    This study was conducted with the purpose of finding a thorough understanding, within the framework of business management, the integrating of the Information System strategy and Information Technology strategy, into the ...
  • De Bruin, Ludwig (2014)
    Data is generated at an ever-increasing rate and it has become difficult to process or analyse it in its raw form. The most data is generated by processes or measuring equipment, resulting in very large volumes of data ...
  • Van Niekerk, G.J. (2000)
    Layered Manufacturing (LM), also known as "Rapid Prototyping", is that process in terms of which a computer-designed model is created layer by layer with the aid of specific LM hardware. Telemanufacturing constitutes an ...

Search UJDigispace


Browse

My Account