dc.contributor.advisor | Le, Hanh | en_ZA |
dc.contributor.author | Zimba, Brian Ackim | en_ZA |
dc.date.accessioned | 2015-04-02T14:18:47Z | |
dc.date.accessioned | 2018-11-26T13:53:35Z | |
dc.date.available | 2015-04-02T14:18:47Z | |
dc.date.available | 2018-11-26T13:53:35Z | |
dc.date.issued | 2011 | en_ZA |
dc.identifier.uri | http://hdl.handle.net/11427/12676 | |
dc.identifier.uri | http://repository.aust.edu.ng/xmlui/handle/11427/12676 | |
dc.description | Includes bibliographical references (leaves 52-54). | en_ZA |
dc.description.abstract | The rise in global connectivity driven by user-demand is bringing about a wave of end-user interconnectivity applications. This, coupled with the improvements in software security that have forced a shift from syntactic to semantic attacks points at an every-growing likelihood of attacks targeting the human element. Literature predicts the extensibility of applications as presenting a growing threat, but the context of this threat beyond the web-browser model, remains unclear and uncharted. This work examines the possible threat extensibility poses in this developing context of greater enduser connectivity. | en_ZA |
dc.language.iso | eng | en_ZA |
dc.subject.other | Information Technology | en_ZA |
dc.title | Extensibility in end-user network applications : a feature or a flaw? | en_ZA |
dc.type.qualificationlevel | Masters | en_ZA |
dc.type.qualificationname | MSc | en_ZA |
dc.publisher.institution | University of Cape Town | |
dc.publisher.faculty | Faculty of Science | en_ZA |
dc.publisher.department | Department of Computer Science | en_ZA |