fullrecord |
[{"key": "dc.contributor.advisor", "value": "Saksa, Tytti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hjelt, Touko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-06-03T05:16:41Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-06-03T05:16:41Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/46180", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Parhaat k\u00e4yt\u00e4nteet tarjoavat tehokkaan tavan v\u00e4litt\u00e4\u00e4 t\u00e4rke\u00e4\u00e4 tietotaitoa\ntietoteknisi\u00e4 sovelluksia kehitett\u00e4ess\u00e4. Ne soveltuvat hyvin my\u00f6s tietoturvaratkaisujen\nperiaatteiden v\u00e4litt\u00e4miseen. T\u00e4ss\u00e4 tutkielmassa tarkastellaan tietoturvan\nparhaita k\u00e4yt\u00e4nteit\u00e4 sovelluskehityksess\u00e4, ja muodostetaan yksi mahdollinen\nkokoelma parhaita k\u00e4yt\u00e4nteit\u00e4, joilla pyrit\u00e4\u00e4n takaamaan tietoturvan onnistunut\nimplementointi ohjelmistokehityksen elinkaaren jokaisessa vaiheessa. Sen j\u00e4lkeen\nperehdyt\u00e4\u00e4n my\u00f6s parhaiden k\u00e4yt\u00e4nteiden mahdollisiin sudenkuoppiin, sek\u00e4 parhaiden\nk\u00e4yt\u00e4nteiden ja innovatiivisuuden v\u00e4liseen rajank\u00e4yntiin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Best practices are an effective way to deliver vital knowledge in IT domain.\nThey can also restore proper security practices and procedures. This study will analyze\nbest practices of information security in software developement, and produce\none possible collection of best practices to ensure successfull implementation of information\nsecurity in any software developement project. Some disadvantages will\nalso be covered, and some thoughts shared with the skirmish between innovation\nand best practices.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Touko Hjelt (tojojuhj) on 2015-06-03 05:16:40.730582. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-06-03T05:16:41Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201506032165.pdf: 242353 bytes, checksum: 15b65a07a67d16e5a9e304ac043aecc5 (MD5)\nlicense.html: 4794 bytes, checksum: 4844c1c117f851762ea26c129ad68c43 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-06-03T05:16:41Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201506032165.pdf: 242353 bytes, checksum: 15b65a07a67d16e5a9e304ac043aecc5 (MD5)\nlicense.html: 4794 bytes, checksum: 4844c1c117f851762ea26c129ad68c43 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "19", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Parhaat k\u00e4yt\u00e4nteet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sovelluskehitys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvan parhaat k\u00e4yt\u00e4nteet ohjelmistokehityksess\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201506032165", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-06-03T05:16:41Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|