_version_ |
1809900875156553728
|
annif_keywords_txtF_mv |
safety and security
education and training
data security
network management (information technology)
sale
|
annif_uris_txtF_mv |
http://www.yso.fi/onto/yso/p7349
http://www.yso.fi/onto/yso/p84
http://www.yso.fi/onto/yso/p5479
http://www.yso.fi/onto/yso/p15513
http://www.yso.fi/onto/yso/p15269
|
author |
Jallow, Musa
|
author2 |
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Kyberturvallisuus
601
|
author_facet |
Jallow, Musa
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Kyberturvallisuus
601
Jallow, Musa
|
author_sort |
Jallow, Musa
|
building |
Jyväskylän yliopisto
JYX-julkaisuarkisto
|
datasource_str_mv |
jyx
|
department_txtF |
Informaatioteknologia
|
faculty_txtF |
Informaatioteknologian tiedekunta
|
first_indexed |
2022-11-08T21:00:34Z
|
format |
Pro gradu
|
format_ext_str_mv |
Opinnäyte
Pro gradu
|
free_online_boolean |
1
|
fullrecord |
<?xml version="1.0"?>
<qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Creating secure integrations : case of Salesforce integrations</title><creator>Jallow, Musa</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyväskylän yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyväskylä</contributor><contributor type="oppiaine" lang="fi">Kyberturvallisuus</contributor><contributor type="oppiaine" lang="en">Kyberturvallisuus</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">vulnerabilities</subject><subject type="other">integrations</subject><subject type="other">integration security</subject><subject type="other">secure development</subject><subject type="other">security responsibilities</subject><subject type="other">Salesforce</subject><subject type="other">cloud security</subject><subject type="yso">tietoturva</subject><subject type="yso">organisaatiot</subject><subject type="yso">turvallisuus</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">pilvipalvelut</subject><subject type="yso">hyvät käytännöt</subject><subject type="yso">tietotekniikka</subject><subject type="yso">digitalisaatio</subject><subject type="yso">turvallisuuspolitiikka</subject><subject type="yso">tietojärjestelmät</subject><subject type="yso">data security</subject><subject type="yso">organisations (systems)</subject><subject type="yso">safety and security</subject><subject type="yso">cyber security</subject><subject type="yso">cloud services</subject><subject type="yso">best practices</subject><subject type="yso">information technology</subject><subject type="yso">digitalisation</subject><subject type="yso">security policy</subject><subject type="yso">data systems</subject><available>2022-11-08T08:32:55Z</available><issued>2022</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master’s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/83815</identifier><identifier type="urn">URN:NBN:fi:jyu-202211085117</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202211085117</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/83815/1/URN%3aNBN%3afi%3ajyu-202211085117.pdf" name="URN:NBN:fi:jyu-202211085117.pdf" type="application/pdf" length="2206337" sequence="1"/><recordID>123456789_83815</recordID></qualifieddc>
|
id |
jyx.123456789_83815
|
language |
eng
|
last_indexed |
2024-09-03T10:53:06Z
|
main_date |
2022-01-01T00:00:00Z
|
main_date_str |
2022
|
online_boolean |
1
|
online_urls_str_mv |
{"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/83815\/1\/URN%3aNBN%3afi%3ajyu-202211085117.pdf","text":"URN:NBN:fi:jyu-202211085117.pdf","source":"jyx","mediaType":"application\/pdf"}
|
oppiainekoodi_txtF |
601
|
publication_first_indexed |
2022-11-08T21:00:34Z
|
publishDate |
2022
|
record_format |
qdc
|
source_str_mv |
jyx
|
spellingShingle |
Jallow, Musa
Creating secure integrations : case of Salesforce integrations
vulnerabilities
integrations
integration security
secure development
security responsibilities
Salesforce
cloud security
tietoturva
organisaatiot
turvallisuus
kyberturvallisuus
pilvipalvelut
hyvät käytännöt
tietotekniikka
digitalisaatio
turvallisuuspolitiikka
tietojärjestelmät
data security
organisations (systems)
safety and security
cyber security
cloud services
best practices
information technology
digitalisation
security policy
data systems
|
subject_txtF |
Kognitiotiede
|
thumbnail |
https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_83815&index=0&size=large
|
title |
Creating secure integrations : case of Salesforce integrations
|
title_full |
Creating secure integrations : case of Salesforce integrations
|
title_fullStr |
Creating secure integrations : case of Salesforce integrations
Creating secure integrations : case of Salesforce integrations
|
title_full_unstemmed |
Creating secure integrations : case of Salesforce integrations
Creating secure integrations : case of Salesforce integrations
|
title_short |
Creating secure integrations
|
title_sort |
creating secure integrations case of salesforce integrations
|
title_sub |
case of Salesforce integrations
|
title_txtP |
Creating secure integrations : case of Salesforce integrations
|
topic |
vulnerabilities
integrations
integration security
secure development
security responsibilities
Salesforce
cloud security
tietoturva
organisaatiot
turvallisuus
kyberturvallisuus
pilvipalvelut
hyvät käytännöt
tietotekniikka
digitalisaatio
turvallisuuspolitiikka
tietojärjestelmät
data security
organisations (systems)
safety and security
cyber security
cloud services
best practices
information technology
digitalisation
security policy
data systems
|
topic_facet |
Salesforce
best practices
cloud security
cloud services
cyber security
data security
data systems
digitalisaatio
digitalisation
hyvät käytännöt
information technology
integration security
integrations
kyberturvallisuus
organisaatiot
organisations (systems)
pilvipalvelut
safety and security
secure development
security policy
security responsibilities
tietojärjestelmät
tietotekniikka
tietoturva
turvallisuus
turvallisuuspolitiikka
vulnerabilities
|
url |
https://jyx.jyu.fi/handle/123456789/83815
http://www.urn.fi/URN:NBN:fi:jyu-202211085117
|
work_keys_str_mv |
AT jallowmusa creatingsecureintegrationscaseofsalesforceintegrations
|