_version_ 1809900875156553728
annif_keywords_txtF_mv safety and security education and training data security network management (information technology) sale
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p7349 http://www.yso.fi/onto/yso/p84 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p15513 http://www.yso.fi/onto/yso/p15269
author Jallow, Musa
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kyberturvallisuus 601
author_facet Jallow, Musa Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kyberturvallisuus 601 Jallow, Musa
author_sort Jallow, Musa
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2022-11-08T21:00:34Z
format Pro gradu
format_ext_str_mv Opinnäyte Pro gradu
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Creating secure integrations : case of Salesforce integrations</title><creator>Jallow, Musa</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Kyberturvallisuus</contributor><contributor type="oppiaine" lang="en">Kyberturvallisuus</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">vulnerabilities</subject><subject type="other">integrations</subject><subject type="other">integration security</subject><subject type="other">secure development</subject><subject type="other">security responsibilities</subject><subject type="other">Salesforce</subject><subject type="other">cloud security</subject><subject type="yso">tietoturva</subject><subject type="yso">organisaatiot</subject><subject type="yso">turvallisuus</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">pilvipalvelut</subject><subject type="yso">hyv&#xE4;t k&#xE4;yt&#xE4;nn&#xF6;t</subject><subject type="yso">tietotekniikka</subject><subject type="yso">digitalisaatio</subject><subject type="yso">turvallisuuspolitiikka</subject><subject type="yso">tietoj&#xE4;rjestelm&#xE4;t</subject><subject type="yso">data security</subject><subject type="yso">organisations (systems)</subject><subject type="yso">safety and security</subject><subject type="yso">cyber security</subject><subject type="yso">cloud services</subject><subject type="yso">best practices</subject><subject type="yso">information technology</subject><subject type="yso">digitalisation</subject><subject type="yso">security policy</subject><subject type="yso">data systems</subject><available>2022-11-08T08:32:55Z</available><issued>2022</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master&#x2019;s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/83815</identifier><identifier type="urn">URN:NBN:fi:jyu-202211085117</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202211085117</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/83815/1/URN%3aNBN%3afi%3ajyu-202211085117.pdf" name="URN:NBN:fi:jyu-202211085117.pdf" type="application/pdf" length="2206337" sequence="1"/><recordID>123456789_83815</recordID></qualifieddc>
id jyx.123456789_83815
language eng
last_indexed 2024-09-03T10:53:06Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/83815\/1\/URN%3aNBN%3afi%3ajyu-202211085117.pdf","text":"URN:NBN:fi:jyu-202211085117.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2022-11-08T21:00:34Z
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Jallow, Musa Creating secure integrations : case of Salesforce integrations vulnerabilities integrations integration security secure development security responsibilities Salesforce cloud security tietoturva organisaatiot turvallisuus kyberturvallisuus pilvipalvelut hyvät käytännöt tietotekniikka digitalisaatio turvallisuuspolitiikka tietojärjestelmät data security organisations (systems) safety and security cyber security cloud services best practices information technology digitalisation security policy data systems
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_83815&index=0&size=large
title Creating secure integrations : case of Salesforce integrations
title_full Creating secure integrations : case of Salesforce integrations
title_fullStr Creating secure integrations : case of Salesforce integrations Creating secure integrations : case of Salesforce integrations
title_full_unstemmed Creating secure integrations : case of Salesforce integrations Creating secure integrations : case of Salesforce integrations
title_short Creating secure integrations
title_sort creating secure integrations case of salesforce integrations
title_sub case of Salesforce integrations
title_txtP Creating secure integrations : case of Salesforce integrations
topic vulnerabilities integrations integration security secure development security responsibilities Salesforce cloud security tietoturva organisaatiot turvallisuus kyberturvallisuus pilvipalvelut hyvät käytännöt tietotekniikka digitalisaatio turvallisuuspolitiikka tietojärjestelmät data security organisations (systems) safety and security cyber security cloud services best practices information technology digitalisation security policy data systems
topic_facet Salesforce best practices cloud security cloud services cyber security data security data systems digitalisaatio digitalisation hyvät käytännöt information technology integration security integrations kyberturvallisuus organisaatiot organisations (systems) pilvipalvelut safety and security secure development security policy security responsibilities tietojärjestelmät tietotekniikka tietoturva turvallisuus turvallisuuspolitiikka vulnerabilities
url https://jyx.jyu.fi/handle/123456789/83815 http://www.urn.fi/URN:NBN:fi:jyu-202211085117
work_keys_str_mv AT jallowmusa creatingsecureintegrationscaseofsalesforceintegrations