Search


Current filters:
Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 11 (Search time: 0.003 seconds).
Item hits:
Issue DateTitleAuthor(s)
28-Jul-2015Information security in implementing web applications for small businesses based on COBIT5-SI [Seguridad de la Información en la implementación de aplicaciones web para pequeñas empresas en base a COBIT5-SI]Salazar, K.; Guaman Bastidas, F.; Jaramillo Hurtado, D.
-Implementation of techniques, standards and safety recommendations to prevent XSS and SQL injection attacks in Java EE RESTful applicationsGuaman Bastidas, F.; Correa Quezada, R.; Guaman Coronel, D.; Jaramillo Hurtado, D.
28-Jul-2015Definition of cybersecurity businness framework based on ADM-TOGAF [Definición de un Marco de Referencia de Ciberseguridad Empresarial basado en ADM-TOGAF]Carrillo, J.; Abad Espinoza, M.; Torres, A.; Jaramillo Hurtado, D.; Cabrera Silva, A.
1-Jan-2016Definition and implementation of the Enterprise Business Layer through a Business Reference Model, using the architecture development method ADM-TOGAFCarrillo, J.; Abad Espinoza, M.; Gómez, J.; Cabrera Silva, A.; Jaramillo Hurtado, D.
-Design and validation of enterprise application architectures [Diseño y validación de arquitecturas de aplicaciones empresariales]Romero, F.; Abad Espinoza, M.; Cabrera Silva, A.; Carrillo, J.; Jaramillo Hurtado, D.
28-Jul-2015Incidence of software quality attributes in the design, construction and deployment of Cloud architectural environmentsCarrillo, J.; Abad Espinoza, M.; Poma, A.; Cabrera Silva, A.; Jaramillo Hurtado, D.
21-Jun-2014Requeriments elicitaction of resilience for systems information based on the model CERT-RMM [Elicitación de requisitos de resiliencia para sistemas de información basado en el modelo CERT-RMM]Palacios A., J.; Jaramillo Hurtado, D.
-Roadmap for the implementation of an enterprise architecture framework oriented to institutions of higher education in EcuadorAbad Espinoza, M.; Cabrera Silva, A.; Jaramillo Hurtado, D.
-Comparative analysis between the techniques used in the Requirements Engineering, evaluating such techniques forehead to the characteristics of software projectsValdivieso, D.; Jaramillo Hurtado, D.
-Including security mechanisms into systems architecture supporting vulnerabilitiesAbad Espinoza, M.; Jaramillo Hurtado, D.; Cabrera Silva, A.