Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
This article presents a method to fast estimate the development effort of Web-based information systems in Chile. The method, called Chilean Web Application Development Effort Est...
Sergio F. Ochoa, M. Cecilia Bastarrica, Germ&aacut...
: The internet has emerged as a key channel for both firms and governments. E-government programmes are diverse, and difficult to assess and compare with e-business initiatives. Th...