Implementation of Portable Security Analysis Tool

Loading...
Thumbnail Image

Citation for Previous Publication

Link to Related Item

Abstract

Description

Transition to application virtualization is causing IT organizations to reconsider the methods it uses for deployment of services like IT support, application usage, management, etc. It is becoming important to have a vision for the application delivery methods for the future. Today the choice of software used by various organizations depends on how protected the software code is and how security is applied on top of the software code. This is the point where we define and compare proprietary and open-source software. This report initially aims at discussing the significance of both types – proprietary and open-source, focusing primarily on security analysis tools. (As cited in abstract.) *Publication date not found.

Item Type

http://purl.org/coar/resource_type/c_93fc

Alternative

Other License Text / Link

Language

en

Location

Time Period

Source