PESAT application Personal Security Administrator Tool / Law Yong Jin

The thesis report is written to describe the development of PESAT application in depth. It contains from the project objective, definition, scope from the beginning; extends to literature review, study on existing application, software process model, and application development tool, functional and...

Full description

Bibliographic Details
Main Author: Law , Yong Jin
Format: Thesis
Published: 2004
Subjects:
Online Access:http://studentsrepo.um.edu.my/11373/
http://studentsrepo.um.edu.my/11373/1/law_yong_jin.pdf
_version_ 1848774368485703680
author Law , Yong Jin
author_facet Law , Yong Jin
author_sort Law , Yong Jin
building UM Research Repository
collection Online Access
description The thesis report is written to describe the development of PESAT application in depth. It contains from the project objective, definition, scope from the beginning; extends to literature review, study on existing application, software process model, and application development tool, functional and non-functional requirements and ended with the system structure design, System process design and user-interface design. The report will be furthered with more details on system implementation, testing and evaluation on the coming semester. It is well-structured within layouts and contents to cover as much information as an application development proposal. PESAT is a security and administration application that tends to protect the security of personal computer with the administration of the computer on the same time. PESAT enhances the current existing security and administration tools m the market, by improving the weaknesses and expanding the strengths of those existing application. In short. PESAT is a well-organized, securable, exceptional and superb security administrator tool that is going to be developed It is built using the current application development tools with a resourceful and fundamental research on the security and administration arenas. The high expectation the outcome of PESAT application is to construct an application that approaches the conceptual of computer security as well as administration. In order to step in a successive development of PESAT, it must be well-planned, well-structured and well-organized to meet every functional and non-functional requirement.
first_indexed 2025-11-14T13:57:11Z
format Thesis
id um-11373
institution University Malaya
institution_category Local University
last_indexed 2025-11-14T13:57:11Z
publishDate 2004
recordtype eprints
repository_type Digital Repository
spelling um-113732020-07-13T22:39:48Z PESAT application Personal Security Administrator Tool / Law Yong Jin Law , Yong Jin QA75 Electronic computers. Computer science QA76 Computer software The thesis report is written to describe the development of PESAT application in depth. It contains from the project objective, definition, scope from the beginning; extends to literature review, study on existing application, software process model, and application development tool, functional and non-functional requirements and ended with the system structure design, System process design and user-interface design. The report will be furthered with more details on system implementation, testing and evaluation on the coming semester. It is well-structured within layouts and contents to cover as much information as an application development proposal. PESAT is a security and administration application that tends to protect the security of personal computer with the administration of the computer on the same time. PESAT enhances the current existing security and administration tools m the market, by improving the weaknesses and expanding the strengths of those existing application. In short. PESAT is a well-organized, securable, exceptional and superb security administrator tool that is going to be developed It is built using the current application development tools with a resourceful and fundamental research on the security and administration arenas. The high expectation the outcome of PESAT application is to construct an application that approaches the conceptual of computer security as well as administration. In order to step in a successive development of PESAT, it must be well-planned, well-structured and well-organized to meet every functional and non-functional requirement. 2004 Thesis NonPeerReviewed application/pdf http://studentsrepo.um.edu.my/11373/1/law_yong_jin.pdf Law , Yong Jin (2004) PESAT application Personal Security Administrator Tool / Law Yong Jin. Undergraduates thesis, University of Malaya. http://studentsrepo.um.edu.my/11373/
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Law , Yong Jin
PESAT application Personal Security Administrator Tool / Law Yong Jin
title PESAT application Personal Security Administrator Tool / Law Yong Jin
title_full PESAT application Personal Security Administrator Tool / Law Yong Jin
title_fullStr PESAT application Personal Security Administrator Tool / Law Yong Jin
title_full_unstemmed PESAT application Personal Security Administrator Tool / Law Yong Jin
title_short PESAT application Personal Security Administrator Tool / Law Yong Jin
title_sort pesat application personal security administrator tool / law yong jin
topic QA75 Electronic computers. Computer science
QA76 Computer software
url http://studentsrepo.um.edu.my/11373/
http://studentsrepo.um.edu.my/11373/1/law_yong_jin.pdf