Skip to search formSkip to main contentSkip to account menu

Code audit

A software code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Audit sistem keamanan informasi di departemen Komunikasi dan Informasi diperlukan untuk menentukan sejauh mana sistem informasi… 
2017
2017
This research is aimed to identify and examine empirically the direct and indirect influence of Ethical Compliance Audit on… 
2017
2017
Zakat Institution (OPZ) is the intermediary organizations based on social. The entire of operating expense is taken from the… 
2017
2017
With the rapid development of mobile Internet, the number of smart phone users is increasing, especially android smart phone… 
2015
2015
Fuzzing has been widely used to discovery vulnerabilities in practice. Despite many linux system call fuzzers, few fuzzers of… 
2014
2014
  • T. Gu
  • 2014
  • Corpus ID: 167975780
............................................................................................................................................................................... ii Preface ................................................................................................................................................................................. iv Table of contents.................................................................................................................................................................. v List of tables ...................................................................................................................................................................... viii List of figures....................................................................................................................................................................... ix Acknowledgements ............................................................................................................................................................. x Dedication............................................................................................................................................................................ xi Chapter 1: Introduction ..................................................................................................................................................... 1 Chapter 2: Do analysts contribute to auditor discipline? Evidence from a natural experiment ............................. 8 2. 
2004
2004
Software users have become more conscious of security. More people have access to Internet and huge databases of security… 
2004
2004
The purpose of this paper is to extend previous research into the factors that have a significant influence on the demand for… 
2001
2001
Until recently few firms have attempted to measure and assess Knowledge, the new intangible. Previous research shows that key… 
2000
2000
  • F. Schneider
  • 2000
  • Corpus ID: 1882567
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant…