<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://www.w3.org/2005/Atom">
<title>Praca inżynierska - Metody programowania - Programowanie aplikacji biznesowych 2022</title>
<link href="https://repin.pjwstk.edu.pl/xmlui/handle/186319/2341" rel="alternate"/>
<subtitle/>
<id>https://repin.pjwstk.edu.pl/xmlui/handle/186319/2341</id>
<updated>2026-03-27T18:34:59Z</updated>
<dc:date>2026-03-27T18:34:59Z</dc:date>
<entry>
<title>Framework for developing modular and extensible Java web applications</title>
<link href="https://repin.pjwstk.edu.pl/xmlui/handle/186319/2734" rel="alternate"/>
<author>
<name>Puczyński, Bartosz</name>
</author>
<id>https://repin.pjwstk.edu.pl/xmlui/handle/186319/2734</id>
<updated>2023-05-24T10:37:41Z</updated>
<published>2023-05-24T00:00:00Z</published>
<summary type="text">Framework for developing modular and extensible Java web applications
Puczyński, Bartosz
The goal of this thesis is to describe the creation of Java web framework, focused on creating&#13;
extensible and modular applications. The framework consists of the request handler, XML&#13;
template parser, component system as well as dependency injection and object-relational&#13;
mapping module. It is shown how each of these parts can be used to ease the development of&#13;
server-side web applications.
</summary>
<dc:date>2023-05-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>Data Security Mechanisms of Microsoft Azure against Security Concerns</title>
<link href="https://repin.pjwstk.edu.pl/xmlui/handle/186319/2733" rel="alternate"/>
<author>
<name>Yazar, Samet</name>
</author>
<id>https://repin.pjwstk.edu.pl/xmlui/handle/186319/2733</id>
<updated>2023-05-24T10:29:27Z</updated>
<published>2023-05-24T00:00:00Z</published>
<summary type="text">Data Security Mechanisms of Microsoft Azure against Security Concerns
Yazar, Samet
The aim of this thesis is to examine some of the security mechanism services developed by Microsoft Azure Cloud Provider for making sure of the organization with its all resources and functionalities are secured and well-defended against data security attacks and any system vulnerabilities. The services can be specifically listed as Microsoft Defender for Cloud, Azure Key Vaults, Azure Active Directory, and Multi-Factor Authentication, while the target user groups and exploitation methods used by attacks are analyzed under the title of ‘The Man in the middle’ attack.&#13;
This thesis has reserved the fourth chapter for live implementations of the above-mentioned mechanisms, thus intended to reveal how organizations may advance their security capacity by approaching those services in the cloud computing infrastructure. The implementations have taken place by defined scenarios and cloud infrastructure is based on Azure Cloud Services.
</summary>
<dc:date>2023-05-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>Cloud storage as an example of a multi platform application</title>
<link href="https://repin.pjwstk.edu.pl/xmlui/handle/186319/2732" rel="alternate"/>
<author>
<name>Cieślak, Jan</name>
</author>
<author>
<name>Broniak, Michał</name>
</author>
<id>https://repin.pjwstk.edu.pl/xmlui/handle/186319/2732</id>
<updated>2023-05-24T10:23:04Z</updated>
<published>2023-05-24T00:00:00Z</published>
<summary type="text">Cloud storage as an example of a multi platform application
Cieślak, Jan; Broniak, Michał
The project’s main objective was to provide users with cloud storage that can be accessed&#13;
from any device. We also decided to bring any other cloud storage into our application in&#13;
order to fix the issue of managing multiple cloud storage accounts and provide an easy way&#13;
for accessing those storages and their files. As a proof of concept we’ve added support to&#13;
add multiple Google Drive accounts and manage them from our application. &#13;
In this document, firstly, we’re discussing what is the concept of cloud storage and what are&#13;
the existing solutions with their pros and cons.&#13;
Then we are showing what our requirements were and how we’ve managed to fulfill them.&#13;
The next section tells about the technologies that we have decided to use and what are the&#13;
experiences we have had with different tools during the process of making our application.&#13;
In the next section we are presenting what is the architecture of the application and how it&#13;
was implemented.&#13;
Then we decided to include implementation challenges that we have encountered during the&#13;
implementation process. We’re describing the issues, what was our thought process during&#13;
planning and what was our final solution to the given problem with a little retrospective if our&#13;
solution provided the result that we were looking for.&#13;
In the next chapter we’ve decided to describe the topic of testing. We’re showing how we’ve&#13;
used them to our advantage and how they’ve ensured us that our application is correct and&#13;
manages user’s files safely.&#13;
In the penultimate chapter we have included the documentation for developers that shows&#13;
how to run the application and what parts it consists of. At the end we’ve also added the&#13;
manual to show how to interact with the application as an end user.&#13;
The final chapter summarizes the whole project including selected technologies, approach&#13;
that we’ve chosen and overall conclusions that we’ve come up with.
</summary>
<dc:date>2023-05-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>Strona internetowa do rezerwacji obiektów sportowych</title>
<link href="https://repin.pjwstk.edu.pl/xmlui/handle/186319/2731" rel="alternate"/>
<author>
<name>Wargocka, Anna</name>
</author>
<id>https://repin.pjwstk.edu.pl/xmlui/handle/186319/2731</id>
<updated>2023-05-24T10:06:39Z</updated>
<published>2023-05-24T00:00:00Z</published>
<summary type="text">Strona internetowa do rezerwacji obiektów sportowych
Wargocka, Anna
Niniejsza praca prezentuje proces projektowania oraz implementacji aplikacji internetowej służącej do rezerwacji obiektów sportowych. Do jej stworzenia użyte zostały technologie takie jak SpringBoot, Hibernate i Vaadin.&#13;
Pierwsza część pracy zawiera wstęp teoretyczny, w którym przeprowadzona została analiza problemu i istniejących na rynku rozwiązań. Dodatkowo opisano technologie, które zostały wykorzystane w procesie implementacji systemu. W dalszej części pracy umieszczono opis działania aplikacji. Przedstawiono zaprojektowane diagramy i scenariusze, na których wzorowano się podczas implementacji. Zademonstrowano również ekrany interfejsu użytkownika, dzięki którym czytelnik ma możliwość zobaczenia efektów stworzonej strony internetowej. Ostatnia część pracy zawiera podsumowanie oraz możliwości przyszłego rozwoju systemu.
</summary>
<dc:date>2023-05-24T00:00:00Z</dc:date>
</entry>
</feed>
