Essays about: "Version Management"
Showing result 16 - 20 of 254 essays containing the words Version Management.
-
16. Hack the Human : A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.
University essay from Jönköping University/IHH, FöretagsekonomiAbstract : Background: With the rapid advancements in technology, cybersecurity has become a topic of great importance. However, the weakest link in cybersecurity programs is mainly due to human error. READ MORE
-
17. Developing a reproducible bioinformatics workflow for canine inherited retinal disease
University essay from Uppsala universitet/Institutionen för biologisk grundutbildningAbstract : Inherited Retinal Degenerations (IRDs) are a heterogenous group of diseases which lead to vision impairment and can be found both in humans and in dogs. About 1 in 1,380 humans is estimated to suffer from an autosomal recessive IRD, which would be 5.5 million people worldwide, and many more are estimated to be unaffected carriers. READ MORE
-
18. Att se framtiden i historien : att utforska platsers tidsjup och låta historiken motivera fortsatt utveckling och gestaltning, med fallstudie av Björnsnäs säteri
University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)Abstract : Förestående arbete har syftat till att utforska hur landskapsarkitekten kan arbeta med platsers tidsdjup och historiska kontext utifrån sin gestaltande roll. Grunden för arbetet är tesen att platsers historik kan utgöra en resurs och resultera i mer välgrundade utvecklingsförslag. READ MORE
-
19. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE
-
20. Subtree Hashing of Tests in Build Systems : Rust Tricorder
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Software applications are built by teams of developers that constantly iterate over the codebase. Software projects rely on a build system, which handles the management of dependencies, compilation, testing, and deployment of the software. READ MORE