Essays about: "Vulnerabilities"
Showing result 6 - 10 of 630 essays containing the word Vulnerabilities.
-
6. Kartläggning av krisberedskapen på nötkreatursgårdar i Uppland : en intervjustudie av lantbrukares uppfattningar om sårbarheter och styrkor i beredskapen på mjölk- och köttgårdar
University essay from SLU/Dept. of Clinical SciencesAbstract : Primärproduktionen, där animalieproduktion är en del, behöver kunna fortgå trots störningar så som mer extrema väderförhållanden med långdragen torka eller kraftiga skyfall, större sjukdomsutbrott eller i värsta fall väpnad konflikt. Idisslare har en viktig roll i vår livsmedelsförsörjning men i dagsläget vet vi väldigt lite om hur den enskilda gården skulle påverkas vid olika samhällsstörningar. READ MORE
-
7. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
8. Business doing pleasure? A comparative interview study of experiences of vulnerability and strategies of resistance amongst sexworkers in Sweden and the Netherlands
University essay from Lunds universitet/Statsvetenskapliga institutionenAbstract : Sexwork is a complex phenomenon. There are different forms of legislation surrounding the issue, ranging from complete decriminalization/legalization to complete criminalization. In this thesis, the cases of Sweden and the Netherlands are compared. READ MORE
-
9. To Deploy, or Not to Deploy, That is the Question A qualitative study of the decision-making experiences of engineers deploying software changes in production
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : The web services that millions of people count on require large-scale computer resources (servers, nodes, networking) and an intricate set of interdependent software services. Under pressure to continually improve these services, code and configuration changes are deployed hundreds or thousands of times every day. READ MORE
-
10. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE