Essays about: "security overview"

Showing result 1 - 5 of 135 essays containing the words security overview.

  1. 1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  2. 2. Improving Seafood Waste Management in Västra Götaland, for a more environmental sustainable future

    University essay from Göteborgs universitet/Graduate School

    Author : Farad Fatemi; Fares Samara; [2023-07-03]
    Keywords : ;

    Abstract : Waste management has become a major concern around the world. The amount of waste is significantly growing, resulting in a negative impact on the environment. It is important to address this issue by managing waste effectively and reducing its environmental impact. READ MORE

  3. 3. Leveraging Technologies of Industry 4.0 for risk management in Sea Freight Forwarding Operations

    University essay from Göteborgs universitet/Graduate School

    Author : Angelina Biiak; Yijuan Lindskog; [2023-07-03]
    Keywords : Risk; Risk Management Mitigation; Maritime Logistics Shipping Industry; Sea Freight Forwarder; Industry 4.0; Technologies Pillars;

    Abstract : Maritime logistics dominates the goods transportation market and is continuously growing along with the growth of global trade. However, a variety of risks continuously occur and significantly affect the maritime logistics industry, and thus the sea freight forwarding operations. READ MORE

  4. 4. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  5. 5. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jódís Gunnlaugsdóttir; [2023]
    Keywords : Kompact; Component-Actor hybrid framework; Transmission Control Protocol; User Datagram Protocol; Aeron; Quic;

    Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE