Essays about: "Hacking practices"
Showing result 1 - 5 of 13 essays containing the words Hacking practices.
-
1. Sensor based training registration in riding horses : possible association between training regimen and locomotion asymmetry
University essay from SLU/Dept. of Anatomy, Physiology and BiochemistryAbstract : Lameness remains a significant welfare concern in riding horses, with over 50% of documented equine injuries attributed to this condition. The precise quantification of training activities and the objective assessment of asymmetry can contribute substantially to our comprehension of the impact of training on injury occurrence and overall performance in riding horses. READ MORE
-
2. Ethical Hacking of a Ring Doorbell
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE
-
3. Underneath the Surface : Threat modeling and penetration testing of a submarine robot
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Connected devices have become an integral part of life in modern society. In the industry, several tasks have been automatized and are now performed by robots, a development that is called Industry 4.0. READ MORE
-
4. How can B2B companies optimize their marketing and sales efforts in the customer journey with digital means? : A case study with a Swedish manufacturing company.
University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhetAbstract : Rapid digital transformation, accelerated by covid-19 and a younger, more digital workforce, has changed the B2B sales environment affecting customer behavior, business practices and technologies. To adapt to this change B2B companies need to create new endeavors that connect marketing and sales activities, and identify how these can be efficiently enhanced by technology and digital tools. READ MORE
-
5. Penetration Testing Ten Popular Swedish Android Applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE