Essays about: "abstract of computer SECURITY"
Showing result 1 - 5 of 6 essays containing the words abstract of computer SECURITY.
-
1. Visualizing Zones : Defining the Notion of Zones in Physical Access Control for Security Management System
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : In the domain of access control, the notion of zone is still ambiguous. The zone demands clearer contextualization that resonates with the security operators in their workplace. READ MORE
-
2. Elasticity of Elasticsearch
University essay from Uppsala universitet/Avdelningen för datorteknikAbstract : Elasticsearch has evolved from an experimental, open-source, NoSQL database for full-text documents to an easily scalable search engine that canhandle a large amount of documents. This evolution has enabled companies todeploy Elasticsearch as an internal search engine for information retrieval (logs,documents, etc.). READ MORE
-
3. Computing component specifications from global system requirements
University essay from KTH/Teoretisk datalogi, TCSAbstract : If we have a program with strict control flow security requirements and want to ensure system requirements by verifying properties of said program, but part of the code base is in the form of a plug-in or third party library which we do not have access to at the time of verification, the procedure presented in this thesis can be used to generate the requirements needed for the plug-ins or third party libraries that they would have to fulfil in order for the final product to pass the given system requirements. This thesis builds upon a transformation procedure that turns control flow properties of a behavioural form into a structural form. READ MORE
-
4. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE
-
5. Rootkits
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : Abstract:The kernel system of Windows is more thoroughly exposed to people. So, thekernel-level Rootkits techniques are now laid on greater emphasis. It is very importantto maintain the security of computers and to conduct an in-depth research on theoperational mechanism by using kernel-level Rootkits in hiding its traces. READ MORE