Essays about: "comprehensive security"
Showing result 1 - 5 of 184 essays containing the words comprehensive security.
-
1. Physical Layer Security for MIMOTransmission of Short PacketCommunications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE
-
2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
3. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE
-
4. Policing Möllevången - A critical discourse analysis of policing in the neoliberal city
University essay from Lunds universitet/Institutionen för kulturgeografi och ekonomisk geografiAbstract : This thesis addresses the ideological conditions for policing in Malmö, Sweden. It takes its theoretical point of departure in the rise of urban neoliberalism, and how urban neoliberalization alters policy and practices of policing. READ MORE
-
5. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE