Essays about: "e-mails"
Showing result 21 - 25 of 36 essays containing the word e-mails.
-
21. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques
University essay from Högskolan Dalarna/DatateknikAbstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE
-
22. Unsolicited Commercial E-mails : A study of the consumer’s perceptions about unsolicited commercial e-mails and the implications it has for Internet user groups
University essay from Handelshögskolan vid Umeå universitetAbstract : The rapid development of Internet technologies has led to the emergence of new communication means. E-mail has become a new powerful tool used by millions with the main purpose of exchanging information. READ MORE
-
23. Honeypots in network security
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. READ MORE
-
24. WORKING CAPITAL MANAGEMENT IN TELECOMMUNICATION SECTOR
University essay from Blekinge Tekniska Högskola/Sektionen för managementAbstract : ABSTRACT Title: Working Capital Management in Telecommunication sector: A case study of VGC telecoms Author: Gbenga Segun Akinwande Supervisor: Anders Hederstierna Department: School of Management, Blekinge Institute of Technology Course: Master’s thesis in business administration, 15 credits (ECTS). Background and Problem Discussion: The efficient management of working capital is very vital for a business survival. READ MORE
-
25. A secure mobile phone-based interactive logon in Windows
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. READ MORE