Advanced search

Found 3 essays matching the above criteria.

  1. 1. The Effectiveness of Social Engineering as a Cyber - Attacking Vector : People Do Use Unknown USB Drive, They Find

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Isaac Yaw Ferguson; [2017]
    Keywords : Social engineering; IT security; USB hacking;

    Abstract : Information security importance is rising. Information security awareness' is spreading, and this gives a clear picture of the growing demand for information security. Information security does not only consist of essential information but also the customer. An information system could be either a system user or a device. READ MORE

  2. 2. Demographic Surveillance System Database

    University essay from Lunds universitet/Högskoleingenjörsutbildning i datateknik

    Author : Jon Lennryd; [2009]
    Keywords : longitudal database design; demographic; conceptual database design; center of investigation of demography and health; Systems engineering; computer technology; Data- och systemvetenskap; Technology and Engineering;

    Abstract : This examination work presents a proposition of a conceptual design of a demographic database for CIDS in Nicaragua. Furthermore, an implementation of this database is described. Finally a description of a method to transfer data from the current database to the new is given, together with a smaller implementation. READ MORE

  3. 3. DocPlayer: Design Insights from Applying the Non-HierarchicalMedia-Player model to Document Management

    University essay from Institutionen för datavetenskap

    Author : Jody Foo; [2003]
    Keywords : Interdisciplinary studies; document management; non-hierarchical organization; set-based organization; media-player model; browsing; filing; classification; TVÄRVETENSKAP;

    Abstract : Managing documents is an integral part of computer use, and with the growing document collections of today, the importance of tools that are both flexible and efficient is becoming more evident. In many cases, the hierarchical file system used by many operating systems is also used for document management purposes. READ MORE