Essays about: "misuse computer"
Showing result 1 - 5 of 7 essays containing the words misuse computer.
-
1. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE
-
2. From Idea to Innovation: Exploring the Application of Design Thinking in Product Development
University essay from Jönköping University/JTH, Industriell produktutveckling, produktion och designAbstract : Design thinking (DT) is a popular method and methodology for leveraging innovation. However, using DT in practical organisational settings is challenging because there is little acknowledgment of such research in academia. READ MORE
-
3. Holographic Communications Technologies : A qualitative study on the ethical and\or legal challenges based on the stakeholders' perspectives
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : Holographic communications technologies are a new digital technology being currently developed by companies to be available to the public in the near future. Through holographic communications technologies, the image of one user located in one place can be captured with special equipment from different angles, so that its three-dimensional depiction is created realistically. READ MORE
-
4. Deception strategies for web application security: application-layer approaches and a testing platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE
-
5. Explaining kernel space with a real world example
University essay from Institutionen för datavetenskapAbstract : The basic premis of this report is to explain the relation of kernel space and user space. It will show how the processor and computer memory work together with the operating system to protect operating system routines from misuse by user programs. READ MORE