Essays about: "network protection"
Showing result 1 - 5 of 199 essays containing the words network protection.
-
1. Peak Load Shaving Strategies of an Office Building : A Case Study at AirSon
University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhetAbstract : Introduction: The global demand for renewable energy is expected to grow annually due to rising electricity consumption and economic and regulatory incentives. Efficient consumption and management of electricity consumption can support this trend (shifting from fossil resources to renewable resources) and benefit companies economically by reducing peak loads, reducing subscription costs, and protecting companies' power systems and networks. READ MORE
-
2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
3. Hur kan dammar påverka den urbana biologiska mångfalden?
University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)Abstract : Denna litteraturstudie sammanställer forskningsresultat från andra studier. Det finns många faktorer som påverkar urban biologisk mångfald, som exempelvis vattenföroreningar, övergödning, urban heat island effekten, förekomsten av invasiva arter, angränsande landskapstyp, val av skötsel och utformning av dammen. READ MORE
-
4. Classifying femur fractures using federated learning
University essay from Linköpings universitet/Statistik och maskininlärningAbstract : The rarity and subtle radiographic features of atypical femoral fractures (AFF) make it difficult to distinguish radiologically from normal femoral fractures (NFF). Compared with NFF, AFF has subtle radiological features and is associated with the long-term use of bisphosphonates for the treatment of osteoporosis. READ MORE
-
5. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE