Essays about: "stealing"
Showing result 1 - 5 of 42 essays containing the word stealing.
-
1. Parallel Query Systems : Demand-Driven Incremental Compilers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Query systems were recently introduced as an architecture for constructing compilers, and have shown to enable fast and efficient incremental compilation, where results from previous builds is reused to accelerate future builds. With this architecture, a compiler is composed of several queries, each of which extracts a small piece of information about the source program. READ MORE
-
2. Consumer Valhalla : a case study on the phenomenon of the SHEIN consumer
University essay from Högskolan i Borås/Akademin för textil, teknik och ekonomiAbstract : During the last years, the phenomenon of ultra-fast fashion, specifically the retailer SHEIN, has grown massively and became popular among young female consumers. SHEIN is also known for their polluting productions, bad working conditions, violating (social) sustainable laws and stealing designs from other designers. READ MORE
-
3. Emploging and improving machinelearning of detection of Phishing URLs
University essay from Blekinge Tekniska HögskolaAbstract : Background: Phishing is one type of the social engineering techniques to fool users by pretending tobe a trusted person and stealing users personal data. Quite often, Phishing spreads to email services, and browsers are not always able to block Phishing URLs. READ MORE
-
4. Human’s Attitude toward Cats and their Behavior : a survey study
University essay from SLU/Dept. of Animal Environment and HealthAbstract : The domestic cat has many environmental needs that mirror those of their ancestor, the North African Wildcat. To ensure the wellbeing of domestic cats, these environmental needs should be met. If they are not met it can result in stress/fear/anxiety/frustration that can be expressed through behavioral problems. READ MORE
-
5. COMPARATIVE ANALYSIS OF SOFTWARE SOLUTIONS FOR NETWORK ATTACKS SIMULATION : Thesis for the Degree of Master of Science (60 credits) in ComputerScience with the Specialization in Software Engineering, 15.0 credits
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The excessive use of the Internet had an impact on the increasing number of network attacks.The aim of a network attack is to gain unauthorized access to the network, with the intention ofstopping that service or monitoring and stealing private data. READ MORE