Advanced search
Showing result 16 - 20 of 21 essays matching the above criteria.
-
16. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE
-
17. The relational artwork and the antagonism
University essay from Malmö högskola/Fakulteten för kultur och samhälle (KS)Abstract : Udgangspunktet for at skrive denne opgave er interessen for at undersøge,hvorvidt det lykkes den relationelle kunst at indtage en kritisk position idagens samfund. I en verdensorden, hvor kapitalismens varegørelse kan synesat have indoptaget kunstens kritiske potentiale, kan det være svært atforestille sig den position, hvorfra kunsten skulle have en reel politisk ogsocial betydning. READ MORE
-
18. Motionlogger 2. Software Implementation of Data Logging at High Frequencies
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : In today's industry the need for fast logging of measurements is increasing. Existing systems used by Tetra Pak AB have a maximum logging frequency which is inadequate. As a result of this Tetra Pak gave Industriprojektbyrån AB the task of developing a measuring system for this purpose. READ MORE
-
19. A Study of Scalability and Performance of Solaris Zones
University essay from Institutionen för datavetenskapAbstract : This thesis presents a quantitative evaluation of an operating system virtualization technology known as Solaris Containers or Solaris Zones, with a special emphasis on measuring the influence of a security technology known as Solaris Trusted Extensions. Solaris Zones is an operating system-level (OS-level) virtualization technology embedded in the Solaris OS that primarily provides containment of processes within the abstraction of a complete operating system environment. READ MORE
-
20. On text mining to identify gene networks with a special reference to cardiovascular disease
University essay from Institutionen för fysik, kemi och biologiAbstract : The rate at which articles gets published grows exponentially and the possibility to access texts in machine-readable formats is also increasing. The need of an automated system to gather relevant information from text, text mining, is thus growing. READ MORE