• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 2
  • 1
  • Tagged with
  • 5
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

VPK eller APK? : En studie i hur Ny Dag och Norrskensflamman argumenterade för vilket parti som var det kommunistiska partiet i Sverige år 1977

Odén, Christoffer January 2009 (has links)
No description available.
2

VPK eller APK? : En studie i hur Ny Dag och Norrskensflamman argumenterade för vilket parti som var det kommunistiska partiet i Sverige år 1977

Odén, Christoffer January 2009 (has links)
No description available.
3

Analýza vybraných metod zřizování a měření prostorové polohy koleje / Analysis of selected methods for setting and measuring the spatial position of track

Karásek, Jakub January 2012 (has links)
The aim of the work is to compare different ways of measuring geometric parametrs of railway track and compare methods for guidance automatic tamping machine in estabilishing the geometrical parameters of the selected track section between train stations Brodek u Přerova - Grygov. The work contains a description of the superstructure gauging carriage and measuring system APK, whose data were used to compare the track geometry and its spatial position during the observation period. Conclusion of the work includes an assessement of individual measurements and recommendations for practise.
4

Evaluation of the Android Third-party stores : Specifically on the risks of Androidapplication / Evaluation of the Android Third-party stores : Specifically on the risks of Android application

Rong, Huan January 2016 (has links)
Android is an open source mobile operating system contributed by Google. In general, Google Play is the most secure place to download the mobile applications for Android system. [1] Products from this website are surely safe promised by Google Company. But there are many other third-party app stores around the world offering similar software. One incentive for them is that the security policy on different platforms varies a lot, and Android developers are free to distribute apps in any intended ways, which leads to a certain risk in the assorted stores such as malware. Therefore, it is crucial to know which application store can be trusted from the various app stores. [2] To support our research, a tool named APK Safety Test is developed to compare the APK files from different application stores with the version on Google Play. In this study, nine stores around the world are chosen and 20 various applications from them are checked in real-time by using the tool. From this research, people can learn the different risk how can be detected. Furthermore, this paper analyzes the result of risks how to affect the applications. Keywords: Android application, Android Stores, APK files, Risk
5

Technologie NFC a její zabezpečení / NFC technology and its security

Mertlík, Tomáš January 2013 (has links)
The first objective of this paper is to describe the Android operating system. The chapter presents history and architecture regarding to all versions of the operating system. The significant part of chapter is focused on security. The second main topic of this paper is analysing the NFC (Near Field Communication) technology. This technology is based on an older contactless system RFID (Radio Frequency Communication), so RFID is described either. The NFC technology chapter contains the description of usability, history and the definitions of physical layer, link layer and NDEF (NFC Data Exchange) data format, used for data transmitting. The next chapter is focusing on the analysis of the NFC vulnerability. It contains a possible attacks methods and solutions how to prevent them. The output of this paper is the projection and creation of an application, which allow sending an arbitrary data between two devices using the NFC technology. Additional Bluetooth technology can be used for larger files. In this case, NFC helps to create Bluetooth communication channel which is utilized for data transfer.

Page generated in 0.0219 seconds