• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 64
  • 5
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 88
  • 88
  • 88
  • 54
  • 31
  • 23
  • 20
  • 20
  • 18
  • 17
  • 13
  • 13
  • 13
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Web based database processing for Turkish Navy Officers in USA /

Ozkan, Gokhan. January 2002 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002. / Thesis advisor(s): William J. Haga, Gary Porter. Includes bibliographical references (p. 63). Also available online.
32

A generic framework for the personal omni-remote controller using M2MI /

Tang, Chih-Yu. January 2005 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2005. / Typescript. Includes bibliographical references (leaves 119-122).
33

Application development using client-server technology /

Chowdhury, Evan, January 2004 (has links) (PDF)
Thesis (M.S.) in Computer Engineering--University of Maine, 2004. / Includes vita. Includes bibliographical references (leaves 50-51).
34

State space collapse in many-server diffusion limits of parallel server systems and applications

Tezcan, Tolga. January 2006 (has links)
Thesis (Ph. D.)--Industrial and Systems Engineering, Georgia Institute of Technology, 2007. / Jiangang Dai, Committee Co-Chair ; Amy Ward, Committee Co-Chair ; Anton Kleywegt, Committee Member ; Ron Billings, Committee Member ; Mor Armony, Committee Member.
35

Application Development Using Client-Server Technology

Chowdhury, Evan January 2004 (has links) (PDF)
No description available.
36

Value-based design of electronic commerce servers /

Tan, Yong, January 2000 (has links)
Thesis (Ph. D.)--University of Washington, 2000. / Vita. Includes bibliographical references (leaves 70-73).
37

Information security in the client/server environment

Botha, Reinhardt A 23 August 2012 (has links)
M.Sc. (Computer Science) / Client/Server computing is currently one of the buzzwords in the computer industry. The client/server environment can be defined as an open systems environment. This openness of the client/server environment makes it a very popular environment to operate in. As information are exceedingly accessed in a client/server manner certain security issues arise. In order to address this definite need for a secure client/server environment it is necessary to firstly define the client/server environment. This is accomplished through defining three possible ways to partition programs within the client/server environment. Security, or secure systems, have a different meaning for different people. This dissertation defines six attributes of information that should be maintained in order to have secure information. For certain environments some of these attributes may be unnecessary or of lesser importance. Different security techniques and measures are discussed and classified in terms of the client/server partitions and the security attributes that are maintained by them. This is presented in the form of a matrix and provides an easy reference to decide on security measures in the client/server environment in order to protect a specific aspect of the information. The importance of a security policy and more specifically the influence of the client/server environment on such a policy are discussed and it is demonstrated that the framework can assist in drawing up a security policy for a client/server environment. This dissertation furthermore defines an electronic document .management system as a case study. It is shown that the client/server environment is a suitable environment for such a system. The security needs and problems are identified and classified in terms of the security attributes. Solutions to the problems are discussed in order to provide a reasonably secure electronic document management system environment.
38

Computer audit concerns in the client-server environment

Streicher, Rika 13 February 2014 (has links)
M. Com. (Computer Auditing) / and peer-to-peer have taken the world by storm. Dramatic changes have taken place in the information technology of organisations that have opted to follow this trend in the quest for greater flexibility and access to all those connected. Though technology has already had far-reaching effects on business, many changes are yet to be seen. The threats associated with the continuing developments in computer technology have resulted in many traditional internal control processes changing forever. Although, according to the above, it is fairly common that the client-server technology brings with it new threats and risks with internal control processes having to change to address these threats and risks, not all areas have been addressed yet. It is therefore clear that computer audit has a role to play. The main objective of this short dissertation is to shed some light on the problem described above: How will the changes wrought by the client-server technology affect the traditional audit approach? In other words, how will the computer auditor narrow the gap that has originated between traditional established audit procedures and an audit approach that meets the new challenges of the client-server environment? This will be achieved by pinpointing the audit concerns that arise due to the fundamental differences between the traditional systems environment and the new client-server environment...
39

R/3 implementation analysis in various industries

Rascoe, Paul Alan 01 January 2007 (has links)
The purpose of this project was to analyze six companies in various industries that are currently using systems, applications, and products in data processing (SAP)'s R/3. It outlines the history of SAP and gives background on the companies including what they used before R/3, why they chose R/3, and some of the challenges involved with the changing over to R/3. The companies that were analyzed are Allegran Pharmaceuticals, Pacific Communications, Varian Incorporated, Northop-Grumman, Sempra Energy, and Goodrich. A comparison of the companies is done along with analysis on strategic motivators behind the change to R/3.
40

Network syslog monitor

Gummadi, Surender Reddy 01 January 2007 (has links)
The purpose of this project to develope a network syslog monitoring system to monitor network devices like printers, switches, etc. and to help the network technical help desk personnel to handle issues promptly and effectively based on the syslog messages captured by the syslog server.

Page generated in 0.0854 seconds