• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 18
  • 18
  • 8
  • 8
  • 7
  • 4
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Hacking subject, subjecting hacking crisis in technoculture /

Oswald, Kathleen Frazer. January 2006 (has links)
Thesis (M.A.)--Villanova University, 2006. / Communication Dept. Includes bibliographical references.
2

Network and data security

Dalwadi, Chintan. January 2006 (has links) (PDF)
Thesis (M.S.)--University of Alabama at Birmingham, 2006. / Description based on contents viewed Jan. 29, 2007; title from title screen. Includes bibliographical references (p. 94-96).
3

Hacks, cracks, and crime an examination of the subculture and social organization of computer hackers /

Holt, Thomas J. January 1900 (has links)
Title from title page of PDF (University of Missouri--St. Louis, viewed February 22, 2010). Includes bibliographical references (p. 192-201).
4

Honeynet design and implementation

Artore, Diane. January 2007 (has links)
Thesis (M.S.)--Computing, Georgia Institute of Technology, 2008. / Committee Chair: Wenke Lee; Committee Member: Jonathon Giffin; Committee Member: Mustaque Ahamad.
5

Cyber crime and telecommunications law /

Imhof, Robert. January 2010 (has links)
Typescript. Includes bibliographical references (leaves 218-220).
6

Honeynet design and implementation

Artore, Diane 20 December 2007 (has links)
Over the past decade, webcriminality has become a real issue. Because they allow the botmasters to control hundreds to millions of machines, botnets became the first-choice attack platform for the network attackers, to launch distributed denial of service attacks, steal sensitive information and spend spam emails. This work aims at designing and implementing a honeynet, specific to IRC bots. Our system works in 3 phasis: (1) binaries collection, (2) simulation, and (3) activity capturing and monitoring. Our phase 2 simulation uses an IRC redirection to extract the connection information thanks to a IRC redirection (using a DNS redirection and a "fakeserver"). In phase 3, we use the information previously extracted to launch our honeyclient, which will capture and monitor the traffic on the C&C channel. Thanks to our honeynet, we create a database of the activity of IRC botnets (their connection characteristics, commands on the C&C ), and hope to learn more about their behavior and the underground market they create.
7

A Methodology for Detecting and Classifying Rootkit Exploits

Levine, John G. (John Glenn) 18 March 2004 (has links)
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances involving rootkits. A formal framework was developed in order to define rootkit exploits as an existing rootkit, a modification to an exisiting, or an entirely new rootkit. A methodology was then described in order to apply this framework against rootkits that are to be investigated. We then proposed some new methods to detect and characterize specific types of rootkit exploits. These methods consisted of identifying unique string signatures of binary executable files as well as examining the system call table within the system kernel. We established a Honeynet in order to aid in our research efforts and then applied our methodology to a previously unseen rootkit that was targeted against the Honeynet. By using our methodology we were able to uniquely characterize this rootkit and identify some unique signatures that could be used in the detection of this specific rootkit. We applied our methodolgy against nine additional rootkit exploits and were were able to identify unique characterstics for each of these rootkits. These charactersitics could also be used in the prevention and detection of these rootkits.
8

Cultures and campaigns of resistance to commercialization in cyberspace /

Garcin, Peter January 1900 (has links)
Thesis (M.A.) - Carleton University, 2002. / Includes bibliographical references (p. 143-145). Also available in electronic format on the Internet.
9

Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /

Krutisch, Dorothee, January 2004 (has links)
Thesis (doctoral)--Universiẗat Saarbrücken, 2003. / Includes bibliographical references (p. 241-255).
10

A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /

DiGiusto, Dennis Michael. January 2008 (has links)
Research paper (M.I.M.)--Victoria University of Wellington, 2008. / Includes bibliographical references.

Page generated in 0.0466 seconds