• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 86
  • 21
  • 20
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 254
  • 254
  • 75
  • 49
  • 43
  • 42
  • 39
  • 32
  • 29
  • 29
  • 23
  • 23
  • 20
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Managing IT Security In Organizations : A look at Physical and Administrative Controls

Asmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
Introduction Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control. Purpose Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls. Methods When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study. Conclusion Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.
102

Rebound predictions for elastic collisions

Liu, Pao-pao 02 May 1991 (has links)
In this paper, a numerical method is used to predict the response of an elastic body during a collision in which both normal and tangential impulses are important. Results are compared with those from simplified prediction procedures, which stem from the assumptions that the energy-returning capacity of the normal deformation mechanism is constant and the tangential compliance is neglected. The finite-element predictions indicate the importance of the tangential compliance for elastic collisions wherein friction forces are significant. The results of both methods of prediction point up the roles of friction and inertia coupling in determining the normal velocity ratio (the "coefficient of restitution"). / Graduation date: 1992
103

Assessing operational impact in enterprise systems with dependency discovery and usage mining

Moss, Mark Bomi 15 July 2009 (has links)
A framework for monitoring the dependencies between users, applications, and other system components, combined with the actual access times and frequencies, was proposed. Operating system commands were used to extract event information from the end-user workstations about the dependencies between system, application and infrastructure components. Access times of system components were recorded, and data mining tools were leveraged to detect usage patterns. This information was integrated and used to predict whether or not the failure of a component would cause an operational impact during certain time periods. The framework was designed to minimize installation and management overhead, to consume minimal system resources (e.g. network bandwidth), and to be deployable on a variety of enterprise systems, including those with low-bandwidth and partial-connectivity characteristics. The framework was implemented in a test environment to demonstrate the feasibility of this approach. The system was tested on small-scale (6 computers in the GT CERCS Laboratory over 35 days) and large-scale (76 CPR nodes across the entire GT campus over 4 months) data sets. The average size of the impact topology was shown to be approximately 4% of the complete topology, and this size reduction was related to providing system administrators the capability to better identify those users and resources most likely to be affected by a designated set of component failures during a designated time period.
104

Managing IT Security In Organizations : A look at Physical and Administrative Controls

Asmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
<p>Introduction</p><p>Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.</p><p>Purpose</p><p>Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.</p><p>Methods</p><p>When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.</p><p>Conclusion</p><p>Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.</p>
105

A constraint-based ITS for the Java programming language : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in Computer Science in the University of Canterbury /

Holland, Jay. January 1900 (has links)
Thesis (M. Sc.)--University of Canterbury, 2009. / Typescript (photocopy). "January 2009." Includes bibliographical references (leaves 110-115). Also available via the World Wide Web.
106

Enhanced font services for X Window system

Tsang, Pong-fan, Dex. January 2000 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2001. / Includes bibliographical references (leaves 80-84).
107

APTMC: AN INTERFACE PROGRAM FOR USE WITH ANSYS FOR THERMAL AND THERMALLY INDUCED STRESS MODELING/SIMULATION OF LEVEL 1 AND LEVEL 2 VLSI PACKAGING

Shiang, Jyue-Jon, 1956- January 1987 (has links)
ANSYS Packaging Thermal/Mechanical Calculator (APTMC) is an interface program developed for use with ANSYS and specially designed to handle thermal and thermally induced stress modeling/simulation of Level 1 and Level 2 VLSI packaging structures and assemblies. APTMC is written in PASCAL and operates in an interactive I/O format mode. This user-friendly tool leads an analyst/designer through the process of creating appropriate thermal and thermally induced stress models and other operations necessary to run ANSYS. It includes such steps as the following: (1) construction of ANSYS commands through the string process; (2) creation of a dynamic data structure which expands and contracts during program execution based on the data storage requirements of the program sets to control model generation; (3) access of material data and model parameters from the developed INTERNAL DATABANK which contains: (a) material data list; (b) heat transfer modes; and (c) library of structures; (4) forming ANSYS PREP7 and POSTn command files. (Abstract shortened with permission of author.)
108

A FORTRAN program for the SPAN technique of group decision making

MacKinnon, Mary Matilda Sonntag, 1925- January 1967 (has links)
No description available.
109

FORTRAN computation of a table for the SPAN decision-making method in dyads

Lillyquist, Michael J. January 1968 (has links)
No description available.
110

When the chips are down : attribution in the context of computer failure and repair.

Quayle, Michael Frank. January 2004 (has links)
Cognitive attribution theories provide convincing and empirically robust models of attribution. However, critiques include the scarcity of empirical research in naturalistic settings and the failure of cognitive attribution theorists to account for why, when and how much people engage in attributional activity. The present study draws data from naturalistic recordings of the common experience of computer failure and repair. A simple content analysis explores the extent to which everyday attributional talk is modelled by the cognitive theories of attribution. It is found that everyday talk matches the cognitive theories of attribution reasonably well for socially safe operative information about the problem, but poorly for socially unsafe inspective information about the agents and their actions. The second part of the analysis makes sense of this empirical pattern by using conversation and discourse analysis to explore the social functions of observed attributional talk. Participants use attributional talk to achieve two broad social goals: to negotiate and manage the social engagement and to construct and defend positions of competence and expertise. / Thesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2004.

Page generated in 0.0482 seconds