• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 100
  • 15
  • 14
  • 10
  • 6
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 182
  • 69
  • 65
  • 58
  • 53
  • 48
  • 46
  • 37
  • 36
  • 34
  • 30
  • 28
  • 26
  • 23
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Threat Modeling and Penetration Testing of a Yanzi IoT-system : A Survey on the Security of the system’s RF communication

Isabar, Diyala January 2021 (has links)
Internet of Thing (IoT) products have in recent years become increasingly popular with both industries and private consumers, and it has been forecasted that the number of connected devices around the world will be roughly 14 billion in the year 2022. One particular field that the booming of IoT solutions continues to create endless possibilities for is smart offices. Several different devices are connected in an office environment to create a better workplace and enable a better, faster and smarter working approach. However, while there are several advantages with IoTs, they have also introduced new security threats that can not be overlooked. In this thesis, the security of a smart office system designed by Yanzi is examined. The system consists of a gateway, 34 sensors and a cloud service embedded as a SaaS. The security analysis was performed in three steps: planning, penetration testing and reporting. Radio frequency (RF) hacking against the systems RF communication was the main focus of the work. Due to some technical issues, not all selected attacks were possible to perform. Out of three that were possible to perform, one of them revealed a security flaw. Different countermeasures for the found flaw were proposed. / ”Internet av saker” produkter har under de senaste åren blivit alltmer populära bland både industrier och privata konsumenter, och man har prognostiserat att antalet anslutna enheter runt om i världen kommer att vara ungefär 14 miljarder år 2022. Ett särskilt område som ökandet av IoT-lösningar fortsätter att skapa oändliga möjligheter för är smarta kontor. Flera olika enheter är anslutna i en kontorsmiljö för att skapa en bättre arbetsplats och möjliggöra ett bättre, snabbare och smartare arbetssätt. Även om det finns flera fördelar med IoT, har de också infört nya säkerhetshot som inte kan förbises. I denna avhandling undersöks säkerheten för ett smart kontorssystem som designats av Yanzi. Systemet består av en gateway, 34 sensorer och en molntjänst inbäddad som en SaaS. Säkerhetsanalysen utfördes i tre steg: planering, penetrationstestning och rapportering. Radiofrekvenshackning mot systemets radiokommunikation var huvudfokus för arbetet. På grund av vissa tekniska problem var det inte möjligt att utföra alla föreslagna attacker. Av de tre som var möjliga att utföra avslöjade en av dem ett säkerhetsfel. Olika motåtgärder för den funna sårbarheten föreslås.
92

Leben mit Python

Piko Koch, Dorothea 28 May 2024 (has links)
Dies ist ein kurzer Überblick über Python-Projekte abseits von Einsatzmöglichkeiten im Beruf.:1. Einleitung 2. Python unterrichten 3. Mit Python promovieren 4. Mit Python chatten lassen 4.1. Implementation 4.2. Literaturwissenschaftlicher Hintergrund 5. Mit Python leben 6. Mit Python basteln Literatur
93

Egyptianization: Culture hacking as a method

Omar, Hadeer 01 January 2016 (has links)
In a broad sense, cultures undergo a metamorphoses due to the external influences and systems impacting the evolution of internal identities. Conversely, Individuals within cultures react to those external influences and systems.The act of hacking a culture is an opportunity to challenge an existing or imported system in order to bring about change and improvement. An aspect of culture hacking is to create messages of satire or irony in order to criticize, or completely reject established systems within cultures. Post Arab spring, Egyptians practiced culture hacking by applying their cultural tools to external systems and influences, producing a process of ‘Egyptianization’. This investigation examines the MFA program’s culture at Virginia Commonwealth University in Qatar as a case study, and adapts those Egyptianized tools to hack the culture. The program has its own values, rituals, traditions, imported systems, influences and dominant symbols. The aim of this thesis is to generate customized hacking methodologies that identify cracks within this culture and develop an innovative framework to critically analyze them through visual representation.
94

Kauza odposlechů listu News of the World a její zobrazení v ČTK / Phone hacking scandal of News of the world and its display in the czech new agency

Berniová, Andrea January 2014 (has links)
The thesis called Phone hacking scandal of News of the World journal and its display in the Czech news agency deals with foreign coverage of the Czech news agency concernig the News of the World phone-hacking scandal.The thesis mainly focuses on the second half of 2011, especially on June, when the scandal broke out. Firstly the thesis deals with history and present of British press, then with Rupert Murdoch's (the last owner of the journal and media mogul) operation in media, with formation, development and extincion of the News of the World journal. It also informs about the phone-hacking scandal's profile and about the news service of the Czech news agency - foreign coverage, reporting formats and so on. It focuses on changes of the amount of news during time, on used formats of coverage, on priorities, services, cathegories and also on sources which the agency used during preparing the news mainly in June 2011. Numbers of news are organized to tables which illustrate the development of amounts of the news published in relation to the scandal. Then the thesis more briefly focuses on remaining months of the second half of 2011 and on previous and subsequent periods. This thesis also finds out how the phone-hacking scandal influenced media regulation of Great Britain.
95

Kybernetická krimnalita / Cyber crime

Bartůněk, Jan January 2015 (has links)
Development of information technology is one of the most dynamic parts of today's global society. Along with the coming of new technologies it generates new types of crime, eventually existing types of criminal activities in this area are moving from the real world to cyberspace. This rapid development of cyber crime enforces corresponding changes in the legislation related to cyberspace. In the Czech Republic the most fundamental changes in cyber crime law have been made along with the new Criminal Code. The new code has modified some areas, that were not mentioned by previous criminal code, refined or amended previous terminology related to cyberspace and added institutes required by international commitments, especially by the Convention on Cybercrime. The purpose of this diploma thesis on "Cyber crime" is to outline the issues of cyber-crime, point out some troubling topics, which are currently present in cyberspace, and outline possible future development of criminal law in cyberspace. In the beginning of the thesis there is a short summary of cyberspace and cyber crime history, that is followed by definitions of selected basic concepts of cyberspace and cyber crime. In the following chapters, there is a summary of current Czech legislation of selected areas and there some examples of such...
96

Vzestup a pád News of the World / The Rise and Fall of News of the World

Grieslerová, Martina January 2013 (has links)
This diploma thesis deals with the British Sunday tabloid paper News of the World. By using the method of historical analysis it covers all its history from its foundation to its closure. The aim of this thesis is to put the newspaper's beginning, growth and end into the context of its era. The first chapters describe the rise of periodical press in Great Britain and in connection with that the social situation and technological progress in print. The chapters also deal with the first stage of development of News of the World, that is, when it was owned by the Carr family. On the grounds of socio-economic and political situation the chapters discover which factors added to the massive growth of circulation and big popularity of this Sunday paper. The second half of this thesis covers the development of the newspaper under the ownership of Rupert Murdoch, starting with the battle over its buy out against Robert Maxwell. The thesis analyses changes Murdoch implemented and brings examples of scandals and controversies this newspaper had throughout all its history.The last chapter addresses the phone-hacking scandal which led to the paper's closure after 168 years and its consequences to Murdoch's media empire News Corporation, as well as to the British newspapers market and its self-regulatory principles.
97

Fondements métaphysiques des probabilités leibniziennes par le degré de perfection des mondes possibles

Boucher, Jean-Philippe 08 1900 (has links)
No description available.
98

The fame monster ! : Revers et fortune du Pirate, du 19e siècle à nos jours, des Mers jusqu'à la Toile / The fame monster ! : Reverse and Fortune of the Pirate, from 19th century till today, from the Seas to the Web

Freyheit, Matthieu 29 November 2013 (has links)
Nous savons tous à quoi ressemble un pirate. Ce que nous savons moins, c’est la raison de ces succès, les causes de notre engouement – voire de notre fascination pour ce Fame Monster. La formule permet de caractériser l’ambiguïté d’un personnage dont chaque fortune connaît un revers, révélant notre soif de transgression et notre tentation pour l’envers de la morale. L’approche littéraire comparatiste, augmentée d’emprunts à l’image, à la sociologie, à la philosophie politique et à l’histoire des mentalités, permet non pas de simplement décrire un phénomène, mais d’essayer d’en extraire les sens, les besoins, les attentes, en prenant pour hypothèse que la fiction pirate constitue un jalon spécifique dans l’histoire des mentalités occidentales, et autorise l’exploration d’un état de nos désirs : d’aventure, de danger, de transgression, d’insurrection ; mais aussi de conformisme, dans un mythe continuellement répété. Histoire dans l’histoire, fiction en négatif, le pirate marginal se donne à lire comme une part retranchée de la société qui l’évacue, et partant comme l’idéal révélateur du sang et de l’or de nos virtualités, de nos « occasions manquées ».C’est ainsi que l’étude du pirate traditionnel conduit non seulement à une analyse du personnage mais encore aux enjeux fictionnels qu’il engage. Piraterie et piratage, ses deux corollaires directs, mettent en œuvre des problématiques particulières de création et de réception, et amorcent une reconversion sémantique du personnage : le pirate connaît une nouvelle fortune numérique, tandis que, devenu comportement par le truchement du piratage, il conduit à repenser le champ de la fiction. Alors : tous pirates ? Ou plutôt : tous (déjà) piratés ? / We all know what a pirate looks like. We may wonder, however, why pirates fill us with such enthusiasm. Where does our fascination for this "Fame Monster" come from? The expression, Fame Monster, underlines the ambiguity of a character whose fortunes will always know a fall-down, unveiling our thirst for transgression – our temptation for the other side of morals. Our comparative literary approach (one that borrows from visual studies, sociology, political philosophy, and cultural history) not only allows for a description of this social trend, but intends to get to its specific meaning, and indeed reveal the needs and the desires it hides. Our hypothesis is that the pirate represents a specific marker in the cultural history of the western world, leading us to explore our own desire for adventure, danger, transgression, rebellion (although it should be noted that the pirate also exposes our willingness to embrace norms and conformism through a stereotypical figure that is constantly repeated, a never-ending myth). Secret history in the main one, negatively connoted fiction, the marginal pirate seems to be read as an outlawed part of our society, as the indicator of either our golden or our bloody potentialities – the indicator of our might-have-been. Thus our study moves further than the mere analysis of a figure, to investigate the true stakes of its fictions and representations. For instance, sea-piracy and web-piracy (and the semantic transformation implicit in the move from one to the other), point to specific issues with regards to creation and reception. As he achieves new e-success on the Web, and becomes more than a character – a behavior, through hacking – the pirate may also provide us with a model to reconsider the very possibilities of fiction. Perhaps, then, is it time to ponder: are we all pirates? Or have we all already been hacked?
99

Cyberhistory

Falloon, Keith January 2002 (has links)
Cyberhistory is a thesis presented at The University of Western Australia for the Degree of Master of Science. Computer history is its prime field of focus. Cyberhistory pursues four key themes in computer history. These are, gender, the notion of the periphery, access and the role of the proselytiser. Cyberhistory argues that, gender issues are significant to computer history, culture ascribes gender to computing, and culture has driven computer development as much as technological progress. Cyberhistory identifies significant factors in the progress of computer technology in the 20th century. Cyberhistory finds that, innovation can occur on the periphery, access to computers can liberate and lead to progress, key proselytisers have impacted the development of computing and computing has become decentralised due to a need for greater access to the information machine. Cyberhistory traces a symbolic journey from the industrial periphery to the centres of computing development during WWII, then out to a marginal computer centre and into the personal space of the room. From the room, Cyberhistory connects into cyberspace. Cyberhistory finds that, despite its chaos, the Internet can act like a sanctuary for those seeking to bring imagination and creativity to computing.
100

Säkerhetshot och lösningar för privatpersoner med bredband / Security threats and solutions for people with broadband

Bilan, Carolina, Hedberg, Carl January 2001 (has links)
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.

Page generated in 0.0353 seconds