• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 98
  • 15
  • 14
  • 10
  • 6
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 180
  • 69
  • 63
  • 57
  • 53
  • 46
  • 46
  • 37
  • 35
  • 33
  • 29
  • 27
  • 26
  • 23
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Leben mit Python

Piko Koch, Dorothea 28 May 2024 (has links)
Dies ist ein kurzer Überblick über Python-Projekte abseits von Einsatzmöglichkeiten im Beruf.:1. Einleitung 2. Python unterrichten 3. Mit Python promovieren 4. Mit Python chatten lassen 4.1. Implementation 4.2. Literaturwissenschaftlicher Hintergrund 5. Mit Python leben 6. Mit Python basteln Literatur
92

Egyptianization: Culture hacking as a method

Omar, Hadeer 01 January 2016 (has links)
In a broad sense, cultures undergo a metamorphoses due to the external influences and systems impacting the evolution of internal identities. Conversely, Individuals within cultures react to those external influences and systems.The act of hacking a culture is an opportunity to challenge an existing or imported system in order to bring about change and improvement. An aspect of culture hacking is to create messages of satire or irony in order to criticize, or completely reject established systems within cultures. Post Arab spring, Egyptians practiced culture hacking by applying their cultural tools to external systems and influences, producing a process of ‘Egyptianization’. This investigation examines the MFA program’s culture at Virginia Commonwealth University in Qatar as a case study, and adapts those Egyptianized tools to hack the culture. The program has its own values, rituals, traditions, imported systems, influences and dominant symbols. The aim of this thesis is to generate customized hacking methodologies that identify cracks within this culture and develop an innovative framework to critically analyze them through visual representation.
93

Kauza odposlechů listu News of the World a její zobrazení v ČTK / Phone hacking scandal of News of the world and its display in the czech new agency

Berniová, Andrea January 2014 (has links)
The thesis called Phone hacking scandal of News of the World journal and its display in the Czech news agency deals with foreign coverage of the Czech news agency concernig the News of the World phone-hacking scandal.The thesis mainly focuses on the second half of 2011, especially on June, when the scandal broke out. Firstly the thesis deals with history and present of British press, then with Rupert Murdoch's (the last owner of the journal and media mogul) operation in media, with formation, development and extincion of the News of the World journal. It also informs about the phone-hacking scandal's profile and about the news service of the Czech news agency - foreign coverage, reporting formats and so on. It focuses on changes of the amount of news during time, on used formats of coverage, on priorities, services, cathegories and also on sources which the agency used during preparing the news mainly in June 2011. Numbers of news are organized to tables which illustrate the development of amounts of the news published in relation to the scandal. Then the thesis more briefly focuses on remaining months of the second half of 2011 and on previous and subsequent periods. This thesis also finds out how the phone-hacking scandal influenced media regulation of Great Britain.
94

Kybernetická krimnalita / Cyber crime

Bartůněk, Jan January 2015 (has links)
Development of information technology is one of the most dynamic parts of today's global society. Along with the coming of new technologies it generates new types of crime, eventually existing types of criminal activities in this area are moving from the real world to cyberspace. This rapid development of cyber crime enforces corresponding changes in the legislation related to cyberspace. In the Czech Republic the most fundamental changes in cyber crime law have been made along with the new Criminal Code. The new code has modified some areas, that were not mentioned by previous criminal code, refined or amended previous terminology related to cyberspace and added institutes required by international commitments, especially by the Convention on Cybercrime. The purpose of this diploma thesis on "Cyber crime" is to outline the issues of cyber-crime, point out some troubling topics, which are currently present in cyberspace, and outline possible future development of criminal law in cyberspace. In the beginning of the thesis there is a short summary of cyberspace and cyber crime history, that is followed by definitions of selected basic concepts of cyberspace and cyber crime. In the following chapters, there is a summary of current Czech legislation of selected areas and there some examples of such...
95

Vzestup a pád News of the World / The Rise and Fall of News of the World

Grieslerová, Martina January 2013 (has links)
This diploma thesis deals with the British Sunday tabloid paper News of the World. By using the method of historical analysis it covers all its history from its foundation to its closure. The aim of this thesis is to put the newspaper's beginning, growth and end into the context of its era. The first chapters describe the rise of periodical press in Great Britain and in connection with that the social situation and technological progress in print. The chapters also deal with the first stage of development of News of the World, that is, when it was owned by the Carr family. On the grounds of socio-economic and political situation the chapters discover which factors added to the massive growth of circulation and big popularity of this Sunday paper. The second half of this thesis covers the development of the newspaper under the ownership of Rupert Murdoch, starting with the battle over its buy out against Robert Maxwell. The thesis analyses changes Murdoch implemented and brings examples of scandals and controversies this newspaper had throughout all its history.The last chapter addresses the phone-hacking scandal which led to the paper's closure after 168 years and its consequences to Murdoch's media empire News Corporation, as well as to the British newspapers market and its self-regulatory principles.
96

Fondements métaphysiques des probabilités leibniziennes par le degré de perfection des mondes possibles

Boucher, Jean-Philippe 08 1900 (has links)
No description available.
97

The fame monster ! : Revers et fortune du Pirate, du 19e siècle à nos jours, des Mers jusqu'à la Toile / The fame monster ! : Reverse and Fortune of the Pirate, from 19th century till today, from the Seas to the Web

Freyheit, Matthieu 29 November 2013 (has links)
Nous savons tous à quoi ressemble un pirate. Ce que nous savons moins, c’est la raison de ces succès, les causes de notre engouement – voire de notre fascination pour ce Fame Monster. La formule permet de caractériser l’ambiguïté d’un personnage dont chaque fortune connaît un revers, révélant notre soif de transgression et notre tentation pour l’envers de la morale. L’approche littéraire comparatiste, augmentée d’emprunts à l’image, à la sociologie, à la philosophie politique et à l’histoire des mentalités, permet non pas de simplement décrire un phénomène, mais d’essayer d’en extraire les sens, les besoins, les attentes, en prenant pour hypothèse que la fiction pirate constitue un jalon spécifique dans l’histoire des mentalités occidentales, et autorise l’exploration d’un état de nos désirs : d’aventure, de danger, de transgression, d’insurrection ; mais aussi de conformisme, dans un mythe continuellement répété. Histoire dans l’histoire, fiction en négatif, le pirate marginal se donne à lire comme une part retranchée de la société qui l’évacue, et partant comme l’idéal révélateur du sang et de l’or de nos virtualités, de nos « occasions manquées ».C’est ainsi que l’étude du pirate traditionnel conduit non seulement à une analyse du personnage mais encore aux enjeux fictionnels qu’il engage. Piraterie et piratage, ses deux corollaires directs, mettent en œuvre des problématiques particulières de création et de réception, et amorcent une reconversion sémantique du personnage : le pirate connaît une nouvelle fortune numérique, tandis que, devenu comportement par le truchement du piratage, il conduit à repenser le champ de la fiction. Alors : tous pirates ? Ou plutôt : tous (déjà) piratés ? / We all know what a pirate looks like. We may wonder, however, why pirates fill us with such enthusiasm. Where does our fascination for this "Fame Monster" come from? The expression, Fame Monster, underlines the ambiguity of a character whose fortunes will always know a fall-down, unveiling our thirst for transgression – our temptation for the other side of morals. Our comparative literary approach (one that borrows from visual studies, sociology, political philosophy, and cultural history) not only allows for a description of this social trend, but intends to get to its specific meaning, and indeed reveal the needs and the desires it hides. Our hypothesis is that the pirate represents a specific marker in the cultural history of the western world, leading us to explore our own desire for adventure, danger, transgression, rebellion (although it should be noted that the pirate also exposes our willingness to embrace norms and conformism through a stereotypical figure that is constantly repeated, a never-ending myth). Secret history in the main one, negatively connoted fiction, the marginal pirate seems to be read as an outlawed part of our society, as the indicator of either our golden or our bloody potentialities – the indicator of our might-have-been. Thus our study moves further than the mere analysis of a figure, to investigate the true stakes of its fictions and representations. For instance, sea-piracy and web-piracy (and the semantic transformation implicit in the move from one to the other), point to specific issues with regards to creation and reception. As he achieves new e-success on the Web, and becomes more than a character – a behavior, through hacking – the pirate may also provide us with a model to reconsider the very possibilities of fiction. Perhaps, then, is it time to ponder: are we all pirates? Or have we all already been hacked?
98

Cyberhistory

Falloon, Keith January 2002 (has links)
Cyberhistory is a thesis presented at The University of Western Australia for the Degree of Master of Science. Computer history is its prime field of focus. Cyberhistory pursues four key themes in computer history. These are, gender, the notion of the periphery, access and the role of the proselytiser. Cyberhistory argues that, gender issues are significant to computer history, culture ascribes gender to computing, and culture has driven computer development as much as technological progress. Cyberhistory identifies significant factors in the progress of computer technology in the 20th century. Cyberhistory finds that, innovation can occur on the periphery, access to computers can liberate and lead to progress, key proselytisers have impacted the development of computing and computing has become decentralised due to a need for greater access to the information machine. Cyberhistory traces a symbolic journey from the industrial periphery to the centres of computing development during WWII, then out to a marginal computer centre and into the personal space of the room. From the room, Cyberhistory connects into cyberspace. Cyberhistory finds that, despite its chaos, the Internet can act like a sanctuary for those seeking to bring imagination and creativity to computing.
99

Säkerhetshot och lösningar för privatpersoner med bredband / Security threats and solutions for people with broadband

Bilan, Carolina, Hedberg, Carl January 2001 (has links)
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.
100

Design och implementering av en datorsäkerhetsdatabas – samt en behovsanalys därav

Lagergren, Tobias January 2010 (has links)
Denna rapport beskriver de behov vilka ligger tillgrund för att skapa en IT-säkerhetsdatabas. Rapporten tar även upp olika IT-säkerhetsproblem och för en diskussion om vad som är faran med dessa problem. Diskussionen förs inom två områden rörande IT-säkerhet.Det ena området är om IT-säkerhet i allmänhet och tar upp begreppet CIA. CIA står för de engelska begreppen Confidentiality, Integrity och Availability och på svenska, sekretess, integritet och tillgänglighet.Den andra delen handlar om lite mer specifika IT-säkerhetsproblem, som till exempel virus och sniffing.På uppdrag av FOI är en databas, vilken är avsedd för att lagra information rörande IT-säkerhet, skapad. Rapporten tar upp en del grundläggande databasteori och beskriver designen och implementationen av databasen. Även hur databasen fungerar beskrivs.Slutligen förs en diskussion om uppnådda resultat och om möjlig framtida utveckling av databasen. / This report describes the needs which are the basis for creating an IT security database.The report also discusses various IT security issues and a discussion of what are the dangers of these problems. The discussion conducted in two areas relating to IT security.The first part is about IT security in general and addresses the concept of the CIA. CIA stands for the English concepts of Confidentiality, Integrity and Availability. The terms in Swedish are sekretess, integritet and tillgänglighet.The second part deals with some more specific IT security problems, such as viruses and sniffing.On behalf of FOI a database is created, which is designed to store information relating to IT security. It outlines some basic database theory and describes the design and implementation of the database. Also the functions in the database are described.Finally a discussion over the results achieved and the possible future development of database is carried out.

Page generated in 0.0741 seconds