• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 5
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 25
  • 25
  • 10
  • 8
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Aplicación MFC para Windows: creación de un protector de pantalla para la UNMSM

Espichan Beretta, Patricia Isabel January 2002 (has links)
Actualmente, ante el auge que tienen los medios de comunicación y el uso avanzado de la tecnología en el mercado, las empresas necesitan ser más competitivas y promocionarse aún más a través de su imagen y la elaboración de sus productos. Hoy en día no sólo las grandes casas americanas de software, sino las grandes empresas multinacionales promocionan su imagen a través de los diversos accesorios que se utilizan para las computadoras como almanaques, pad’s para los mouses, protectores de pantalla (a través de disquetes, Cd’s o de la Internet), etc. (...) Es por eso que este trabajo está destinado a construir un Protector de Pantalla para la Universidad Nacional Mayor de San Marcos, contribuyendo a que alguna empresa o a algún investigador interesado en este tipo de productos, se anime a desarrollar su propio protector de pantalla, mejorando aún más sus resultados.
12

VPN : Virtual Private Network i Windows 2000

Norin, Anders, Ohlsson, Henrik January 2002 (has links)
No description available.
13

VPN : Virtual Private Network i Windows 2000

Norin, Anders, Ohlsson, Henrik January 2002 (has links)
No description available.
14

A comparative study of the Linux and windows device driver architecture with a focus on IEEE1394 (high speed serial bus) drivers

Tsegaye, Melekam Asrat January 2004 (has links)
New hardware devices are continually being released to the public by hardware manufactures around the world. For these new devices to be usable under a PC operating system, device drivers that extend the functionality of the target operating system have to be constructed. This work examines and compares the device driver architectures currently in use by two of the most widely used operating systems, Microsoft’s Windows and Linux. The IEEE1394 (high speed serial bus) device driver stacks on each operating system are examined and compared as an example of a major device driver stack implementation, including driver requirements for the upcoming IEEE1394.1 bridging standard.
15

Cloud Computing : Evaluation, as a platform for Scania Architecture

Siddiqui, Muhammad Anas January 2013 (has links)
Cloud computing has been given a great deal of attention during recent years. Almost all the technology market leaders and leading hosting service providers (like IBM, Microsoft and Verizon) have entered into the Cloud market as Cloud Providers. Cloud computing promises to provide highly available, secure, low cost, agile and highly scalable solution to the consumers. Scania is a global company and one of the world’s leading heavy vehicle manufacturers with 35,000+ employees. All the large organizations such as Scania, aim to constantly update themselves with the latest technology in order to meet their business requirements but, these organizations must always be convinced that there is a strong reason(s) to implement new technology. This research provides the method and criteria in relation to initiating Cloud computing. A number of Scania’s specific business requirements that it is possible to map to the Cloud are addressed in this thesis. The methodology of research is split in two parts. Firstly, the identification of business cases at Scania and their requirements with the Cloud and Secondly, the evaluation and comparison of the functionalities and capabilities of different vendors. The accumulated data is then compared and suitable vendors, according to those business requirements are suggested. This thesis also shares the experience of moving on premise applications to the Cloud. These are Scania specific applications which are currently being hosted in-house. The research also addresses the possibilities of portability between the Cloud providers. Although there is no standardization in relation to Cloud computing, some initiatives such as OpenStack are available and its current position and some application and data migration tools are also discussed. The thesis concludes with a general discussion, recommendations in relation to adapting Cloud computing and selecting the Cloud provider. This recommendation applies to every organization including Scania.
16

A framework for secure human computer interaction.

Johnston, James 02 June 2008 (has links)
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust. / Labuschagne, L., Prof.
17

Nstroj pro sprvu Active Directory / Active Directory Management Dashboard

Radimk, Samuel January 2016 (has links)
This thesis is focused on the main concepts of Active Directory and the creation of an application allowing basic management tasks. It introduces the logical as well as physical components and provides an overview of existing servers that are using the services of Active Directory. The functionality of existing management applications is discussed and desired properties of management applications are discovered. On these grounds, a new application concept is introduced and the benefits of the new application over the existing ones is shown. According to the concept, a new application is developed supporting the management of users and groups and implementing additional features such as profile photo editing and a definition of customized object creation process. This application is also tested on different levels and possibilities of future improvements are given.
18

Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots

Watkins, Trevor U. 11 June 2009 (has links)
No description available.
19

Analýza registrů Microsoft Windows / Microsoft Windows Registry Analysis

Hula, Miroslav January 2011 (has links)
Understanding and working with Microsoft Windows registry is an important ability from the perspective of security. This ability is used by malicious software as well as by software, which repaires the damage caused by activity of malicious software. However, applications accessing and working with the registry are platform dependent, which may not always be convenient and it can lead to other problems if the platform is not secure. Therefore, the aim of this work is to create a platform independent application for accessing and working with registry, which makes possible to analyse the effect of malware on registry.
20

Detekce útoku pomocí analýzy systémových logů / Attack Detection by Analysis of the System's Logs

Holub, Ondřej Unknown Date (has links)
The thesis deals with the attack detection possibilities and the nonstandard behaviour. It focuses on problems with the IDS detection systems, the subsequent classification and methods which are being used for the attack detection. One part of the thesis presents the existing IDS systems and their properties which are necessary for the successful attack detection. Other parts describe methods to obtain information from the operating systems Microsoft Windows and it also analyses the theoretical methods of data abnormalities. The practical part focuses on the design and implementation of the HIDS application. The final application and its detection abilities are tested at the end of the practical part with the help of some model situations. In the conclusion, the thesis sums up the gained information and shows a possible way of the future development.

Page generated in 0.092 seconds