• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 43
  • 28
  • 11
  • 6
  • 4
  • 4
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 111
  • 40
  • 29
  • 28
  • 20
  • 19
  • 18
  • 15
  • 15
  • 13
  • 13
  • 13
  • 11
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

The Security Layer

O'Neill, Mark Thomas 01 January 2019 (has links)
Transport Layer Security (TLS) is a vital component to the security ecosystem and the most popular security protocol used on the Internet today. Despite the strengths of the protocol, numerous vulnerabilities result from its improper use in practice. Some of these vulnerabilities arise from weaknesses in authentication, from the rigidity of the trusted authority system to the complexities of client certificates. Others result from the misuse of TLS by developers, who misuse complicated TLS libraries, improperly validate server certificates, employ outdated cipher suites, or deploy other features insecurely. To make matters worse, system administrators and users are powerless to fix these issues, and lack the ability to properly control how their own machines communicate securely online. In this dissertation we argue that the problems described are the result of an improper placement of security responsibilities. We show that by placing TLS services in the operating system, both new and existing applications can be automatically secured, developers can easily use TLS without intimate knowledge of security, and security settings can be controlled by administrators. This is demonstrated through three explorations that provide TLS features through the operating system. First, we describe and assess TrustBase, a service that repairs and strengthens certificate-based authentication for TLS connections. TrustBase uses traffic interception and a policy engine to provide administrators fine-tuned control over the trust decisions made by all applications on their systems. Second, we introduce and evaluate the Secure Socket API (SSA), which provides TLS as an operating system service through the native POSIX socket API. The SSA enables developers to use modern TLS securely, with as little as one line of code, and also allows custom tailoring of security settings by administrators. Finally, we further explore a modern approach to TLS client authentication, leveraging the operating system to provide a generic platform for strong authentication that supports easy deployment of client authentication features and protects user privacy. We conclude with a discussion of the reasons for the success of our efforts, and note avenues for future work that leverage the principles exhibited in this work, both in and beyond TLS.
102

Bezpečné kryptografické algoritmy / Safe Cryptography Algorithms

Mahdal, Jakub January 2008 (has links)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.
103

The International Teacher to Teacher Exchange: A Context for Educator Transformation

Anderson, Amy A. 08 1900 (has links)
This study examined how in-service teachers transformed professionally and personally as a result of participation in the International Teacher to Teacher Exchange Program (ITTTE). Six teachers, 3 from the U.S. and 3 from Guatemala, were paired. Each pair spent a total of 8 weeks together, in each other's countries, over the course of 2 years. The pairs reciprocated home stays, school engagement, and cultural learning in three cohorts; 2012-2014, 2014-2016, 2016-2018. In 2018, each participant engaged in a structured interview tailored to the ten meaning phases of Mezirow's transformative learning theory (TLT). The data were analyzed deductively, through the application of the ten meaning phases of transformation. The data were also analyzed inductively to determine additional themes of transformation. The deductive findings revealed 5 out of 6 participants experienced full transformative learning. All 3 Guatemalan teachers transformed professionally with new understandings of mathematics pedagogy. Two U.S. teachers transformed personally, one by learning how to be a more caring teacher and the other by overcoming shyness to engage as a relational teacher. The third U.S. teacher adopted the point of view that speaking a second language had value. The inductive analysis revealed emerged themes of learning, language, relationships, and program affecting others as evident in transformed frames of reference, habits of mind and points of view. Due to the range of participation years, latent effects were noted. The ITTTE was shown to influence transformation in teachers' personal and professional development. TLT was effective in revealing participant transformation within the ITTTE.
104

Analýza dat síťové komunikace mobilních zařízení / Analysis of Mobile Devices Network Communication Data

Abraham, Lukáš January 2020 (has links)
At the beginning, the work describes DNS and SSL/TLS protocols, it mainly deals with communication between devices using these protocols. Then we'll talk about data preprocessing and data cleaning. Furthermore, the thesis deals with basic data mining techniques such as data classification, association rules, information retrieval, regression analysis and cluster analysis. The next chapter we can read something about how to identify mobile devices on the network. We will evaluate data sets that contain collected data from communication between the above mentioned protocols, which will be used in the practical part. After that, we finally get to the design of a system for analyzing network communication data. We will describe the libraries, which we used and the entire system implementation. We will perform a large number of experiments, which we will finally evaluate.
105

Die bruikbaarheid van die Goodenough draw-a-man-meetmiddel ten opsigte van verstandelik gestremdes

Saptouw, Manuel January 1993 (has links)
Magister Artium (Psychology) - MA(Psych) / Die bruikbaarheid van die Goodenough Draw-A-Manmeetmiddel met verstandelik gestremdes is ondersoek. Die Goodenough Draw-A-Man-meetmiddel, alhoewel aangewend om intelligensievlak van verstandelik gestremdes te bepaal, het beperkte ondersteuning volgens gepubliseerde studies. Twee studies het kontrasterende bevindinge ten opsigte van die bepaling van spesifieke grade van verstandelike gestremdheid aangedui. Ander studies het die geldigheid van die meetmiddel ten Die huidige studie het die volgende ondersoek: die bruikbaarheid van die Goodenough Draw-A-Man-meetmiddel ten opsigte van die klassifisering van die verskillende grade (sowel as onderverdeelde grade) van verstandelike gestremdheid; die verhouding tussen verstandelik gestremdes se prestasie op die Goodenough Draw-A-Manmeetmiddel en die volgende veranderlikes: geslag, ouderdom, institusionalisering versus nieinstitusionalisering; en om stereotiperende mensfiguurtekeninge en leerpotensiaal te ondersoek. van kronologiese ouderdom en geslagsverskille, sowel as die algemene bruikbaarheid met verstandelik gestremdes bevraagteken. Die ondersoekgroep het bestaan uit 153 verstandelik gestremdes met kronologiese ouderdomsomvang van 7 jaar tot 84 jaar. Hierdie subjekte is as erg tot verstandelik gestremd geklassifiseer. Hierdie groep het bestaan uit 64 manlike en 89 vroulike subjekte van wie 99 uit In institusie populasie geselekteer is, terwyl 54 geselekteer is uit In nie-institusie populasie. Die subjekte is in drie ouderdomskategorieë, naamlik 7 tot 21 jaar, 22 tot 59 jaar en 60 tot 84 jaar gegroepeer. Die ondersoekgroep se psigometriese data (die Goodenough Draw-A-Man en die Ou Suid-Afrikaanse Individuele Skaal bevindinge) gedateer 1985 tot 1990 is ontleed. Hierbenewens is 20 verstandelik gestremde inwoners se mensfiguur-tekeninge (60 tekeninge) wat tydens 1993 geadministreer is, ontleed om stereotiperende tekeninge en leerpotensiaal te ondersoek. Die resultate van die huidige studie is soos volg: Bepaling van die spesifieke grade van verstandelike gestremdheid (erg, matig en lig) illustreer dat die Goodenough Draw-A-Man-meetmiddel en die Ou Suid- Afrikaanse Individuele Skaal, verskil ten opsigte van die bepaling van spesifieke klassifikasies. Die McNemar-toets bevindinge dui op In betekenisvolle verskil tussen die twee meetmiddels (p < 0,05). Die ooreenkoms tussen hierdie twee intelligensie-meetmiddels ten opsigte van klassifikasie is soos volg: ligte graad (77,3%), matige graad (57,8%) en erge graad (47,9%). Die Chi-wadraattoets en Fisher se eksakte toets vergelyking tussen die 99 gelnstitusionaliseerdes en die 54 nie-gelnstitusionaliseerdes, sowel as tussen die 64manlike en 89 vroulike subjekte vir die drie ouderdomskategorieë, dui geen beduidende verskil in prestasie op die Goodenough Draw-A-Man-meetmiddel aan nie (p > 0,05). Die t-toets bevindinge met betrekking tot die ondersoek van stereotiperende mensfiguur-tekeninge, dui In beduidende verskil aan tussen die 20 toetslinge se prestasie op die eerste en tweede mensfiguur-tekeninge (t = -3,17, p < 0,05). Die subjekte het gemiddeld 2,4 tellings meer op die tweede tekening behaal Die t-toets bevindinge wat verband hou met die leerpotensiaal van verstandelik gestremdes, dui In beduidende verskil aan tussen die 20 toetslinge se prestasie voor en na die blootstelling aan In "perfekte" mensfiguurtekeninge (t = -5,26, P < 0,05). Die subjekte het gemiddeld 5,1 tellings meer op hul derde tekening behaal. 170 In Opsomming van die bevindinge is soos volg: dat die Goodenough Draw-A-Man-meetmiddel meer betroubaar is met die hoër funksionerende verstandelik gestremdes; dat veranderlikes soos institusionalisering, nieinstitusionalisering, geslag en ouderdom, nie In rol speel ten opsigte van hierdie groep verstandelik gestremdes se prestasie op die Goodenough Draw-A-Man nie; dat vir hierdie groep verstandelik gestremdes, stereotiperende tekeninge en modifikasie van hul kognitiewe strukture voorkom, soos in hul mensfiguurtekeninge aangedui.
106

Obrazový databázový systém pro podporu diagnostiky glaukomu / Image database system for glaucoma diagnosis support

Peter, Roman January 2008 (has links)
Tato práce popisuje přehled standardních a pokročilých metod používaných k diagnose glaukomu v ranném stádiu. Na základě teoretických poznatků je implementován internetově orientovaný informační systém pro oční lékaře, který má tři hlavní cíle. Prvním cílem je možnost sdílení osobních dat konkrétního pacienta bez nutnosti posílat tato data internetem. Druhým cílem je vytvořit účet pacienta založený na kompletním očním vyšetření. Posledním cílem je aplikovat algoritmus pro registraci intenzitního a barevného fundus obrazu a na jeho základě vytvořit internetově orientovanou tři-dimenzionální vizualizaci optického disku. Tato práce je součásti DAAD spolupráce mezi Ústavem Biomedicínského Inženýrství, Vysokého Učení Technického v Brně, Oční klinikou v Erlangenu a Ústavem Informačních Technologií, Friedrich-Alexander University, Erlangen-Nurnberg.
107

Návrh bezpečnostní infrastruktury elektronického archivu / Design of security infrastructure for electronic archive

Doležel, Radek January 2009 (has links)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
108

Návrh a implementace elektronického obchodu společnosti / E-shop design and implementation of company

Horsák, David January 2008 (has links)
This diploma work characterizes and analyzes the business company. It contains method of solving problems, consequent on the analysis, solving implementation problems and it is project tools for improve future position of company on market by means of electronic market. For further, it is describe economics analysis of design e-shop and it is implementation in chosen company.
109

Internetový obchod / E-shop

Žák, David January 2009 (has links)
The work deals with internet commerce. It includes analysis and design their own e-shop. The aim was to bring the marketing plan for market entry, assess the achievements and propose a procedure to other years. It can be familiar with basic knowledge about internet marketing, internet business analysis in comparison with the stone business. These general theoretical and practical knowledge is given to about half the work. In the second half is giving its own Internet business, the introduction of the marketing and promotion.
110

Rozšiřitelný informační systém sdružení SDC s vícevrstvou architekturou / Extendable Information System of SDC with a Multi-Tier Architecture

Vrážel, Dušan Unknown Date (has links)
This master's thesis deals with analysis, design and implementation of an information system that allows easy extensibility with three-tier architecture.   System is developed using object oriented approach by programming language PHP, relational database server MySQL and web services and protocol SOAP. The View tier is implemented by web technologies XHTML and CSS. Analysis and design of this system is done with using the modeling language UML.     In this thesis is described the problem of multi-tier software architecture, theory of development information's systems and described design and implementation of an information system with a three-tier architecture and it's application in the society SDC.

Page generated in 0.0389 seconds