• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 604
  • 415
  • 379
  • 241
  • 162
  • 111
  • 73
  • 32
  • 27
  • 27
  • 15
  • 11
  • 9
  • 6
  • 6
  • Tagged with
  • 2399
  • 338
  • 315
  • 291
  • 286
  • 280
  • 248
  • 228
  • 227
  • 220
  • 200
  • 191
  • 190
  • 188
  • 184
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Jahresbericht / DIU, Dresden International University

07 March 2013 (has links) (PDF)
No description available.
72

Jahresbericht / DIU, Dresden International University

07 March 2013 (has links) (PDF)
No description available.
73

Jahresbericht / DIU, Dresden International University

07 March 2013 (has links) (PDF)
No description available.
74

Jahresbericht / DIU, Dresden International University

07 March 2013 (has links) (PDF)
No description available.
75

Wireless Security, a practical guide

Gjercek, Albin, Andersson, Alexander January 2012 (has links)
Wireless networks are continuing to grow around the world due to the advantages it offers and all the different services that it provides. In networking environments where the communication goes through a wireless connection, the importance of protecting the private information is a very significant task for network administrators. Beside the great benefits from having this type of network, the major issue of wireless communications is the weak security it provides. Companies and business organizations are more and more involved with the use of wireless networks because of the flexibility, mobility and the scalability it offers, but they are also concerned about the consequences of having a weaker security to protect their expensive investments and information. This thesis discusses the issues behind the security of wireless networks. It explains the background of the wireless networks and describes how the different security algorithms and encryptions work. The authors of this thesis decided to present some of the possible attacks that could occur in wireless networks and also give some security solutions to help others protect their network. The group that worked together on this project had the idea of investigating how secure the actual wireless algorithms and encryptions are. The approach of finding the necessary information for presenting the results and conclusions was to perform penetration tests on wireless networks that were implemented with the three famous security algorithms of WEP, WPA and WPA2. The penetrations tests were performed in lab environments and in home networks with the use of cracking tools. The group used the open source Linux based distribution called BackTrack 5. This operating system provided the group the different cracking tools that would help them perform their investigation. The purpose of performing the penetration tests was to find out the vulnerabilities that each of the security algorithms poses and therefore be able to determine which of them offers the best protection to a wireless network. After the penetration tests were done, the group came up with some solutions by configuring a wireless network with the strongest security options. The solutions were aimed to help others how to configure a specific wireless network in a simple but effective way. The results indicated that the weakest security algorithm would present some major issues for a wireless network. It included a greater possibility of experiencing different network attacks by configuring a wireless network with a weak security algorithm. Overall, this thesis provided the group the necessary information that was beneficial for them to understand how strong a wireless network actually is, and how a penetration test was performed.
76

A Methodology for Designing Flexible Report for On-Line Analytical Processing

Hsia, Tse-Chih 27 January 2004 (has links)
Due to the increasing global competition in today¡¦s business environment, current Transaction Processing Systems and Management Information Systems can no longer satisfy the enterprise¡¦s needs. Mangers need to analyze data from different views to recognizing business status, making decisions, and setting up the policies. To support such works, many information systems and technologies are developed including Decision Support Systems, Executive Information Systems, data warehouses, and On-Line Analytical Processing (OLAP). The implementation of OLAP and data warehousing project are expensive and risky. The results of implementing OLAP and data warehousing in most of the organizations do not, however, always prove a success. The common problem occurs in the requirement analysis phase when analyzing the dimensions and hierarchical relationships for OLAP. The user requirement can not be defined completely and the developers often need to modify or reconstruct the dimensions and hierarchical relationships to meet the user¡¦s changing needs. This is an enormous burden to the system developers. Although many tools with OLAP provide the flexibility for user creating analytical reports by using predefined dimensions and hierarchical relationships. However, a methodology for designing flexible report for OLAP to support ad hoc analysis is still lacking. This study proposes a methodology that is developed for designing flexible report for OLAP, which presents the dimensions and hierarchical relationships by visualized meta-templates and templates to help users create analysis reports. The methodology provides the flexibility not only in representing dimensions and hierarchical relationships for OLAP, but also in producing flexible reports. With such flexibility, the users can create analytical reports to support ad hoc analysis by choosing appropriated meta-template and template easily.
77

news report and anchor's image

Sung, Yi-hsuan 07 July 2005 (has links)
In Western, many television networks always expend largely to mold the star anchor for raising rating. They believe that the more attractive the anchor¡¦s image, the higher the rating. Since the first cable television station has established in Taiwan in 1993, the competition among television stations to attractive the audience become intense. The way to make up anchor¡¦s image is changed; we can read anchor¡¦s stories in newspaper in various ways. General speaking, the only one purpose for publicizing is rating. The main purpose of this study is in connection with news report and anchor¡¦s image. The experimental design is to figure out audiences¡¦ reactions between different newspaper contents (the love & marriage life news and the family life news) and the different aspects (the positive, the negative and the neutral reports). Therefore, the study will also focus on the relationship between anchor¡¦s image and audiences¡¦ television news choices. The study uses questionnaire to collect the data and infers the following results: 1.News report is remarkable to influence anchor¡¦s image. 2.The news report about anchor¡¦s love and marriage has the stronger influence with anchor¡¦s image than the news report about anchor¡¦s family life. 3.It influences with anchor¡¦s ¡§personal glamour¡¨, ¡§professional ability to cover news item¡¨, ¡§trusty¡¨ and ¡§authoritative¡¨ when audiences read the news report about anchor¡¦s love and marriage. 4.The audiences¡¦ imaging evaluations for the news anchor that come from¡¨ negative report¡¨ is apparently higher than other evaluations (which come) from positive and neutral reports. 5.There is the highly positive relationship between the imaging index of the news anchor and the intention of the audience.
78

Annual Report Generator

Lin, Yingwei January 2006 (has links)
<p>This report analyzes the needs to build an annual report generator which has the properties of</p><p>Modularity, Simplicity in use and Maintainability based on current web technology. It also describes</p><p>the software development process from design to implementation. The description is goal criteria based</p><p>so it explains the advantages of the developed annual report generator. This report also discusses the</p><p>further works that can be done in the future and their regarding implementation difficulties.</p>
79

Objective and subjective personality characteristics of medical students

Meit, Heather Anderson. January 2001 (has links)
Thesis (Ph. D.)--West Virginia University, 2001. / Title from document title page. Document formatted into pages; contains vi, 68 p. : ill. Includes abstract. Includes bibliographical references (p. 55-62).
80

A multi-functional essay prompt for state mandated assessments using example from the T.A.K.S. as model

Glick, Allen A. January 2009 (has links)
Thesis (M.A.)--University of Texas at Arlington, 2009.

Page generated in 0.0303 seconds