Now showing items 37-40 of 40

    • Teaching java programming using cable in a collaborative online environment 

      McKelvey, Nigel; Curran, Kevin (Institute of Advanced Engineering and Science (IAES), 2012-07)
      With the emergence and evolution of computer hardware, software and networks - virtual classrooms now exist which enable teachers and students to experience learning activities and to work together at a distance either ...
    • Threat modelling for legacy enterprise applications 

      Mc Grath, Michael (Letterkenny Institute of Technology, 2013)
      Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ...
    • To Wireless Fidelity and Beyond - CAPTURE, Extending Indoor Positioning Systems 

      Cullen, Gary (IEEE, 2014-10-24)
      The benefits of context aware computing and specifically the context that location can provide to applications and systems has been heavily documented in recent times. Moreover the move from traditional outdoor ...
    • Traffic isolation techniques in securing multi-tenant virtual environments 

      Harvey, Darren (Letterkenny Institute of Technology, 2015-01)
      A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ...