Search
Now showing items 21-28 of 28
Traffic isolation techniques in securing multi-tenant virtual environments
(2015-01)
A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ...
Comparing the performance of enterprise applications on limited operating systems
(2012-09)
These days a Smartphone is just as important as a computer. It is essential that
users select a device that has the best performance possible. This thesis used simulation
to compare the performance of an application on ...
Legal, ethical & social issues in the case of an intrusive remote monitoring software
(The Institute of Advanced Engineering and Science, 2012-10)
In 2008, a laptop was stolen from a high school student in the USA. The laptop was being monitored by remote recovery software. The thief sold the laptop in question to another student who in turn sold it to a teacher. The ...
A novel approach to digital watermarking, exploiting colour spaces
(2011)
Watermarking is the process of embedding information in a carrier in order
to protect the ownership of text, music, video and images, while steganography
is the art of hiding information.
Normally watermarks are embedded ...
Investigation of indoor positioning based on WLAN 802.11
(2013-08)
The need for location based services has dramatically increased within the past few years, especially with the popularity and capability of mobile device such as smart phones and tablets. The limitation of GPS for indoor ...
An implementation and evaluation of PCI DSS 3.0 for E-Commerce in a testing environment
(2015-03)
Threats to personal payment card information are continually on the rise. To implement a formal process for protecting this information PCI DSS was created. However credit card fraud is still rising. This leads to the ...
Improving compliance with Bluetooth device detection
(2015-05)
Attributed to Joshua Wright (2012) “Security will not get better until tools for practical exploration of the attack surface are made available”.
With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth ...
Malware analysis and antivirus signature creation
(2015-05)
The rapid advances social media, educational tools and communications platforms available today have expanded the attack landscape through which the malicious user can propagate their work can carry out damaging attacks. ...