Zobrazeno 1 - 10
of 20
pro vyhledávání: '"datorsäkerhet"'
Autor:
Fröberg, Tobias
JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact o
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-337161
Autor:
Szreder, Mikael
In order to develop secure Internet of Things (IoT) devices, it is vital that security isconsidered throughout the development process. However, this is not enough as vulnerabledevices still making it to the open market. To try and solve this issue,
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161042
Autor:
Szreder, Mikael
In order to develop secure Internet of Things (IoT) devices, it is vital that security isconsidered throughout the development process. However, this is not enough as vulnerabledevices still making it to the open market. To try and solve this issue,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::568758ca4f8c144c30c2da31f0f6126d
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161042
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161042
Autor:
Petersen, Palle
This work is about cryptography in general but also how the encryption works, and what's needed for encryption to work. I will also take up a little around the history around the encryption.
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-9497
Autor:
Lagergren, Tobias
Denna rapport beskriver de behov vilka ligger tillgrund för att skapa en IT-säkerhetsdatabas. Rapporten tar även upp olika IT-säkerhetsproblem och för en diskussion om vad som är faran med dessa problem. Diskussionen förs inom två områden r
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-60113
Autor:
Frännfors, Mattias
Clavister AB's present product line of firewalls all include management software for administering a wide range of network and security related settings such as rules, routes, permissions and logging. Due to new demands and requirements for security,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::88d638016c5cf7290db3a98749a35540
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42956
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42956
Autor:
Norén, Jörgen, Waara, Henrik
Validerat; 20101217 (root)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5579b08ca3de361fbeabfcf2f373a17a
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-49284
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-49284
Autor:
Andersson, Mats
Forskningen om artificiella immunsystem försöker använda människans immunförsvar som modell för hur ett datorsystem på egen hand skall kunna försvara sig mot okänt inkräktande, till skillnad från traditionella antiviruslösningar som bygge
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-631
Autor:
Lundmark, Lars, Palm, Henrik
Validerat; 20101217 (root)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f1409425fb99f73db3d894dd687ac40a
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-57135
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-57135