February 12, 2022
TITLE | TYPE | DATE CREATED | DATE ISSUED | SUBJECT |
---|---|---|---|---|
Analyzing Breach Data to Uncover Student Exposure & Password Trends | Digital Document | 2018-12-10, 2019-06-14T14:50:21Z | Computer passwords., Information security. | |
Big Data Analysis By using Hadoop MapReduce and Apache Hive | Digital Document | 2017-05-01, 2019-06-19T17:57:57Z | Computer software., Data analysis., Hadoop., Hive., MapReduce. | |
Budget Network Analysis Suite: Challenges and Solutions for the Deployment of a Raspberry Pi as a Network Traffic Analysis Appliance | Digital Document | 2016-05-01, 2021-08-18T18:25:35Z | Raspberry PI 4, Traffic capture device. | |
Data Visiualization: Tableau and QlikView | Digital Document | 2017-05-01, 2019-06-19T17:30:38Z | Computer software., Data visualization., Qlik View., Tableau. | |
Efficacy of Embedded Phishing Training | Digital Document | 2018-12-18, 2019-06-14T14:33:03Z | Information technology management., Phishing | |
Infographics of Tanzania’s Death rate using Tableau | Digital Document | 2017-05-01, 2019-06-14T16:09:10Z | Computer software., Data analysis., Death rate., Tableau., Tanzania. | |
No Need to Ask: Creating Permissionless Blockchains of Metadata Records | Digital Document | 2018-12-10, 2019-06-14T14:55:57Z | Blockchain., Library cataloging., Metadata. | |
Overcoming barriers of a remote compliance audit | Digital Document | 2018-05-01, 2021-08-18T18:29:54Z | Compliance., PCI compliance., Remote audit | |
Privacy and Security Risks of the Top mHealth Applications for Headache Disorders | Digital Document | 2017-05-01, 2019-06-14T15:26:42Z | Android, Computer applications., Cybersecurity., Headaches., Privacy., Risk management., iOS, mHealth | |
Ransomware: Current Trends, Challenges, Target Areas, And Its Prevention | Digital Document | 2020-05-01, 2021-08-18T18:10:04Z | Cybersecurity., Ransomeware., Ransomware preventative measures. | |
Research Analysis in Malnutrition | Digital Document | 2017-04-29, 2019-06-14T15:20:29Z | Computer software., Data analysis., Malnutrition. | |
Residential Wi-Fi Pentesting | Digital Document | 2017-05-01, 2019-06-14T16:19:25Z | Cybersecurity., Wardriving., Wi-fi., Wireless networks. | |
The Design and Implementation of Blockchain Technology in Academic Resource’s Authoritative Metadata Records: Enhancing Validation and Accountability | Digital Document | 2018-08-03, 2019-06-14T14:20:17Z | Blockchain, MARC records, Metadata, Validation of MARC authority record | |
The Effects of a Factory Reset on an iPhone 8 Plus | Digital Document | 2018-04-01, 2019-06-14T15:08:27Z | Cyber security., Factory reset., iPhone | |
The Forensic Analysis of KeePass and Password Safe: An Evaluation of Open Source Password Managers By Daryl R. Middleton Graduate Student Capstone Project for Information Security and Intelligence Ferris State University Advisor: Dr. Greg Gogolin, Ph.D. F | Digital Document | 2017-05-01, 2019-06-14T16:13:55Z | Authentication., Cybersecurity., Digital forensics., Password Managers., Virtual machines. | |
Using Historical Date to Predict Future Service | Digital Document | 2018-12-10, 2019-06-14T14:44:07Z | Customer service., Data prediction. | |
Which Characteristics May or May not Bias Facial Recognition Software? | Digital Document | 2020-12-01, 2021-08-18T17:53:28Z | Biometric technology., Facial recognition., False identification. |