17 Results
List Results Facet Summary
TITLE | TYPE | DATE CREATED | DATE ISSUED | SUBJECT |
---|---|---|---|---|
Using Historical Date to Predict Future Service | Digital Document | 2018-12-10, 2018-12-10 | Customer service., Data prediction. | |
Budget Network Analysis Suite: Challenges and Solutions for the Deployment of a Raspberry Pi as a Network Traffic Analysis Appliance | Digital Document | 2016-05-01, 2016-05-01 | Raspberry PI 4, Traffic capture device. | |
Residential Wi-Fi Pentesting | Digital Document | 2017-05-01, 2017-05-01 | Wardriving., Cybersecurity., Wireless networks., Wi-fi. | |
The Forensic Analysis of KeePass and Password Safe: An Evaluation of Open Source Password Managers By Daryl R. Middleton Graduate Student Capstone Project for Information Security and Intelligence Ferris State University Advisor: Dr. Greg Gogolin, Ph.D. F | Digital Document | 2017-05-01, 2017-05-01 | Password Managers., Authentication., Virtual machines., Digital forensics., Cybersecurity. | |
Analyzing Breach Data to Uncover Student Exposure & Password Trends | Digital Document | 2018-12-10, 2018-12-10 | Computer passwords., Information security. | |
Research Analysis in Malnutrition | Digital Document | 2017-04-29, 2017-04-29 | Computer software., Data analysis., Malnutrition. | |
Data Visiualization: Tableau and QlikView | Digital Document | 2017-05-01, 2017-05-01 | Tableau., Qlik View., Computer software., Data visualization. | |
Ransomware: Current Trends, Challenges, Target Areas, And Its Prevention | Digital Document | 2020-05-01, 2020-05-01 | Ransomeware., Cybersecurity., Ransomware preventative measures. | |
The Effects of a Factory Reset on an iPhone 8 Plus | Digital Document | 2018-04-01, 2018-04-01 | iPhone, Cyber security., Factory reset. | |
Efficacy of Embedded Phishing Training | Digital Document | 2018-12-18, 2018-12-18 | Phishing, Information technology management. | |
Which Characteristics May or May not Bias Facial Recognition Software? | Digital Document | 2020-12-01, 2020-12-01 | Biometric technology., Facial recognition., False identification. | |
Overcoming barriers of a remote compliance audit | Digital Document | 2018-05-01, 2018-05-01 | Remote audit, Compliance., PCI compliance. | |
Big Data Analysis By using Hadoop MapReduce and Apache Hive | Digital Document | 2017-05-01, 2017-05-01 | Data analysis., Computer software., Hadoop., MapReduce., Hive. | |
The Design and Implementation of Blockchain Technology in Academic Resource’s Authoritative Metadata Records: Enhancing Validation and Accountability | Digital Document | 2018-08-03, 2018-08-03 | Metadata, Blockchain, MARC records, Validation of MARC authority record | |
Infographics of Tanzania’s Death rate using Tableau | Digital Document | 2017-05-01, 2017-05-01 | Death rate., Tanzania., Tableau., Data analysis., Computer software. | |
No Need to Ask: Creating Permissionless Blockchains of Metadata Records | Digital Document | 2018-12-10, 2018-12-10 | Blockchain., Library cataloging., Metadata. | |
Privacy and Security Risks of the Top mHealth Applications for Headache Disorders | Digital Document | 2017-05-01, 2017-05-01 | mHealth, Computer applications., Cybersecurity., Privacy., Risk management., Android, iOS, Headaches. |