Suggested Topics within your search.
Suggested Topics within your search.
- Biology 1
- DNA 1
- English language 1
- Grammar 1
- Handbooks, manuals, etc 1
- Report writing 1
- Rhetoric 1
-
1
SMART CITIES AS HACKER CITIES. ORGANIZED URBANISM AND RESTRUCTU- RING WELFARE IN CRISIS-RIDDEN ITALY
Published 2016-01-01Subjects: Get full text
Article -
2
-
3
-
4
The role of climate and population change in global flood exposure and vulnerability
Published 2025-02-01Get full text
Article -
5
-
6
-
7
-
8
The effect of using Naive Bayes to detect spam email
Published 2025-01-01“…However, it has also become a channel for spreading undesirable information, such as content from hackers, viruses, violence, pornography, and superstition. …”
Get full text
Article -
9
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…The attack was conducted through specially crafted hypertext transfer protocol (HTTP) requests to circumvent authentication and allow hackers to upload malicious payloads through Kaseya’s virtual system administrator (VSA). …”
Get full text
Article -
10
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data from the device can be hacked and modified by hackers. By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. …”
Get full text
Article -
11
Staff Attendance Management System: A Case Study of Kinyamaseke Town Council Kasese District.
Published 2024“…The study recommends that the system should be well maintained and protected from unauthorized users by creating strong passwords. which are hard to guess by hackers. Any upgrading needed on the system should be unless otherwise done by the system administrator or system designer. …”
Get full text
Thesis