Search
Skip to Search Results- 1Chauhan, Karan
- 1Gow, Gordon (Supervisor)
- 1Leask, Jennifer
- 1Miya, Chelsea
- 1Popowich, Sam
- 1Ray, Diptangsu
- 3Concordia University of Edmonton
- 2Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 1University of Alberta Library
- 1University of Alberta Library/Libraries Staff Publications
- 1Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 1Communications and Technology Graduate Program
-
Spring 2022
This dissertation reads the informational ethos of authors Herman Melville and Walt Whitman through the lens of critical data studies and surveillance studies, examining how emerging data cultures in the nineteenth century gave rise to new subjectivities. The study situates these authors at a...
-
2022
Fitness trackers can help improve physical activity, and thereby reduce the risksof diseases such as diabetes, obesity, as well as hypertension. Despite these health related benefits, the way these devices are being used by the end user, play a crucial role for the persistent success of fitness...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out. Tools such as snort and Wireshark are used for this...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out.
-
Proxying the Data Body: Artificial Intelligence, Federated Identity, and Machinic Subjection
Download2020-08-06
Academic libraries have recently seen a shift from self-management of user-authentication of licensed resources themselves, to cloud-based implementations of "federated identity" technologies. Such technologies aim to solve the problems of fragile access to licensed resources while also better...