Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
The genotoxic effects of titanium dioxide nanoparticles on Dugesia dorotocephala genomic DNA
Download2013-08-04
The nanotechnology industry is rapidly growing and hence as are its uses in commercial and consumer goods. The Project on Emerging Nanotechnologies cited a 521% increase between 2006 and 2011 in the number of consumer goods containing nanoparticles. Nanotechnology can be found in a wide variety...
-
The making of a company colony: The fur trade war, the colonial office, and the metamorphosis of the Hudson's Bay Company
Download2020
Bradford, Tolly, Connors, Rich
This article argues that between 1810 and 1816 the Hudson’s Bay Company (HBC) underwent a managerial metamorphosis: where it had previously and then only timidly claimed economic privileges and authority in North America, after this period the company’s directors in London began staking claim to...
-
The meaning of recovery: Personal perspectives from individuals recovering from substance abuse
Download2021-04-16
I examined the meaning of addiction recovery from the personal perspectives of individuals recovering from substance abuse while they were residing in transitional supportive housing. Six participants 36-58 years old completed a Google Form questionnaire about their experiences and feelings...
-
The modeling of an identity catching attack on the Universal Mobile Telecommunication System (UMTS) using attack tree methodology
Download2009-01-12
This research focuses on the modeling of an Identity Catching attacks in the Universal Mobile Telecommunication System (UMTS) using attack tree methodology. The possible ways an intruder could launch an identity catching attacks on the UMTS are identified and modeled using attack tree...
-
2017-04-01
This thesis analyses the development of Dietrich Bonhoeffer’s understanding of the bodily presence of Christ pro nobis in, with, and through the church-community. In studying his ecclesiology, the Christological basis for his comprehension of the church is displayed. The first chapter discusses...
-
2012-01-01
The purpose of a kernel rootkit is to prevent detection of a compromised operating system. System Service Dispatch Table (SSDT) hooking has been employed by most Windows kernel rootkits as a method of hiding files, processes and registry keys from system and investigative utilities, by...
-
2020
IoT comprises of cyber-physical devices connected through the internet. These devices carry sensitive data and support critical services. Due to the sensitivity of user data shared across IoT, there is a risk of attacks such as spoofing, eavesdropping, and denial of service (DoS). These attacks...
-
2016-09-04
Many versions of green fluorescent protein (GFP) have been engineered by site-directed or random mutagenesis of native proteins. However, there are still areas where these proteins can be altered in order to provide the research community with more effective biotechnology tools. This experiment...