10 results

Morpheme

Digital Artefact
Tsiros, A. (2016)
Morpheme. [MaxMSP 5 32 bit software]
This is a MaxMSP 5 32 bit software, Morpheme allows the control of a concatenative synthesis module (IMTR CataRT) through the act of sketching on a digital canvas. The aim is ...

Advanced security and network forensics: cloud computing.

Digital Artefact
Buchanan, W. J. (2010)
Advanced security and network forensics: cloud computing
6 CLOUD/GRID COMPUTING 6.1 Objectives 6.2 Introduction 6.3 Grid Computing 6.3.2 Grid middleware 6.3.1 Grid computing applications Distributed.net 6.4 Cloud Computing ...

Security and forensic computing: encryption.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: encryption
3 ENCRYPTION 90 3.1 Introduction 90 3.2 Simple cipher methods 91 3.3 Encryption operators 94 3.4 Key-based cryptography 96 3.5 Brute-force analysis 103 3.6 Public-key, private...

Security and forensic computing: software security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: software security
5 ENHANCED SOFTWARE SECURITY 163 5.1 Introduction 163 5.2 Integrating security into applications 164 5.3 Good practice 165 5.4 The future of software 165 5.5 .NET environment ...

Security and forensic computing: introduction to computer security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: introduction to computer security
1 INTRODUCTION 14 1.1 The Industrial and the Information Age 14 1.2 CIA and AAA 15 1.3 Protecting against intruders 16 1.4 Users, systems and data 17 1.5 Security and Forensic...

Security and forensic computing: authentication.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: authentication
4 AUTHENTICATION, HASHING AND DIGITAL CERTIFICATES 130 4.1 Introduction 130 4.2 Methods of authentication 132 4.3 Biometrics 134 4.4 Message hash 136 4.5 Authenticating the s...

Security and forensic computing: network security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: network security
6 NETWORK SECURITY ELEMENTS 186 6.1 Introduction 186 6.2 Router (packet filtering) firewalls 186 6.3 Network address translation 196 6.4 PIX/ASA firewall 203 6.5 Proxy servers...

Security and forensic computing: forensic computing.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: forensic computing
7 FORENSIC COMPUTING 217 7.1 Introduction 217 7.2 Legal infrastructure 217 7.3 Computer Forensics 218 7.4 Is it true or not? 219 7.5 Identity details 222 7.6 One-time password...

Security and forensic computing: intrusion detection systems.

Digital Artefact
Buchanan, W. J. (2009)
Security and forensic computing: intrusion detection systems
2 INTRUSION DETECTION SYSTEMS 50 2.1 Introduction 50 2.2 Types of intrusion 53 2.3 Attack patterns 54 2.4 Host/network-based intrusion detection 55 2.5 Placement of the IDS 57...

Fragments of place : revealing sense of place through shared phone images.

Digital Artefact
Smyth, M. & Helgason, I. (2008)
Fragments of place : revealing sense of place through shared phone images.
Is an interactive new media art installation that explores how the sharing of images, normally hidden on mobile phones, can reveal more about people's sense of place and this ...