Suche
Anzeige der Dokumente 51-60 von 90
Introduction to Forensics and the use of the Helix free Forensic Tool
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little ...
Tutorials of how to use Metasploit, Nessus and Nmap
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
Resuminer – A Résumé Recommender System for Job Seekers using Cluster Analysis
(Polytechnic University of Puerto Rico, 2016)
Resumes or curriculum vitae are an
essential requirement for job seekers in any industry
and are usually the first interactions with third
parties that are actively hiring. For a single person,
there is an infinite ...
Centralized Device Independent Software Architecture for the Internet of Things
(Polytechnic University of Puerto Rico, 2015)
The Internet of Things (IoT) is growing
stronger every year, as developers we need to get
ready for the challenges ahead of us. It is getting
hard for software developers to have a starting point
for implementing new ...
Evaluating Tools and Technologies used in Digital Forensics
(Polytechnic University of Puerto Rico, 2015)
The use of the Internet and digital
gadgets in our daily lives has increased significantly
in recent years. This explosive growth has impacted
society in both a positive and negative manner. With
the advancements of ...
Unified Risk List for Electronically Stored Information Subject to eDiscovery in Cloud Computing
(Polytechnic University of Puerto Rico, 2015)
Electronic discovery is the process of
production of electronically stored information
(ESI) for use in legal court or corporate
investigations. When eDiscovery is performed over
a cloud service, the amount of risks ...
A Forensic Memory Image Acquisition Protocol Based on Windows Memory Analysis
(Polytechnic University of Puerto Rico, 2012)
Computer Forensics has become an extremely important evidence gathering and analysis field in the modern electronic driven world. Most of the evidence acquired, preserved, processed and analyzed originates from long term ...
Enhancing Mobile Enrollment Procedure using sProject
(Polytechnic University of Puerto Rico, 2014)
The sProject is an umbrella that covers
three major components. Those components are
Image Mapping Tool, Mapping Logic and Image
Conversion. The Image Mapping Tool main goal is
to configure positions on top of an image ...
Optimizing the Method for Finding an Optimal Solution of a Constraint Satisfaction Problem
(Polytechnic University of Puerto Rico, 2012)
Abstract — Constraint satisfaction problems are the subject of intense research in both artificial intelligence and operations research. They are mathematical problems defined as a set of objects whose state must satisfy ...
Event Manager Web Application
(Polytechnic University of Puerto Rico, 2017)
Events can bring a lot of benefits the
many people. Events can be used to strengthen the
community, build trust, generate revenue, raise
money, showcase your venue, build brand
recognition, recruitment, collect data, ...