Dissertations / Theses on the topic 'Microsoft file'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 dissertations / theses for your research on the topic 'Microsoft file.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chong, Yew Meng. "Microsoft Windows tutorial." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834636.
Full textDepartment of Computer Science
Atger, Dominique. "A Turing machines simulator using a Microsoft Windows' interface." Virtual Press, 1993. http://liblink.bsu.edu/uhtbin/catkey/865965.
Full textDepartment of Computer Science
Lambert, Aric Brian. "A controller area network simulation application program for Microsoft Windows." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/958782.
Full textDepartment of Computer Science
Musatoiu, Mihai. "An approach to choosing the right distributed file system : Microsoft DFS vs. Hadoop DFS." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-844.
Full textLi, Mingrui. "On the size of induced subgraphs of hypercubes and a graphical user interface to graph theory." Virtual Press, 1993. http://liblink.bsu.edu/uhtbin/catkey/879847.
Full textDepartment of Computer Science
Zakumba, Lwazi Xolisile. "A case study on the role of excel as a teaching and learning tool in influencing learners' interpretation of functions." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1018756.
Full textCarmichael, Tammy. "Teaching Two Children with Autism to Follow a Computer-Mediated Activity Schedule Utilizing Microsoft® PowerPoint® Presentation Software." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4896/.
Full textMurdock, Jennifer. "An Evaluation of the Accuracy of PowerPoint Prescriptions." Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/784.
Full textBachelors
Arts and Sciences
Organizational Communication
Tsegaye, Melekam Asrat. "A comparative study of the Linux and windows device driver architecture with a focus on IEEE1394 (high speed serial bus) drivers." Thesis, Rhodes University, 2004. http://hdl.handle.net/10962/d1004829.
Full textMobarak, Barbara Ann. "The development of a computer literacy curriculum for California charter schools." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2683.
Full textSwales, Dylan. "A comparison of web-based technologies to serve images from an Oracle9i database." Thesis, Rhodes University, 2004. http://hdl.handle.net/10962/d1004380.
Full textKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Xie, Liquan. "Dynamic Report Generator." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2547.
Full textHula, Miroslav. "Analýza registrů Microsoft Windows." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236938.
Full textUppströmer, Viktor, and Henning Råberg. "Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18337.
Full textCyber attacks raise a high threat for companies and organisations worldwide. With the cost of a data breach reaching $3.86million on average, the demand is high fora rapid solution to detect cyber attacks as early as possible. Advanced persistent threats (APT) are sophisticated cyber attacks which have long persistence inside the network. During an APT, the attacker will spread its foothold over the network. This stage, which is one of the most critical steps in an APT, is called lateral movement. The purpose of the thesis is to investigate lateral movement detection with a machine learning approach. Five machine learning algorithms are compared using repeated cross-validation followed statistical testing to determine the best performing algorithm and feature importance. Features used for learning the classifiers are extracted from Active Directory log entries that relate to each other, with a similar workstation, IP, or account name. These features are the basis of a semi-synthetic dataset, which consists of a multiclass classification problem. The experiment concludes that all five algorithms perform with an accuracy of 0.998. RF displays the highest f1-score (0.88) and recall (0.858), SVM performs the best with the performance metric precision (0.972), and DT has the lowest computational cost (1237ms). Based on these results, the thesis concludes that the algorithms RF, SVM, and DT perform best in different scenarios. For instance, SVM should be used if a low amount of false positives is favoured. If the general and balanced performance of multiple metrics is preferred, then RF will perform best. The results also conclude that a significant amount of the examined features can be disregarded in future experiments, as they do not impact the performance of either classifier.
McCaughey, John Paul Jr. "Smarter Than We Are Wise." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339644686.
Full textViktorin, Martin. "Programová podpora definování projektu s využitím LFM (Logical Frame Method)." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235896.
Full textHsu, Feng-chih, and 許峰誌. "Steganographic Research on Commonly-Used Document - Microsoft Word Document File." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/62426964015311705764.
Full text逢甲大學
資訊工程所
96
Many results have been obtained for data hiding in some specific files, especially for different image file formats. On the other hand, there is very few work on document files. In this work, we plan to study data hiding on Word file; this is most common document file used in our daily life. We propose some new schemes that allow us to hide data in this type of file. Together with those known techniques for images, our work will provide a data hiding frame that makes detection much more difficult for Word document file.
Joubert, Tinus. "Auditing Windows 2000 : methodologies and issues." Thesis, 2012. http://hdl.handle.net/10210/4338.
Full textJohnston, James. "A framework for secure human computer interaction." Thesis, 2008. http://hdl.handle.net/10210/493.
Full textLabuschagne, L., Prof.
Zhang, Weiwei. "Technology in college classrooms : an action research examining the use of PowerPoint in ELL classrooms." Thesis, 2012. http://hdl.handle.net/1957/29048.
Full textGraduation date: 2012