Skip to main content

Research Repository

Advanced Search

Outputs (17)

Sketch of Tai Nan Street (2013)
Other
Cheng, L. (2013). Sketch of Tai Nan Street. Hong Kong

大南街是位於深水埗的街道,漫步此道,就像走過歷史,看到當年的香港。這裡沒甚麼歷史大事件,而是極盛極衰的環境下生活的人們,堅守本分,這些片段來得更誠實真摯。樂曲將會以單簧管、中提琴及低音大提琴演奏,凝聚這細緻和諧的一幕。 Read More about Sketch of Tai Nan Street.

Evidence to the Justice Committee at the Scottish Parliament. (2011)
Other
Buchanan, W. J. (2011). Evidence to the Justice Committee at the Scottish Parliament

On 20 September 2011, Bill gave evidence at Offensive Behaviour at Football and Threatening Communications Bill: http://news.bbc.co.uk/democracylive/hi/scotland/newsid_9594000/9594710.stm?t=1376s

Advanced security and network forensics: network forensics. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. [Educational toolkit]. Edinburgh Napier University

3 NETWORK FORENSICS 3.1 Objectives 3.2 Introduction 3.3 The key protocols 3.4 Ethernet, IP and TCP headers 3.5 TCP connection 3.6 ARP 3.7 SYN 3.8 Application Layer Analysis - FTP 3.9 ICMP 3.10 DNS 3.11 Port scan 3.12 SYN flood... Read More about Advanced security and network forensics: network forensics..

Advanced security and network forensics: obfuscation and data hiding. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. [Educational resource]. Edinburgh Napier University

4 DATA HIDING AND OBFUSCATION 4.1 Objectives 4.2 Introduction 4.3 Obfuscation using Encryption Private-key data hiding Public-key data hiding Hashing Encoding Ex-OR encoding Coding 4.4 Obfuscation through tunneling 4.5 Covert ch... Read More about Advanced security and network forensics: obfuscation and data hiding..

Advanced security and network forensics: web Infrastructures. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. [Educational Resource]. Edinburgh Napier University

5 WEB INFRASTRUCTURES 5.1 Objectives 5.2 Introduction 5.3 Identity 2.0 5.4 SOAP over HTTP 5.5 LDAP X.500 5.6 Authentication Infrastructures 5.7 802.1x Authentication Infrastructure Authentication techniques Security weaknesses of... Read More about Advanced security and network forensics: web Infrastructures..