DSpace Coleção: Curso extinto.Curso extinto.http://repositorio.ufgd.edu.br/jspui/handle/prefix/43172024-03-28T22:09:46Z2024-03-28T22:09:46ZComparativo entre as metodologias ágeis XP e ScrumConceição Sobrinho, Josian dahttp://repositorio.ufgd.edu.br/jspui/handle/prefix/43252023-09-14T06:50:39Z2010-12-14T00:00:00ZTítulo: Comparativo entre as metodologias ágeis XP e Scrum
Autor(es): Conceição Sobrinho, Josian da
Primeiro Orientador: Barvinski, Carla Adriana
Editor: Universidade Federal da Grande Dourados
Tipo: Trabalho de Conclusão de Curso2010-12-14T00:00:00ZProposta de modelo de processo para filmes de animação tridimensional por computadorKay, Viviane Naomihttp://repositorio.ufgd.edu.br/jspui/handle/prefix/43242023-09-14T06:50:39Z2009-01-01T00:00:00ZTítulo: Proposta de modelo de processo para filmes de animação tridimensional por computador
Autor(es): Kay, Viviane Naomi
Primeiro Orientador: Cruz, Adailton José Alves da
Editor: Universidade Federal da Grande Dourados
Tipo: Trabalho de Conclusão de Curso2009-01-01T00:00:00ZNavegação de robôs móveis no simulador player/stageSilva, Giovani Rudson daSilva, Renato Lourenço dahttp://repositorio.ufgd.edu.br/jspui/handle/prefix/43232023-09-14T06:48:26Z2009-11-23T00:00:00ZTítulo: Navegação de robôs móveis no simulador player/stage
Autor(es): Silva, Giovani Rudson da; Silva, Renato Lourenço da
Primeiro Orientador: Sacchi, Rodrigo Porfírio da Silva
Editor: Universidade Federal da Grande Dourados
Tipo: Trabalho de Conclusão de Curso2009-11-23T00:00:00ZTestes de força bruta em protocolos de criptografia de redes wirelessCardoso, Edilene Virgulinahttp://repositorio.ufgd.edu.br/jspui/handle/prefix/43222023-09-14T06:48:25Z2009-12-23T00:00:00ZTítulo: Testes de força bruta em protocolos de criptografia de redes wireless
Autor(es): Cardoso, Edilene Virgulina
Primeiro Orientador: Moro, Marcos Paulo
Abstract: The growth of wireless networks (Wireless Network) introduces the world supply of quality service, which is closely determined the issue of security. Security on your main point is flawed with regard to integral security of wireless networks, for invasions in various formats were found. This deficiency motivates the study of security protocols used in wireless networks, then were analyzed in the security arrangements with their respective advantages and disadvantages of use, seeking to obtain security and integrity of information that travels on the network. These protocols use cryptographic techniques to achieve their goals, such as confidentiality, authentication, data integrity, however, these cryptographic protocols are subject to errors in its development, making them vulnerable to attack. Protocols in this work are highlighted WEP, WPA and WPA2. This paper seeks to hang the manner in which encryption and decryption of data are performed, the algorithms used, and where the failure occurs in the protocols studied. At the end of the study, practice tests were performed, demonstrating the vulnerabilities, weaknesses and how it can be done to break the key attacks using tools found on the Internet. Finally, we describe the types of passwords that must be used in wireless networks, in order to block network Access by unauthorized persons.
Editor: Universidade Federal da Grande Dourados
Tipo: Trabalho de Conclusão de Curso2009-12-23T00:00:00Z