Sök:

Sökresultat:

2287 Uppsatser om Computer Network Attack - Sida 7 av 153

Hela min själ är fylld utav sår : En studie utifrån kvinnors egna upplevelser av att leva med självskadebeteende

This study intends to illuminate women?s experiences of their own self-harm. Self-harm is mostly associated with women and research shows that women mostly are over-represented. This study describes women?s experiences about their self-harm but also how they perceive the elements around them during their illness.

Systematisering av information på företag en fallstudie

The purpose of this paper is to investigate how a small company manages its information, primarily the organization of digital documents. The two dominating themes are classification and information politics, the former in the context of a corporate environment and the latter to help us to describe the situation at the company. The method used has involved observation of the company's current computer network structure and also interviews with six employees at different levels in various departments at the company. The result of our investigation has been the realization that, although logical structure is important when organizing documents in a digital environment, it is also necessary to have rules regarding its implementation..

Analys och omarbetning av ett företagsnätverk

In this paper, a small business network with around 30 users is analyzed with respect to security, performance and usability. Based on this analysis, two suggestions on how to solve the problems listed are given. The first suggestion focus on keeping a low budget, while the other tries to deal with the problems more thoroughly. One advantage of the first suggestion is, in addition to not straining the company's budget more than nessecary, it does not involve too great changes in the way the network is used and administered. On the other hand, the smaller budget leads to certain compromises, and there is a risk that similar problems occur again if, for example, the company would grow.

Revisorers perspektiv på implementeringen av ett nytt regelverk : ? fallet komponentavskrivningar enligt regelverket K3

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

Språkstöd i distanslaboratoriet på BTH

To study and laborate at distance, its necessary that the coursematerial is accessible via internet. Teaching at more languages than swedish bocomes more common, why the information of courses needs to exist at several languages. As teacher, you need a way to publish and edit material of a course. It also has to be easy for the students to find the information. The distance laboratory have developed an administrative websystem that handles programme, courses and students, but misses the possibility for teachers to change content at the webpages and publish new coursematerial on a way..

Nätverket som varumärke : En fallstudie av Glasriket

Destination branding is becoming increasingly acknowledged by regions working with tourism. Underlying is the fragmented web of actors in the supply chain of which the tourism product consists of. The main purpose of our thesis was, from a management perspective, to gain an understanding and describing how a network and the actors within it can build a consistent brand. We therefore chose to make a case study research on The Kingdom of Chrystal, or Glasriket, which is one of the most famous tourist destinations in Sweden. Our research is based on theoretical and empirical data.

"Fenomenalt" eller "De borde kunna mer om datorer" : En undersökning om datorhjälpen på högskolebibliotek

"Outstanding" or "They ought to know more about computers" : A study on computer support at university libraries.The main purpose of this study is to investigate the support computer users are given at university libraries. Further, the aim is to find out if the users thought they received the support that they needed. The study is carried out at two different university libraries. The data is obtained through interviews with the librarians, observations of the daily work at the information counters and questionnaires handled out to the users.The study indicates that variables such as knowledge, time and equipment play a central role in making the computer support successive. To a great extent the computer support is synonymous with information search, but it also deals with word processing and technical support connected with computer errors.

Styrmekanismers funktion i relationsbyggande: En studie av ett relationsnätverk i verkstadsindustrin

The aim of this study has been to examine the role of control mechanisms when it comes to building relationships in a small business network. In order to reach this goal, we have performed a case study of a Swedish supplier of machines to the engineering industry, which acts as the exclusive representative of a foreign manufacturer on the Swedish market. Main results: A number of control mechanisms, both formal and informal, could be identified in the network. Their specific use, as well as relative importance differ between different actors in the network. In general, the importance of formal control mechanisms decreases as the relationship evolves over time and the importance of informal ones, mainly trust, increases in a corresponding manner..

Gränslösa nätverk : En studie av företags internationalisering till Kina ur ett nätverksperspektiv

This thesis follows a qualitative method and aim to describe firms? international business at an emerging market seen from a network perspective. The purpose of the thesis is to study in what way business relations and networks influence the process of internationalization and describe the way in which companies handle the external network in relation to acquisitions. Further does our purpose include analyzing if a firm?s network may be the main factor for why international business occurs.


Nätnyttomodellens fall och framtidens reglering av eltransmissionstariffer : Tidigare meningsskiljaktigheter samt undersökning av förutsättningar för framtida reglering

The main ambition of this degree project is to illustrate the fundamental problems of today?s electric tariff regulation and the usage of the analyzing tool; The Network Tariff Model. There is a further discussion of potential problems and clear improvements of the 2012 years proposed network tariff regulation. Interviews have been conducted with specific network companies and Energimarknadsinspektionen. The proposed regulation of 2012 is discussed from the government?s proposition.This paper clearly shows that the authority´s work has been conducted in a very unprofessional manner during the period of The Network Tariff Model.

Editing, Streaming and Playing of MPEG-4 Facial Animations

Computer animated faces have found their way into a wide variety of areas. Starting from entertainment like computer games, through television and films to user interfaces using ?talking heads?. Animated faces are also becoming popular in web applications in form of human-like assistants or newsreaders. This thesis presents a few aspects of dealing with human face animations, namely: editing, playing and transmitting such animations.

Kommunikation i multiagentsystem

Communication is an important part of any multi-agent system. There are different ways of communicating and they have different effects on a multi-agent system. This project describes and evaluates two different ways of communication, implicit and explicit. To compare the two methods, two experiments have been executed. The result of the experiments have been compared and discussed.

Lokal Nätverkssäkerhet - experimentell studie av Microsoft Network Access Protection

Den här rapporten beskriver en experimentell studie av Microsoft Network Protection (NAP) och är ämnad för att utvärdera hur mogen tekniken är för att implementeras i en aktiv nätverksmiljö. För att göra studien tog vi hjälp av gymnasieskolan John Bauer i Kalmar. Tester har utförts med DHCP-framtvingning och 802. 1x-framtvingning, dessa är två av NAPs fyra olika framtvingande funktioner. En mindre analys av skolans switchkonfigurationer och interna säkerhet har även gjorts på John Bauers begäran.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

<- Föregående sida 7 Nästa sida ->