Sökresultat:
2745 Uppsatser om Network Access Protection - Sida 2 av 183
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Framtagning av reläskyddsinställningar för en transformatorstation
A substation must be properly protected against lightning and other external effects to the equipment in the station or staff, for that we use relay protection. They should also protect against internal errors which may occur as ground faults. There are different types of protection relays, but most common are overcurrent-, distance-, residual current- and differential protection.The purpose of this thesis was to deepen our knowledge of relay protection and to use the theoretical knowledge we got from the university studies in the work process. In the process we discovered which parameters were the most essential and calculated these for all relay protections on the substation. We also carry out a comparison between two brands of relay protection, ABB and Alstom.During our work we will test and simulate the over-current relays in a program called NEPLAN, the program will also calculate the fault currents.
Näthat : I gråzonen mellan straffrättsligt ansvar och yttrandefriheten
The following thesis concerns the conceptualization of openness within the open access movement. Open accesscan be understood as a phenomenon or a movement that aims at changing the current system of scholarly communication.Consequentially, the movements goals arose in relation to the escalating serials crisis in scholarly communicationand the increasing power of commercial publishers. The purpose of the thesis is to study three centralopen access declarations with the aim of uncovering the different conceptualizations of openness found withinthese texts. Leaning on the theoretical position known as actor-network theory, the declarations role within a surroundingnetwork is explored by focusing on how openness as a concept has been produced and reproduced bycentral actors. Two overarching questions frames the study: How is openness conceptualized within the declarations?And how can openness, as a concept, be understood as an effect generated by a larger network?The first part of the study focuses on the first question.
Ytterväggar och bjälklag för flerbostadshus
The thesis demonstrates protection solutions that can be suitable for a camp during internationalmissions in order to resist complex threats. The threats could consist of small arms, machineguns,RPG 7, anti armour missiles, mortar, artillery, HPM-weapons, car bombs, biological and chemicalweapons as well as sabotage and theft. It?s not the technology itself that makes the threat scenariocomplex it?s the way the opponent acts during the operations. The opponent acts usually incivilian clothes and therefore he is difficult to distinguish from other civilians.
DNS prestanda
Use of computers and computer networks is nowadays a part of everyday life. You do not use them only at home when you sit at you computer, but you can use them all the time everywhere. This can involve everything from surf to any website when you are at home, to checking your email on your mobile when you are on your way to work. Most people do not think about how it really works when they try to access a web page by typing the address into their browser, but something that most people probably notice is how long it can sometimes take to access a web page.All items which are directly connected to the IP network have a unique IP address that is used to make it possible to communicate. The IP address is either a period separated sequence of digits representing 32 bits or a colon separated sequence of digits representing 128 bits, depending on whether the address is an IPv4 or IPv6 address.
Quartzene i gips : Densitet och hållfasthet
A substation must be properly protected against lightning and other external effects to the equipment in the station or staff, for that we use relay protection. They should also protect against internal errors which may occur as ground faults. There are different types of protection relays, but most common are overcurrent-, distance-, residual current- and differential protection.The purpose of this thesis was to deepen our knowledge of relay protection and to use the theoretical knowledge we got from the university studies in the work process. In the process we discovered which parameters were the most essential and calculated these for all relay protections on the substation. We also carry out a comparison between two brands of relay protection, ABB and Alstom.During our work we will test and simulate the over-current relays in a program called NEPLAN, the program will also calculate the fault currents.
Strategisk/taktisk vägplan :
The purpose of this thesis was to create a strategic/tactical road access plan. This was done by designing an analytical method which gives the road manager a template to create long-term road access plans. The analytical method will help to identify and appraise roads to be upgraded and give information when it is time for building new roads.
The study method involved developing an analytical method. The method was comprised of five main parts: the harvest plan, analysis of the road network, transport costs, quality and storage costs and finally, identification of investment alternatives.
Vems landskap ska förändras för att öka den biologiska mångfalden? : En studie av skillnaderna i odlingslandskapets konnektivitet med avseende på två skyddsvärda arter med olika preferenser
Organisms relevant for nature conservation dont follow administrative borders. Because of this there is a need for a landscape perspective within conservation and planning, and a need for the species of interest to have legal protection. Network analysis adapted for ecological purposes has grown to become a powerful tool for studying and communicating the relationships between species dispersion and access to habitat. In this study the following question is posed: How is the Osmoderma eremita and the Pernis apivorus dispersal possibilities in the small scale cultivated landscape of Borås affected by exploitation in respect to a) dispersal ability, b) habitat quality, c) position of habitat patches in a network? The analysis were based on municipal and regional nature conservation data, which in due to confidentiality is not accounted for in the report by maps, coordinates, etc.
Tillgänglighet med kollektivtrafik - GIS-analys av Umeåregionen
The purpose of this study is to examine the accessibility with public transportation in the case of the Umeå Region in northern Sweden. This is done by GIS network analysis where both access to transit stops, as well as access by public transport from stops to destinations is examined. An accessibility index is created from transit frequency and travel times to destinations. The results is compared with population register data to calculate what shares of the population has which levels of accessibility with public transportation. In the Umeå Region there are different levels of accessibility by public transport for different parts of the region, where transit stops in the most densely populated areas has the highest levels of accessibility, as well as stations along the railroads.
Kameraövervakning : En juridisk analys
Camera surveillance can provide good protection against certain types of crime, but it can also invade our privacy. The County Administrative Board monitors compliance with the rules by visiting those places to which the general public has access. They have to issue permits before general camera surveillance to those places which the general public has access. In certain cases, in stores for example, general camera surveillance is permitted only if the Country Administrative Board is notified in advance. The Data Inspection Board is a public authority and responsible for the camera surveillance for those places to which the public not has access.
Urval och risk i informell finansiering av entreprenörsprojekt : En fallstudie av Firm Factory Network
This thesis discusses various approaches that venture capitalists have when evaluating investment prospects. The thesis is a case study of the business angel network Firm Factory Network. The empirical material is based on an extensive interview with Firm Factory CEO Daniel Kaplan. Our conclusion is that Firm Factory Network uses both informal and formal methods when they evaluate interesting prospects..
Bibliotekariers syn på Open access : Enkätundersökning bland bibliotek med inriktning teknik, naturvetenskap, medicin och farmaci
Open access to scientific literature on Internet is a concept which is supposed to change librarians' work. The aim of the thesis was to examine librarians' perception of Open access. A questionnaire survey was conducted among librarians at libraries with specialisation in technique, natural sciences, medicine and pharmacy in Sweden. Even though Open access can be regarded as an alarming for librarians' work, the results of the survey showed that the future of the librarians' profession can be positive if they flexibly adopt their work routines according to changes in publication forms and library users' needs..
Skyddet av en camp vid internationella insatser mot komplexa hot
The thesis demonstrates protection solutions that can be suitable for a camp during internationalmissions in order to resist complex threats. The threats could consist of small arms, machineguns,RPG 7, anti armour missiles, mortar, artillery, HPM-weapons, car bombs, biological and chemicalweapons as well as sabotage and theft. It?s not the technology itself that makes the threat scenariocomplex it?s the way the opponent acts during the operations. The opponent acts usually incivilian clothes and therefore he is difficult to distinguish from other civilians.
Användning av geografiskt informationssystem (GIS) vid studier av nötkreatur i landskapet - en pilotstudie :
The Animal Protection Agency was in 2006, commissioned by the Government to: Evaluate how free range animals in the winter, can be kept and managed with special emphasis to animal welfare. The Animal Protection Agency was closed later in 2006 and the commission moved to the Swedish Board of Agriculture. The keeping of free range out wintered cattle, certain basic requirement are needed: by regulation, cattle should have access to a lying hall or other building that gives protection against aversive weather and wind and should offer a dry and clean lying area. There is a possibility for farmers that get an exemption from this regulation. But cases regarding farms which have had difficulties for this exemption has led to a discussion about if the animals can get the same protection in the nature which is comparable to a lying- hall.
Politiska nätverk och Nord Stream : En möjlighet att vara med och påverka
AbstractPaper in political science, C-level, by Lars A Roos, spring semester 2007. Tutor: Susan Marton. ?Policy networks and Nord Stream.?The purpose of this paper is to examine how the government and interest groups have been working together to commonly prevent the building of a gas pipeline in the Baltic Sea. To do this, a comprehensive question how does the government and the involved interest groups work together in policy networks? has been broken down to three more specific questions: (1) Can the cooperation between the government and the interest groups be placed within the frame of a issue network or a policy community? (2) Has the cooperation between the government and the interest groups contributed to new tools for the government to prevent the gas pipeline? (3) If the answer is yes to the second question then, which are these new tools?My examination is a case study of the policy network that exists around the Swedish actors in the case of the Baltic Sea gas pipeline.