Sök:

Sökresultat:

416 Uppsatser om Parallel attack - Sida 1 av 28

NATO:s luftkrig i Kosovo utifrån Wardens teorier

John A. Warden III is one the most mentioned air power theoretic of his time.He has written a number of theories concerning air power and the best way to use this to win wars.The author of this paper gives a short resume of what he consider are the central thoughts in John Warden´s theories. These thoughts result in four factors; Enemy as a system, centre of gravity, Parallel attack/concentration and finally air superiority. These factors are then being used to inves-tigate if NATO used Wardens theories during the Kosovo war in 1999.The reason for the author to choose the Kosovo war specifically is due to the fact that NATO during the war only used air power as an instrument to get Serbia´s president Milosevic to the negotiation table but also the fact that this would turn out to be quite a challenge for NATO.The conclusion is that out of the four factors only one is traceable throughout the entire operation, and that is air superiority. Regarding the other three factors they can only be found in parts of the operation..

Parallellimport och utvecklingen av EG:s konkurrensrätt

Parallel imports often lead to lowered prices and is therefore regarded as good from a consumer's point of view. From a business'point of view this is not always the case. When do parallel imports occur? Is it possible to prevent parallel imports to protect an introduction of a product in another member state? The purpose of this thesis is to present situations where parallel imports occur and to see if it is compatible with competition law to prevent parallel imports. Furthermore I will analyse the future development after the group exemption of vertical restraints enters into force in June 2000.

Förbud mot dubbelregistrering av fartyg

In a recently published official Report from the Swedish Government (SOU 2010:73) a leg- islative proposal has been introduced. Its main purpose is to prevent parallel registrations of ships that are bareboat chartered to other countries. The legislative proposal claims that by preventing parallel registration of ships the Swedish Maritime Code will better corre- spond with the UN convention on the law of the sea.The UN convention on the law of the sea clearly states that ships are forbidden to fly two flags. There is however no restriction concerning parallel registration, simultaneously, in two registers. A ship that is bareboat chartered out from Sweden does not fulfil criteria re- quired in order to be deregistered, according to the Swedish maritime code.

Operation Rolling Thunder

This paper provides an explanation of the concepts John A. Warden III describes regarding the use of air power and if this theory can be found, within the confines of an unconventional war. The U.S. ability to air power is overwhelming, however the right kind of warfare can force this great power to abandon their military and political objectives by exhausting its resources over time as it becomes increasingly costly, both economically, politically and morally, to wage war. The research deals with operation Rolling Thunder and John A.

Inloggning : Lösenordskryptering och Brute force attack

This report is the result of a sub-project of a larger project to create a platform formathematical education. The sub-project focuses on authentication with associ-ated security, where security is emphasized. The project environment is Java EE 6where GlassFish 4.0 acts as the server. The project has been divided into threeparts; password encryption, Java EE authentication and brute force attack. Thepassword encryption part focuses on examining different hash functions executionspeed, the result shows that none of the examined hash algorithms is suitable fordirect use.

Kvinna Och Kropp. Två hinder vid en hjärtinfarkt

Purpose: To describe the gender impact on the situation of women at the onset of myocardial infarction and describe why women wait to contact medical caregivers when showing symptoms of myocardial infarction. Method: Literature review with a descriptive design. Articles was retrieved from PudMed and Cinahl. Findings: Women are affected more than men of the so-called atypical symptoms of a heart attack. This means that they can not always relate the symptoms to a heart attack.

Levo : En lyftanordning för höjdjustering av manuella gåbarrar

The parallel bars is used in physical therapy and is mainly used for patients who have to train walking and balance after a stroke or an operation. It consists of two long handrails with two legs on each handrail. These legs go down into two ground-plates and are locked at the wanted height with a pin. The parallel bars is an appreciated device and is used on a daily basis in many care units.The main issue with the manual parallel bars is that it is very difficult and heavy for a single person to adjust the height of it. If a larger adjustment of the height has to be done, the legs have to be adjusted one at a time otherwise the they will be locked.

Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup

Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks..

Successiv avtalsbundenhet : En beskrivning av modellen och dess närvaro i svensk rättspraxis

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Strategisk bombning i cyberspace

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Överbelastningsattacker genom öppna reläer

Detta arbete behandlar en specifik typ av överbelastningsattack som blir allt mer populär. Dessa attacker utförs genom öppna reläer med syftet att få ut en avsevärt mycket högre effekt än den som annars är uppnåbar. Granskning av attacker utförda genom tjänsterna DNS och NTP har utförts med syftet att ge en klar bild av hur allvarligt hotet är och även klargöra hur en systemadministratör kan säkra tjänsterna för att skydda både sina egna och andras resurser. Resultaten av undersökningar visar att en attack utförd genom en DNS-tjänst ger under optimala förhållanden en amplifikationsfaktor av "102.4" och en attack genom en NTP-tjänst ger under optimala förhållanden en amplifikationsfaktor av "229.16". Resultaten visar även att problemet kan lösas helt eller delvis genom att begränsa tillåtna nätverk eller stänga av rekursion i DNS och kommandon i NTP..

PATTERN ATTACK : Mönster, reklam och egna uttryck i det offentliga rummet

Under mina tre år på Konstfack har jag arbetat fram en värld av ickefigurativa mönster. I mitt examensarbete låter jag mönstren röra sig bortom skolans väggar och ut i det offentliga rummet. Genom att titta på hur reklamen idag tar plats i staden, på gator, väggar, tidningar och i kollektivtrafiken har jag hittat en för mig ny exponeringsyta.Mitt arbete består av två delar:I min processbeskrivning utforskar jag ickefigurativa mönsterbilders värde och roll i både konstnärliga och vetenskapliga sammanhang. Jag har också studerat hur reklamen tar plats i vårt offentliga rum. I mitt praktiska konstnärliga arbete har jag använt dessa teoretiska kunskaper tillsammans med en grupp tillvägagångssätt som jag gett samlingsnamnet PATTERN ATTACK.I mitt konstnärliga arbete presenterar jag hur olika PATTERN ATTACKs kan gå tillväga. .

Stuxnet-attacken mot Iran : Strukturell realism i informationsrevolutionens tidsålder

This study aims to explain the Stuxnet-attack against Iran in 2009-2010 by using the IR-theory of structural realism. By doing so the theory also faces the challenge of the impact of the information revolution on security and international relations. The structural realism that is at hand is that of Kenneth Waltz and his Theory of International Politics from 1979.The study reaches the conclusion that Waltzs focus on the structure of the international system and the distribution of capabilities applies well to the case of Stuxnet as a cyber attack. The creators of the sophisticated Stuxnet, USA and Israel, also indicates that when it comes to this certain aspect of the information revolution and IR, states seem to still be the main actor. Finally the character of one of the major features of the Stuxnet-attack; the internet, is shown to have an anarchic structure that fits well as an extension of the realist view of the international system..

Black July: En etnisk majoritets attack på en etnisk minoritet

Vår avsikt är att i denna uppsats utifrån Donald L. Horowitzs teori om etniska konflikter, förklara varför etniska majoriteter attackerar etniska minoriteter. Vi utför en fallstudie av Sri Lanka och av händelserna innan juli 1983 dvs. det som ledde fram till upploppet, ?Black July?.

Attack och farväl : en historiografisk diskussion rörande Erik Pukes eftermäle

Attack och farväl är ett historiografiskt arbete. I arbetet presenteras läsaren för grunderna till varför två till synes samstämmigt agerande individer kommer att skildras på högst olikartade vis. Som central gestalt för studien står upprorsledaren Erik Puke, och i diskussionerna lyfts även dennes allierade Engelbrekt upp för att visa på en kontrast i hur senare skildringar utformats. Analysen bygger på historiografisk litteratur från 1900-talet. Arbetets art är utformat till att fungera som en introduktion för vidare studier inom området..

1 Nästa sida ->