Theseus - Selaus nimekkeen mukaan
Viitteet 30738-30757 / 289953
-
CVK:n käyttö lasten akuutin lymfoblastileukemian (ALL) hoidossa : Opetusvideon laatiminen Oulun ammattikorkeakoululle opetuskäyttöön
(Oulun ammattikorkeakoulu, 2018)Opinnäytetyömme on toteutettu yhteistyössä Oulun ammattikorkeakoulun kanssa. Aiheemme valikoitui OAMK:n tarpeen ja oman mielenkiintomme perusteella. Halusimme toteuttaa opinnäytetyömme projektiluonteisesti, ja opetusvideon ... -
CVP and Sensitive analysis of Ntow Poultry farm : Layer Production
(Seinäjoen ammattikorkeakoulu, 2016)This thesis is written to analyse the cost, volume of activities and profit of Ntow Samuel, a poultry farmer to aid in making some strategic decisions regarding his new business area of raising 1000 poultry birds for eggs. ... -
CWDM-järjestelmien vertailu
(Metropolia Ammattikorkeakoulu, 2009)Tämä työ on tehty tilanteeseen, jossa kuituparin olemassa olevaa kapasiteettia halutaan hyödyntää mahdollisimman paljon. Asian käsittely on aloitettu käymällä läpi kuidun ominaisuudet. Työssä on tarkasteltu 1980-luvun ... -
CWDM-tekniikan toteutus Metropolian runkoverkossa
(Metropolia Ammattikorkeakoulu, 2009)Tämän työn tarkoituksena oli vertailla eri yrityksien epävirallisia tarjouksia ja ehdotuksia Metropolia Ammattikorkeakoulu Oy:n valokuiturunkoverkossa käytettävästä aallonpituuskanavointilaitteistosta. Insinöörityötä voidaan ... -
CXT-köysinostimien nostoapuväline
(Tampereen ammattikorkeakoulu, 2013)Työn tarkoituksena oli suunnitella asiakkaalle nostoapuväline, jolla nostetaan CXT:N QA-QC - kokoluokkien köysinostimia testipukille. Apuvälineen mitat määräytyivät halutusta nostotavasta ja nostettavien nostimien mitoista ... -
CY8CKIT-001 PSoC Development Kit-kehitysalusta
(Tampereen ammattikorkeakoulu, 2013)CY8CKIT-001 PSoC Development Kit on Cypress Semiconductorsin valmistama kehitysalusta, jonka tarkoituksena on ollut toimia prototyyppialustana PSoC-arkkitehtuuria käyttävien sovellusten suunnitteluun ja testaukseen. ... -
Cyber Criminology : The Mentality, Aim and Vision behind Cybercrime
(Metropolia Ammattikorkeakoulu, 2015)The goal of the project is to gain a good understanding of what kind of different cyberattacks are carried out in modern times and how by being cautious, one can avoid becoming a victim. This study will also shed some light ... -
CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY
(2022)The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ... -
Cyber Incident Response in Public Cloud: implications of modern cloud computing characteristics for cyber incident response
(2023)Modern cloud computing has fundamentally changed how IT-resources are consumed by organizations and end-users. The cloud is also defined by some of its key characteristics: on-demand self-service, broad network access, ... -
Cyber intelligence for anti-money laundering, counter-terrorism financing and know your customer
(2024)Tämän hetken yhteiskunnassa finanssialan säätely kasvoi kokoajan, erityisesti asiakkaan tuntemiseen (KYC) ja rahanpesun estämiseen (AML) liittyen. Tähän säätelyyn liittyvät toimenpiteet vaativat kokoajan enemmän henkilöstöä ... -
Cyber Range Technical Federation: Case Flagship 1 Exercise
Advanced Sciences and Technologies for Security Applications (Springer, 2023)Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of ... -
Cyber range: preparing for crisis or something just for technical people?
(Academic conferences international, 2021)Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ... -
Cyber Readiness in Finnish Contract Fire Brigades
(2021)Sopimuspalokunnilla on merkittävä rooli pelastustoimen järjestämisessä Suomessa. Harvaan asutulla seudulla sopimuspalokunta on kohteen ensimmäisenä saavuttava pelastustoimen yksikkö, usein myös ainoa. Taajama-alueella ... -
Cyber Secure Remote Access to Critical Infrastructure
(2020)This thesis was done on behalf of the Mobilisation & Support team within the company Wärtsilä. The goal of this thesis was to find what to implement in Wärtsilä’s network architecture for remote access connections to ... -
Cyber Security : Home User's Perspective
(Lapin ammattikorkeakoulu, 2014)Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and ... -
Cyber Security and Trust: Tools for Multi-agency Cooperation between Public Authorities
(SCITEPRESS Science and Technology Publications, 2015)Functions vital to society, such as public protection and disaster relief (PPDR), are increasingly dependent on networks, electricity and data processing infrastructure. Incidents such as natural hazards and organized crime ... -
Cyber Security Exercise Modeling & Tracking : Building RESTful Service and MVC Web Application for Visualization and Tracking of Cyber Security Exercise Execution using Modern Web Techniques and Standards
(Jyväskylän ammattikorkeakoulu, 2016)JYVSECTEC has a cyber range where cyber defense exercises are held. Presently there was no graphical interface for participating teams to visualize CDX networks for tagging threats to them in the exercises. This visualization ... -
Cyber security exercise – literature review to pedagogical methodology
INTED proceedings : 13 (International Association of Technology Education and Development, 2019) -
Cyber Security Framework for NAPA Onboard Products
(2021)NAPA as a maritime software and system provider needs to ensure proven cyber security capabilities before, during and after a system delivery to a ship. Ship owners need to select a classification society for each ship, ... -
Cyber security in customer support: needs analysis and training outline
(2024)The subject of this thesis project was the needs analysis and outline for cyber security awareness training in a customer support department. The client was a company working in the mobility sector. The first part of ...


















