Examensarbeten efter datum/Theses by date


Klicka på blå triangel för att expandera/minimera/Click on the blue triangle to expand/minimize.


YearProgramAuthorTitle
Hide details for International Information Systems, 120 poängInternational Information Systems, 120 poäng
Ahlgren, JohanEn studie av inbyggda brandväggar - Microsoft XP och Red Hat Linux
Karlsson, RobertEn studie av inbyggda brandväggar - Microsoft XP och Red Hat Linux
Hide details for Internationell ADB/International ISInternationell ADB/International IS
Andersson, ThomasHow can business partners establish a relationship of trust in order to share Web Services?
Arnevill, AnitaHow can business partners establish a relationship of trust in order to share Web Services?
Friberg, HannaUse and Needs in Contexts: An Ethnographic Study on Cell Phone Use from a Contextual Usability Perspective
Kleberg, NiklasInformation Sharing Needs - Introduction of a web-hosted portal in the ship broking business
Larsson, JosephineSecurity in wireless networks - Vulnerabilities and Countermeasures
Maksimovic, GordanaQuery Languages for Semi-structured Data
Olsson, DanielInformation Sharing Needs - Introduction of a web-hosted portal in the ship broking business
Sjöholm, Per-IngvarInformation Sharing Needs - Introduction of a web-hosted portal in the ship broking business
Waller, IdaSecurity in wireless networks - Vulnerabilities and Countermeasures
Hide details for Magisterprogram Datavetenskap, 40 poäng/Master programme Computer ScienceMagisterprogram Datavetenskap, 40 poäng/Master programme Computer Science
Carlsson, JimmySustainability and service-oriented systems in network-centric environments
Chervyakov, AnatolySimulation-based evaluation of berth allocation policies of container terminals
Edström, TobiasAdopting Mobile Internet? Findings from a Study on Mobile Internet Services Using a User Centred Perspective
Ekberg, SiriInvasion of Privacy: Spam - one result of bad privacy protection
Gunnarsson, AnnickaInvasion of Privacy: Spam - one result of bad privacy protection
Isaksson, UlrikaChallenges with Incident Management - In Information Technology
Isaksson, UlrikaChallenges with Incident Management - In Information Technology
Johansson, ChristianComputer Forensic Text Analysis with Open Source Software
Karlsson, JohannaNomadic Computing - Security assessment of remote access to workplace systems
Karlsson, JonasTEMPEST attacks - Using a simple radio receiver
Kling, MartinUnsecured sessions with ICQ - applying forensic computing
Kvarnström, KarinChallenges with Incident Management - In Information Technology
Kvarnström, KarinChallenges with Incident Management - In Information Technology
Larsen, ÅseSystem Usability - a case study at the County Council of Blekinge
Mantzakanis, ToveSystem Usability - a case study at the County Council of Blekinge
Nilsson, MalinChallenges with Incident Management - In Information Technology