Auswahl der wissenschaftlichen Literatur zum Thema „Security Suite“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security Suite" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Security Suite"

1

Khare, Ruda, und Prof Nandana Prabhu. „Security Suite for IT and Telecom Industries“. IOSR Journal of Computer Engineering 18, Nr. 04 (April 2016): 85–89. http://dx.doi.org/10.9790/0661-1804048589.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sampangi, Raghav V. „A Security Suite for Wireless Body Area Networks“. International Journal of Network Security & Its Applications 4, Nr. 1 (31.01.2012): 97–116. http://dx.doi.org/10.5121/ijnsa.2012.4110.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Boone, Adam. „Cyber-security must be a C-suite priority“. Computer Fraud & Security 2017, Nr. 2 (Februar 2017): 13–15. http://dx.doi.org/10.1016/s1361-3723(17)30015-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bellovin, S. M. „Security problems in the TCP/IP protocol suite“. ACM SIGCOMM Computer Communication Review 19, Nr. 2 (April 1989): 32–48. http://dx.doi.org/10.1145/378444.378449.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Nikeshin, A., N. Pakulin und V. Shnitman. „Test Suite development for verification of TLS security protocol“. Proceedings of the Institute for System Programming of RAS 23 (2012): 387–404. http://dx.doi.org/10.15514/ispras-2012-23-22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Yang, Wenze, Felix Kogan und Wei Guo. „An Ongoing Blended Long-Term Vegetation Health Product for Monitoring Global Food Security“. Agronomy 10, Nr. 12 (09.12.2020): 1936. http://dx.doi.org/10.3390/agronomy10121936.

Der volle Inhalt der Quelle
Annotation:
Remotely observing global vegetation from space has endured for nearly 50 years. Many datasets have been developed to monitor vegetation status. Tailored to specifically monitor global food security concerning drought and crop yield, a suite of datasets based on vegetation health concepts and Advanced Very High Resolution Radiometer (AVHRR) observation was developed in the 1980s and utilized throughout the world. Nowadays, satellites based imaging radiometers have evolved into the Visible Infrared Imaging Radiometer Suite (VIIRS) era. With proper algorithm development, the blended version of the data suite, composed of the AVHRR dataset from 1981 to 2012 and VIIRS dataset from 2013 and afterwards, has bridged the long-term AVHRR observation and high-quality VIIRS data. This paper explains the blended version of the data suite.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Fourney, Robert S., und Austin D. Hanson. „Torbit: Design of an open source security flaw measurement suite“. Journal of Computational Methods in Sciences and Engineering 9, s2 (30.07.2009): S137—S147. http://dx.doi.org/10.3233/jcm-2009-0242.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zaba, Stefek. „Cryptographic security in the internet protocol suite: Practice and proposals“. Information Security Technical Report 2, Nr. 2 (Januar 1997): 54–73. http://dx.doi.org/10.1016/s1363-4127(97)81329-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kent, S. „Comments on “security problems in the TCP/IP protocol suite”“. ACM SIGCOMM Computer Communication Review 19, Nr. 3 (Juli 1989): 10–19. http://dx.doi.org/10.1145/74674.74675.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Amigorena, François. „Does your C-suite really understand the benefits of IT security?“ Computer Fraud & Security 2015, Nr. 11 (November 2015): 18–20. http://dx.doi.org/10.1016/s1361-3723(15)30104-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Security Suite"

1

Bartoli, Andrea. „Security protocols suite for machine-to-machine systems“. Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.

Der volle Inhalt der Quelle
Annotation:
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a business opportunity and a key factor to increase the general cohesion among all citizens. Within the actors of this technological evolution, wireless machine-to-machine (M2M) networks are becoming of great importance. These wireless networks are made up of interconnected low-power devices that are able to provide a great variety of services with little or even no user intervention. Examples of these services can be fleet management, fire detection, utilities consumption (water and energy distribution, etc.) or patients monitoring. However, since any arising technology goes together with its security threats, which have to be faced, further studies are necessary to secure wireless M2M technology. In this context, main threats are those related to attacks to the services availability and to the privacy of both the subscribers’ and the services providers’ data. Taking into account the often limited resources of the M2M devices at the hardware level, ensuring the availability and privacy requirements in the range of M2M applications while minimizing the waste of valuable resources is even more challenging. Based on the above facts, this Ph. D. thesis is aimed at providing efficient security solutions for wireless M2M networks that effectively reduce energy consumption of the network while not affecting the overall security services of the system. With this goal, we first propose a coherent taxonomy of M2M network that allows us to identify which security topics deserve special attention and which entities or specific services are particularly threatened. Second, we define an efficient, secure-data aggregation scheme that is able to increase the network lifetime by optimizing the energy consumption of the devices. Third, we propose a novel physical authenticator or frame checker that minimizes the communication costs in wireless channels and that successfully faces exhaustion attacks. Fourth, we study specific aspects of typical key management schemes to provide a novel protocol which ensures the distribution of secret keys for all the cryptographic methods used in this system. Fifth, we describe the collaboration with the WAVE2M community in order to define a proper frame format actually able to support the necessary security services, including the ones that we have already proposed; WAVE2M was funded to promote the global use of an emerging wireless communication technology for ultra-low and long-range services. And finally sixth, we provide with an accurate analysis of privacy solutions that actually fit M2M-networks services’ requirements. All the analyses along this thesis are corroborated by simulations that confirm significant improvements in terms of efficiency while supporting the necessary security requirements for M2M networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Johansson, Michael. „Internet of things security in healthcare : A test-suite and standard review“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.

Der volle Inhalt der Quelle
Annotation:
Internet of things is getting more and more popular in healthcare as it comes with benefits that help with efficiency in saving lives and reduce its cost, but it also presents a new attack vector for an attacker to steal or manipulate information sent between them. This report will focus on three properties in the definition of security, confidentiality, integrity and access control. The report will look into what challenges there is in healthcare IoT today through a literature review and from those challenges look into what could minimise these challenges before a device gets into production. The report found that the lack of standardisation has lead to errors that could be easily prevented by following a guideline of tests as those from the European Union Agency for Network and Information Security, or by running a penetration test with the tools brought up in the report on the device to see what vulnerabilities are present.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

McCulley, Shane. „Forensic Analysis of G Suite Collaborative Protocols“. ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.

Der volle Inhalt der Quelle
Annotation:
Widespread adoption of cloud services is fundamentally changing the way IT services are delivered and how data is stored. Current forensic tools and techniques have been slow to adapt to new challenges and demands of collecting and analyzing cloud artifacts. Traditional methods focusing only on client data collection are incomplete, as the client may have only a (partial) snapshot and misses cloud-native artifacts that may contain valuable historical information. In this work, we demonstrate the importance of recovering and analyzing cloud-native artifacts using G Suite as a case study. We develop a tool that extracts and processes the history of Google Documents and Google Slides by reverse engineering the web applications private protocol. Combined with previous work that has focused on API-based acquisition of cloud drives, this presents a more complete solution to cloud forensics, and is generalizable to any cloud service that maintains a detailed log of revisions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kohout, David. „Implementace zabezpečení do DLMS protokolu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.

Der volle Inhalt der Quelle
Annotation:
This thesis is focused on smart meters cyber security using DLMS Security Suite standard. Security is more important every day and DLMS specifies multiple methods of authentication and message encryption which is defined in Security Suites. For message creation there are multiple possible formats that can be used. For a better understanding all formats are analysed and compared using a specific example. Main part of this work is about making a testing application called VUT DLMS Tester which is used for testing this standard for real usage in distribution network. Whole development is cooperated with distribution companies and smart meter manufacturers. Application also implements higher levels of security which DLMS specifies. This application is used for testing multiple scenarios regarding security impact on data volume.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Marchal, Xavier. „Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus“. Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.

Der volle Inhalt der Quelle
Annotation:
Les protocoles historiques d’Internet (TCP/IP) qui servaient à interconnecter les tous premiers ordinateurs ne sont plus adaptés à la diffusion massive de contenus qui en est fait aujourd’hui. De nouveaux protocoles réseau centrés sur les contenus (Information-Centric Networking) sont actuellement conçus pour optimiser ces échanges en pariant sur un changement de paradigme où les contenus, plutôt que les machines sont adressables à l’échelle d’Internet. Cependant, un tel changement ne peut se faire que progressivement et si tous les impératifs opérationnels sont assurés. Ainsi, cette thèse a pour objectif d’étudier et de lever les principaux verrous technologiques empêchant l’adoption du protocole NDN (Name Data Networking) par les opérateur en garantissant la sécurité, les performances, l’interopérabilité, la bonne gestion et le déploiement automatisé d’un réseau NDN. Dans un premier temps, nous évaluons les performances actuelles d’un réseau NDN à l’aide d’un outil de notre conception, ndnperf, et constatons le coût élevé pour un serveur utilisant ce protocole. Puis nous proposons un ensemble de solutions pour améliorer l’efficacité d’un serveur NDN pouvant être jusqu’à 6,4 fois plus efficient que les paramètres de base. Ensuite nous nous intéressons à la sécurité de NDN à travers l’évaluation de l’attaque par empoisonnement de contenus, connue pour être critique mais jamais caractérisée. Cette étude se base sur deux scénarios, en utilisant un serveur et un client pour effectuer la pollution, ou en exploitant une faille dans le traitement des paquets au niveau du routeur. Nous montrons ainsi la dangerosité de l’attaque et proposons une correction de la faille la permettant. Dans un troisième temps, nous cherchons à adapter le protocole HTTP pour qu’il puisse être transporté sur un réseau NDN à des fins d’interopérabilité. Pour ce faire, nous avons développé deux passerelles qui effectuent les conversions nécessaires pour qu’un contenu web puisse rentrer ou sortir d’un réseau NDN. Après avoir décrit notre solution, nous l’évaluons et l’améliorons afin de pouvoir bénéficier d’une fonctionnalité majeure de NDN, à savoir la mise en cache des contenus dans le réseau à hauteur de 61,3% lors de tests synthétiques et 25,1% lors de simulations de navigation avec plusieurs utilisateurs utilisant une loi Zipf de paramètre 1,5. Pour finir, nous proposons une architecture à base de microservices virtualisés et orchestrés pour le déploiement du protocole NDN en suivant le paradigme NFV (Network Function Virtualization). Les sept microservices présentés reprennent soit une fonction atomique du routeur, soit proposent un nouveau service spécifique. Ces fonctions peuvent ensuite être chaînées pour constituer un réseau optimisé. Cette architecture est orchestrée à l’aide d’un manager qui nous permet de pleinement tirer parti des avantages des microservices comme la mise à l’échelle des composants les plus lents ou encore le changement dynamique de topologie en cas d’attaque.Une telle architecture, associée aux contributions précédentes, permettrait un déploiement rapide du protocole NDN, notamment grâce à un développement facilité des fonctions, à l’exécution sur du matériel conventionnel, ou encore grâce à la flexibilité qu’offre ce type d’architecture
Internet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Třeštíková, Lenka. „Bezpečnostní metriky platformy SAP“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.

Der volle Inhalt der Quelle
Annotation:
Main goal of this thesis is analyzing potential security risks of the SAP NetWeaver platform and identifying various vulnerabilities, that are results of poor system configuration, incorrect segregation of duties or insufficient patch management. Methodology for platform evaluation is defined by vulnerabilities, security requirements and controls will be created.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Robert, Emilie. „L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001“. Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.

Der volle Inhalt der Quelle
Annotation:
La lutte contre le terrorisme, ainsi que ses conséquences sur la sphère des droits de l'Homme, n'est pas un thème nouveau en Europe. Cependant, depuis les attentats du 11 septembre 2001 perpétrés sur le sol des Etats-Unis, «confirmés» par ceux de Madrid en 2004 et Londres en 2005, elle n'a jamais incarné une telle priorité. La majeure partie des mesures prises par l'Union européenne tombe sous le titre de la coopération en matière pénale, c’est-à-dire sousl’ex-troisième Pilier, parmi lesquelles la décision-cadre sur la lutte contre le terrorisme, la décision-cadre sur le mandat d'arrêt européen et les accords entre l'Union européenne et les Etats-Unis d'Amérique sur l'extradition et l'assistance juridique mutuelle. Sur base des mesures européennes, certains Etats, historiquement non concernés par ce phénomène, ont été pressés à adopter des mesures anti-terroristes alors que d’autres y ont vu une légitimation pour renforcer leur corpus juridique déjà existant. Quel est l'impact des mesures européennes et de celles prises par les Etats sur le délicat équilibre entre la sécurité et la liberté ? En d'autres termes, quel est le rôle de l'Etat de droit : une limitation à ces mesures ou, un principe visant au renforcement du combat contre le terrorisme?
The fight against terrorism, as well as its consequences in the field of Human Rights, is not a new theme for Europe. However, since the terrorist attacks of September the 11th 2001 in the United States of America, “confirmed” by the ones of Madrid in 2004 and London in 2005, it has never embodied such a priority. The larger part of the measures taken by the European Union falls under the heading of cooperation in criminal matters, i.e. within the scope of the former Third Pillar, among which the framework decision on combating terrorism, the framework decision on the European arrest warrant and the agreements between the European Union and the United States of America on extradition and mutual legal assistance. On basis of the European measures, some States, not historically concerned by terrorism, have been compelled to carry out counter-terrorism measures whereas, others have seen a legitimation to reinforce their existing body of law. What is the impact of the European measures and the ones taken by States on the delicate balance between security and liberty? In other words, what is the role of the Rule of Law: a limitation to those measures or, a principle aiming to the strengthening of the fight against terrorism?
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rehana, Jinat. „Model Driven Development of Web Application with SPACE Method and Tool-suit“. Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.

Der volle Inhalt der Quelle
Annotation:
Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of products,shortened development cycles and heightened expectations of quality. MDD(Model Driven Development) has been counting as an exciting and magicaldevelopment approach in the software industry from several years. The ideabehind MDD is the separation of business logic of a system from its implementationdetails expressing problem domain using models. This separation andmodeling of problem domain simplify the process of system design as well asincrease the longevity of products as new technologies can be adopted easily.With appropriate tool support, MDD shortens the software development lifecycle drastically by automating a significant portion of development steps.MDA (Model Driven Architecture) is a framework launched by OMG (ObjectManagement Group) to support MDD. SPACE is an engineering methodfor rapid creation of services, developed at NTNU (Norwegian University ofScience and Technology) which follows MDA framework. Arctis and Ramsesare tool suits, also developed at NTNU to support SPACE method. Severalsolutions have been developed on Arctis tool suit covering several domainslike mobile services, embedded systems, home automation, trust managementand web services.This thesis presents a case study on the web application domain with Arctis,where the underlying technologies are AJAX (asynchronous JavaScriptand XML), GWT (Google Web Toolkit) framework and Java Servlet. Inorder to do that, this thesis contributes building up some reusable buildingblocks with Arctis tool suit. This thesis also describes a use case scenario touse those building blocks. This thesis work tries to implement the specifiedsystem and evaluates the resulting work.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Moyer, Shawn P. „Creating a mix of spooks and suits : a new role for intelligence“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ziani, Adel. „Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)“. Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.

Der volle Inhalt der Quelle
Annotation:
Non-functional requirements such as Security and Dependability (S&D) become more and more important as well as more and more difficult to achieve, particularly in embedded systems development. Such systems come with a large number of common characteristics, including real-time and temperature constraints, security and dependability as well as efficiency requirements. In particular, the development of Resource Constrained Embedded Systems (RCES) has to address constraints regarding memory, computational processing power and/or energy consumption. In this work, we propose a modeling environment which associates model-driven paradigm and a model-based repository, to support the design and the packaging of S&D patterns, resource models and their property models. The approach is based on a set of modeling languages coupled with a model-repository, search and instantiation engines towards specific development environments. These modeling languages allow to specify patterns, resources and a set of property models. These property models will allow to govern the use of patterns and their analysis for reuse. In addition, we propose a specification and generation process of repositories. As part of the assistance for the development of S&D applications, we have implemented a suite of tool-chain based on the Eclipse platform to support the different activities around the repository, including the analysis activities. The proposed solutions were evaluated in the TERESA project through a case study from the railway domain.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Security Suite"

1

Designing an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ghébali, Victor Yves. Le bilan de la reunion de Vienne sur les suites de la CSCE. Geneva: GIPRI, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

National Workshop on Social Security Protection (1996 Pasig City, Manila, Philippines). Social security protection in the Philippines: Proceedings of the National Workshop on Social Security Protection, Manila Galleria Suites, Pasig City, Philippines, 30-31 July 1996. [Manila]: Institute for Labor Studies with technical assistance from the United Nations Development Programme and the International Labour Organisation, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Abel, John. Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Team, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Team, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Indianapolis, Ind: IBM Press, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Security Suite"

1

Hankerson, Darrel, und Alfred Menezes. „NSA Suite B“. In Encyclopedia of Cryptography and Security, 857. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_648.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zaheer, Syed, und Erman Arslan. „An Introduction to Oracle EBS Security“. In Practical Oracle E-Business Suite, 641–74. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1422-0_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Perois, Jean. „Selling Your Security Program to the C-Suite“. In Strategic Security, 25–46. 1 Edition. | New York : Routledge, 2019.: CRC Press, 2019. http://dx.doi.org/10.4324/9781351123464-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Williams, Anthony A. „Capital Connections: Washington’s Public Safety Communications Suite“. In Safeguarding Homeland Security, 241–52. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-1-4419-0371-6_22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Noel, Steven, und Sushil Jajodia. „A Suite of Metrics for Network Attack Graph Analytics“. In Network Security Metrics, 141–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

de Ruiter, Joeri, und Erik Poll. „Formal Analysis of the EMV Protocol Suite“. In Theory of Security and Applications, 113–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27375-9_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jang, Jihyeon, Stephen J. Elliott und Hakil Kim. „Implementation of BioAPI Conformance Test Suite Using BSP Testing Model“. In Information Security Applications, 48–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Familiar, Bob, und Jeff Barnes. „Security and Identity“. In Business in Real-Time Using Azure IoT and Cortana Intelligence Suite, 475–516. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2650-6_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Moura, Ricardo, David R. Matos, Miguel L. Pardal und Miguel Correia. „MultiTLS: Secure Communication Channels with Cipher Suite Diversity“. In ICT Systems Security and Privacy Protection, 64–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Sýs, Marek, und Zdeněk Říha. „Faster Randomness Testing with the NIST Statistical Test Suite“. In Security, Privacy, and Applied Cryptography Engineering, 272–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12060-7_18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Security Suite"

1

Rapanotti, John. „Vehicle-network defensive aids suite“. In Defense and Security, herausgegeben von Dawn A. Trevisani und Alex F. Sisti. SPIE, 2005. http://dx.doi.org/10.1117/12.603615.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Granade, Stephen R. „Rendezvous and docking sensor suite“. In Defense and Security Symposium, herausgegeben von Richard T. Howard und Robert D. Richards. SPIE, 2006. http://dx.doi.org/10.1117/12.666797.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

„FREE SECURITY SUITE 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration“. In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002231003410344.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Berger, Bernhard J., Karsten Sohr und Rainer Koschke. „The Architectural Security Tool Suite — ARCHSEC“. In 2019 IEEE 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2019. http://dx.doi.org/10.1109/scam.2019.00035.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Krishnan, Deepa, und Madhumita Chatterjee. „Cloud security management suite — Security As a Service“. In 2012 World Congress on Information and Communication Technologies (WICT). IEEE, 2012. http://dx.doi.org/10.1109/wict.2012.6409116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Roe, Fred, und Stephen R. Granade. „Hydra AR&D sensor suite“. In Defense and Security Symposium, herausgegeben von Richard T. Howard und Robert D. Richards. SPIE, 2007. http://dx.doi.org/10.1117/12.719328.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Montgomery, Joel B., Richard B. Sanderson, John F. McCalmont, R. S. Johnson, D. J. McDermott und M. J. Taylor. „An advanced missile warning processing suite“. In SPIE Defense and Security Symposium, herausgegeben von Oliver E. Drummond. SPIE, 2008. http://dx.doi.org/10.1117/12.778662.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Maenner, Paul F. „Emerging standards suite for wide-area ISR“. In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.919806.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Topiwala, Pankaj N., und David P. Casasent. „Correlation-based target detection for the Navy's SHARP sensor suite“. In Defense and Security, herausgegeben von Firooz A. Sadjadi. SPIE, 2004. http://dx.doi.org/10.1117/12.542328.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Coakley, Monica M., Michael W. Kelly, William J. Blackwell, Danette P. Ryan-Howard, Harry R. Finkle, Steven Kirkner, Andrew Carson und Gene Martin. „Hyperspectral environmental suite for the Geostationary Operational Environmental Satellite (GOES)“. In Defense and Security, herausgegeben von Sylvia S. Shen und Paul E. Lewis. SPIE, 2004. http://dx.doi.org/10.1117/12.543503.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Security Suite"

1

Aldrich, Susan. EASI Security Unifier Suite: Security Backplane from Quadrasis. Boston, MA: Patricia Seybold Group, Februar 2003. http://dx.doi.org/10.1571/pr2-6-03cc.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Burgin, K., und M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, Oktober 2011. http://dx.doi.org/10.17487/rfc6380.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Salter, M., und R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, Januar 2012. http://dx.doi.org/10.17487/rfc6460.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Salter, M., E. Rescorla und R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, März 2009. http://dx.doi.org/10.17487/rfc5430.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Jenkins, M., und L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS. RFC Editor, März 2020. http://dx.doi.org/10.17487/rfc8756.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jenkins, M., und L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Mai 2019. http://dx.doi.org/10.17487/rfc8603.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jenkins, M. Using Commercial National Security Algorithm Suite Algorithms in Secure/Multipurpose Internet Mail Extensions. RFC Editor, März 2020. http://dx.doi.org/10.17487/rfc8755.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Badra, M., und I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, März 2009. http://dx.doi.org/10.17487/rfc5489.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

McGrew, D., und D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, Juli 2012. http://dx.doi.org/10.17487/rfc6655.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Langley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson und S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, Juni 2016. http://dx.doi.org/10.17487/rfc7905.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie