Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security Suite“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security Suite" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security Suite"
Khare, Ruda, und Prof Nandana Prabhu. „Security Suite for IT and Telecom Industries“. IOSR Journal of Computer Engineering 18, Nr. 04 (April 2016): 85–89. http://dx.doi.org/10.9790/0661-1804048589.
Der volle Inhalt der QuelleSampangi, Raghav V. „A Security Suite for Wireless Body Area Networks“. International Journal of Network Security & Its Applications 4, Nr. 1 (31.01.2012): 97–116. http://dx.doi.org/10.5121/ijnsa.2012.4110.
Der volle Inhalt der QuelleBoone, Adam. „Cyber-security must be a C-suite priority“. Computer Fraud & Security 2017, Nr. 2 (Februar 2017): 13–15. http://dx.doi.org/10.1016/s1361-3723(17)30015-5.
Der volle Inhalt der QuelleBellovin, S. M. „Security problems in the TCP/IP protocol suite“. ACM SIGCOMM Computer Communication Review 19, Nr. 2 (April 1989): 32–48. http://dx.doi.org/10.1145/378444.378449.
Der volle Inhalt der QuelleNikeshin, A., N. Pakulin und V. Shnitman. „Test Suite development for verification of TLS security protocol“. Proceedings of the Institute for System Programming of RAS 23 (2012): 387–404. http://dx.doi.org/10.15514/ispras-2012-23-22.
Der volle Inhalt der QuelleYang, Wenze, Felix Kogan und Wei Guo. „An Ongoing Blended Long-Term Vegetation Health Product for Monitoring Global Food Security“. Agronomy 10, Nr. 12 (09.12.2020): 1936. http://dx.doi.org/10.3390/agronomy10121936.
Der volle Inhalt der QuelleFourney, Robert S., und Austin D. Hanson. „Torbit: Design of an open source security flaw measurement suite“. Journal of Computational Methods in Sciences and Engineering 9, s2 (30.07.2009): S137—S147. http://dx.doi.org/10.3233/jcm-2009-0242.
Der volle Inhalt der QuelleZaba, Stefek. „Cryptographic security in the internet protocol suite: Practice and proposals“. Information Security Technical Report 2, Nr. 2 (Januar 1997): 54–73. http://dx.doi.org/10.1016/s1363-4127(97)81329-5.
Der volle Inhalt der QuelleKent, S. „Comments on “security problems in the TCP/IP protocol suite”“. ACM SIGCOMM Computer Communication Review 19, Nr. 3 (Juli 1989): 10–19. http://dx.doi.org/10.1145/74674.74675.
Der volle Inhalt der QuelleAmigorena, François. „Does your C-suite really understand the benefits of IT security?“ Computer Fraud & Security 2015, Nr. 11 (November 2015): 18–20. http://dx.doi.org/10.1016/s1361-3723(15)30104-4.
Der volle Inhalt der QuelleDissertationen zum Thema "Security Suite"
Bartoli, Andrea. „Security protocols suite for machine-to-machine systems“. Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.
Der volle Inhalt der QuelleJohansson, Michael. „Internet of things security in healthcare : A test-suite and standard review“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.
Der volle Inhalt der QuelleMcCulley, Shane. „Forensic Analysis of G Suite Collaborative Protocols“. ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.
Der volle Inhalt der QuelleKohout, David. „Implementace zabezpečení do DLMS protokolu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.
Der volle Inhalt der QuelleMarchal, Xavier. „Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus“. Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Der volle Inhalt der QuelleInternet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Třeštíková, Lenka. „Bezpečnostní metriky platformy SAP“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.
Der volle Inhalt der QuelleRobert, Emilie. „L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001“. Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.
Der volle Inhalt der QuelleThe fight against terrorism, as well as its consequences in the field of Human Rights, is not a new theme for Europe. However, since the terrorist attacks of September the 11th 2001 in the United States of America, “confirmed” by the ones of Madrid in 2004 and London in 2005, it has never embodied such a priority. The larger part of the measures taken by the European Union falls under the heading of cooperation in criminal matters, i.e. within the scope of the former Third Pillar, among which the framework decision on combating terrorism, the framework decision on the European arrest warrant and the agreements between the European Union and the United States of America on extradition and mutual legal assistance. On basis of the European measures, some States, not historically concerned by terrorism, have been compelled to carry out counter-terrorism measures whereas, others have seen a legitimation to reinforce their existing body of law. What is the impact of the European measures and the ones taken by States on the delicate balance between security and liberty? In other words, what is the role of the Rule of Law: a limitation to those measures or, a principle aiming to the strengthening of the fight against terrorism?
Rehana, Jinat. „Model Driven Development of Web Application with SPACE Method and Tool-suit“. Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.
Der volle Inhalt der QuelleMoyer, Shawn P. „Creating a mix of spooks and suits : a new role for intelligence“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.
Der volle Inhalt der QuelleThesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
Ziani, Adel. „Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)“. Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.
Der volle Inhalt der QuelleBücher zum Thema "Security Suite"
Designing an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Den vollen Inhalt der Quelle findenGhébali, Victor Yves. Le bilan de la reunion de Vienne sur les suites de la CSCE. Geneva: GIPRI, 1989.
Den vollen Inhalt der Quelle findenNational Workshop on Social Security Protection (1996 Pasig City, Manila, Philippines). Social security protection in the Philippines: Proceedings of the National Workshop on Social Security Protection, Manila Galleria Suites, Pasig City, Philippines, 30-31 July 1996. [Manila]: Institute for Labor Studies with technical assistance from the United Nations Development Programme and the International Labour Organisation, 1996.
Den vollen Inhalt der Quelle findenOracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.
Den vollen Inhalt der Quelle findenAbel, John. Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.
Den vollen Inhalt der Quelle findenTeam, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.
Den vollen Inhalt der Quelle findenTeam, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.
Den vollen Inhalt der Quelle finden1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.
Den vollen Inhalt der Quelle finden1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.
Den vollen Inhalt der Quelle finden1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Indianapolis, Ind: IBM Press, 2009.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security Suite"
Hankerson, Darrel, und Alfred Menezes. „NSA Suite B“. In Encyclopedia of Cryptography and Security, 857. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_648.
Der volle Inhalt der QuelleZaheer, Syed, und Erman Arslan. „An Introduction to Oracle EBS Security“. In Practical Oracle E-Business Suite, 641–74. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1422-0_12.
Der volle Inhalt der QuellePerois, Jean. „Selling Your Security Program to the C-Suite“. In Strategic Security, 25–46. 1 Edition. | New York : Routledge, 2019.: CRC Press, 2019. http://dx.doi.org/10.4324/9781351123464-2.
Der volle Inhalt der QuelleWilliams, Anthony A. „Capital Connections: Washington’s Public Safety Communications Suite“. In Safeguarding Homeland Security, 241–52. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-1-4419-0371-6_22.
Der volle Inhalt der QuelleNoel, Steven, und Sushil Jajodia. „A Suite of Metrics for Network Attack Graph Analytics“. In Network Security Metrics, 141–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_7.
Der volle Inhalt der Quellede Ruiter, Joeri, und Erik Poll. „Formal Analysis of the EMV Protocol Suite“. In Theory of Security and Applications, 113–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27375-9_7.
Der volle Inhalt der QuelleJang, Jihyeon, Stephen J. Elliott und Hakil Kim. „Implementation of BioAPI Conformance Test Suite Using BSP Testing Model“. In Information Security Applications, 48–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_4.
Der volle Inhalt der QuelleFamiliar, Bob, und Jeff Barnes. „Security and Identity“. In Business in Real-Time Using Azure IoT and Cortana Intelligence Suite, 475–516. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2650-6_10.
Der volle Inhalt der QuelleMoura, Ricardo, David R. Matos, Miguel L. Pardal und Miguel Correia. „MultiTLS: Secure Communication Channels with Cipher Suite Diversity“. In ICT Systems Security and Privacy Protection, 64–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.
Der volle Inhalt der QuelleSýs, Marek, und Zdeněk Říha. „Faster Randomness Testing with the NIST Statistical Test Suite“. In Security, Privacy, and Applied Cryptography Engineering, 272–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12060-7_18.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security Suite"
Rapanotti, John. „Vehicle-network defensive aids suite“. In Defense and Security, herausgegeben von Dawn A. Trevisani und Alex F. Sisti. SPIE, 2005. http://dx.doi.org/10.1117/12.603615.
Der volle Inhalt der QuelleGranade, Stephen R. „Rendezvous and docking sensor suite“. In Defense and Security Symposium, herausgegeben von Richard T. Howard und Robert D. Richards. SPIE, 2006. http://dx.doi.org/10.1117/12.666797.
Der volle Inhalt der Quelle„FREE SECURITY SUITE 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration“. In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002231003410344.
Der volle Inhalt der QuelleBerger, Bernhard J., Karsten Sohr und Rainer Koschke. „The Architectural Security Tool Suite — ARCHSEC“. In 2019 IEEE 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2019. http://dx.doi.org/10.1109/scam.2019.00035.
Der volle Inhalt der QuelleKrishnan, Deepa, und Madhumita Chatterjee. „Cloud security management suite — Security As a Service“. In 2012 World Congress on Information and Communication Technologies (WICT). IEEE, 2012. http://dx.doi.org/10.1109/wict.2012.6409116.
Der volle Inhalt der QuelleRoe, Fred, und Stephen R. Granade. „Hydra AR&D sensor suite“. In Defense and Security Symposium, herausgegeben von Richard T. Howard und Robert D. Richards. SPIE, 2007. http://dx.doi.org/10.1117/12.719328.
Der volle Inhalt der QuelleMontgomery, Joel B., Richard B. Sanderson, John F. McCalmont, R. S. Johnson, D. J. McDermott und M. J. Taylor. „An advanced missile warning processing suite“. In SPIE Defense and Security Symposium, herausgegeben von Oliver E. Drummond. SPIE, 2008. http://dx.doi.org/10.1117/12.778662.
Der volle Inhalt der QuelleMaenner, Paul F. „Emerging standards suite for wide-area ISR“. In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.919806.
Der volle Inhalt der QuelleTopiwala, Pankaj N., und David P. Casasent. „Correlation-based target detection for the Navy's SHARP sensor suite“. In Defense and Security, herausgegeben von Firooz A. Sadjadi. SPIE, 2004. http://dx.doi.org/10.1117/12.542328.
Der volle Inhalt der QuelleCoakley, Monica M., Michael W. Kelly, William J. Blackwell, Danette P. Ryan-Howard, Harry R. Finkle, Steven Kirkner, Andrew Carson und Gene Martin. „Hyperspectral environmental suite for the Geostationary Operational Environmental Satellite (GOES)“. In Defense and Security, herausgegeben von Sylvia S. Shen und Paul E. Lewis. SPIE, 2004. http://dx.doi.org/10.1117/12.543503.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security Suite"
Aldrich, Susan. EASI Security Unifier Suite: Security Backplane from Quadrasis. Boston, MA: Patricia Seybold Group, Februar 2003. http://dx.doi.org/10.1571/pr2-6-03cc.
Der volle Inhalt der QuelleBurgin, K., und M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, Oktober 2011. http://dx.doi.org/10.17487/rfc6380.
Der volle Inhalt der QuelleSalter, M., und R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, Januar 2012. http://dx.doi.org/10.17487/rfc6460.
Der volle Inhalt der QuelleSalter, M., E. Rescorla und R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, März 2009. http://dx.doi.org/10.17487/rfc5430.
Der volle Inhalt der QuelleJenkins, M., und L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS. RFC Editor, März 2020. http://dx.doi.org/10.17487/rfc8756.
Der volle Inhalt der QuelleJenkins, M., und L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Mai 2019. http://dx.doi.org/10.17487/rfc8603.
Der volle Inhalt der QuelleJenkins, M. Using Commercial National Security Algorithm Suite Algorithms in Secure/Multipurpose Internet Mail Extensions. RFC Editor, März 2020. http://dx.doi.org/10.17487/rfc8755.
Der volle Inhalt der QuelleBadra, M., und I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, März 2009. http://dx.doi.org/10.17487/rfc5489.
Der volle Inhalt der QuelleMcGrew, D., und D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, Juli 2012. http://dx.doi.org/10.17487/rfc6655.
Der volle Inhalt der QuelleLangley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson und S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, Juni 2016. http://dx.doi.org/10.17487/rfc7905.
Der volle Inhalt der Quelle