Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security Suite.

Dissertationen zum Thema „Security Suite“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-20 Dissertationen für die Forschung zum Thema "Security Suite" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Bartoli, Andrea. "Security protocols suite for machine-to-machine systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.

Der volle Inhalt der Quelle
Annotation:
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a bus
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Johansson, Michael. "Internet of things security in healthcare : A test-suite and standard review." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.

Der volle Inhalt der Quelle
Annotation:
Internet of things is getting more and more popular in healthcare as it comes with benefits that help with efficiency in saving lives and reduce its cost, but it also presents a new attack vector for an attacker to steal or manipulate information sent between them. This report will focus on three properties in the definition of security, confidentiality, integrity and access control. The report will look into what challenges there is in healthcare IoT today through a literature review and from those challenges look into what could minimise these challenges before a device gets into production.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

McCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.

Der volle Inhalt der Quelle
Annotation:
Widespread adoption of cloud services is fundamentally changing the way IT services are delivered and how data is stored. Current forensic tools and techniques have been slow to adapt to new challenges and demands of collecting and analyzing cloud artifacts. Traditional methods focusing only on client data collection are incomplete, as the client may have only a (partial) snapshot and misses cloud-native artifacts that may contain valuable historical information. In this work, we demonstrate the importance of recovering and analyzing cloud-native artifacts using G Suite as a case study. We dev
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kohout, David. "Implementace zabezpečení do DLMS protokolu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.

Der volle Inhalt der Quelle
Annotation:
This thesis is focused on smart meters cyber security using DLMS Security Suite standard. Security is more important every day and DLMS specifies multiple methods of authentication and message encryption which is defined in Security Suites. For message creation there are multiple possible formats that can be used. For a better understanding all formats are analysed and compared using a specific example. Main part of this work is about making a testing application called VUT DLMS Tester which is used for testing this standard for real usage in distribution network. Whole development is cooperat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.

Der volle Inhalt der Quelle
Annotation:
Les protocoles historiques d’Internet (TCP/IP) qui servaient à interconnecter les tous premiers ordinateurs ne sont plus adaptés à la diffusion massive de contenus qui en est fait aujourd’hui. De nouveaux protocoles réseau centrés sur les contenus (Information-Centric Networking) sont actuellement conçus pour optimiser ces échanges en pariant sur un changement de paradigme où les contenus, plutôt que les machines sont adressables à l’échelle d’Internet. Cependant, un tel changement ne peut se faire que progressivement et si tous les impératifs opérationnels sont assurés. Ainsi, cette thèse a p
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Třeštíková, Lenka. "Bezpečnostní metriky platformy SAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.

Der volle Inhalt der Quelle
Annotation:
Main goal of this thesis is analyzing potential security risks of the SAP NetWeaver platform and identifying various vulnerabilities, that are results of poor system configuration, incorrect segregation of duties or insufficient patch management. Methodology for platform evaluation is defined by vulnerabilities, security requirements and controls will be created.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Robert, Emilie. "L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001." Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.

Der volle Inhalt der Quelle
Annotation:
La lutte contre le terrorisme, ainsi que ses conséquences sur la sphère des droits de l'Homme, n'est pas un thème nouveau en Europe. Cependant, depuis les attentats du 11 septembre 2001 perpétrés sur le sol des Etats-Unis, «confirmés» par ceux de Madrid en 2004 et Londres en 2005, elle n'a jamais incarné une telle priorité. La majeure partie des mesures prises par l'Union européenne tombe sous le titre de la coopération en matière pénale, c’est-à-dire sousl’ex-troisième Pilier, parmi lesquelles la décision-cadre sur la lutte contre le terrorisme, la décision-cadre sur le mandat d'arrêt europée
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.

Der volle Inhalt der Quelle
Annotation:
Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of products,shortened development cycles and heightened expectations of quality. MDD(Model Driven Development) has been counting as an exciting and magicaldevelopment approach in the software industry from several years. The ideabehind MDD is the separation of business logic of a system from its implementationdetails expressing problem domain using models. This separation andmodeling of p
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Moyer, Shawn P. "Creating a mix of spooks and suits : a new role for intelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ziani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.

Der volle Inhalt der Quelle
Annotation:
Non-functional requirements such as Security and Dependability (S&D) become more and more important as well as more and more difficult to achieve, particularly in embedded systems development. Such systems come with a large number of common characteristics, including real-time and temperature constraints, security and dependability as well as efficiency requirements. In particular, the development of Resource Constrained Embedded Systems (RCES) has to address constraints regarding memory, computational processing power and/or energy consumption. In this work, we propose a modeling environment
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Nagy, Jan. "Zabezpečení bezdrátových senzorových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412805.

Der volle Inhalt der Quelle
Annotation:
This thesis deals with the security of wireless sensor networks, mainly of the industrial standard ZigBee. The aim of the work is to familiarize with the 802.15.4 standard and the ZigBee technology, especially with present methods of security in this field. I have also analysed the requirements for the security of this technology. Further aim of this work is the introduction of the ZigBee kit and description of the Microchip's ZigBee stack. Analysis of the stack is connected with practical test of security functions in the ZigBee laboratory.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Wang, Qianxue. "Création et évaluation statistique d'une nouvelle de générateurs pseudo-aléatoires chaotiques." Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2031.

Der volle Inhalt der Quelle
Annotation:
Dans cette thèse, une nouvelle manière de générer des nombres pseudo-aléatoires est présentée.La proposition consiste à mixer deux générateurs exitants avec des itérations chaotiquesdiscrètes, qui satisfont à la définition de chaos proposée par Devaney. Un cadre rigoureux estintroduit, dans lequel les propriétés topologiques du générateur résultant sont données. Deuxréalisations pratiques d’un tel générateur sont ensuite présentées et évaluées. On montre que lespropriétés statistiques des générateurs fournis en entrée peuvent être grandement améliorées enprocédant ainsi. Ces deux propositions
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Small, Jeremiah. "Patterns in network security: an analysis of architectural complexity in securing recursive inter-network architecture networks." Thesis, 2012. https://hdl.handle.net/2144/17155.

Der volle Inhalt der Quelle
Annotation:
Recursive Inter-Network Architecture (RINA) networks have a shorter protocol stack than the current architecture (the Internet) and rely instead upon separation of mech- anism from policy and recursive deployment to achieve large scale networks. Due to this smaller protocol stack, fewer networking mechanisms, security or otherwise, should be needed to secure RINA networks. This thesis examines the security proto- cols included in the Internet Protocol Suite that are commonly deployed on existing networks and shows that because of the design principles of the current architecture, these
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Dollar, Timothy Wayne. "Ensuring document security, user coordination, and multimedia synchronization in a prototype groupware suite." 1997. http://catalog.hathitrust.org/api/volumes/oclc/39271833.html.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Hertenberger, Manfred Paul. "A reference framework for security in enterprise resource planning (ERP) systems." Thesis, 2008. http://hdl.handle.net/10210/496.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Boshoff, Paul Marthinus. "Securing host and application information in the TCP/IP protocol suite." Thesis, 2012. http://hdl.handle.net/10210/5673.

Der volle Inhalt der Quelle
Annotation:
M.Sc.<br>Using the Internet for communication purposes constitutes a high risk, considering the security of such information. The protocol suite used on the Internet is the TCP/IP protocol suite, which consists of the Transmission Control Protocol (TCP) and the Internet Protocol (IP). In a bid to create a basis to support the newly conceptualised ideas, various areas of networking are briefly discussed in this dissertation. The first in this series of areas is that of the OSI layers. This model forms the basis of all networking concepts. The model describes seven layers, of which each performs
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

chiao-ju, chuang, and 莊喬汝. "The Study on the Suits and the Causation of Security Fraud." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41675261778053174337.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Widyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立交通大學<br>電機資訊國際學程<br>103<br>Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT system including the corresponding security protocols that we can utilize. For TLS protocols, ETSI also suggests a set of cipher suite algorithms. Those options are categorized into two types, access-dependent and access-independent, based on the relationship between the M2M Service Provider and the Access Net
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Chuang, Wen-Chi, and 莊玟琦. "A Study of the Sense-of-security of Single Female College Students in Off-campus Rental Suites." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/28081919124317626086.

Der volle Inhalt der Quelle
Annotation:
碩士<br>中原大學<br>室內設計研究所<br>90<br>It is observable that most designers, such as interior designers, and product designs, are male gender who tend to design based on masculine values. Whether from the perspectives of sociology, aesthetics, or functional demands of design products, it is a commonplace that male designs often neglected female values. This may be an indirect cause of the lack of sense-of-security to female college students who reside in off-campus rental suites. Threats to female safety are substantial, including raping, peeping, robbing, or that caused by natural hazards. This ca
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Chu, Wan-Ting, and 朱婉婷. "Security v.s. Child endorser match-up?--Best suited to the endorser for the airline’s advertising communication effect." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/6k9nrq.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立嘉義大學<br>休閒事業管理研究所<br>97<br>Since consumers cannot observe quality before flying, an airline’s safety history and reputation can play an important role in the formulation of their beliefs. Among those 19 airlines, China Airlines has the highest flight accident rate and per million flight accident rate is 7.16. Obviously, safety is the most important factor while customers are making their purchasing decision. In fact, have much of ads to use child endorse safety, such as Mitsubishi Savrin a series of ads use child to endorse for safety and reliable. Interestingly, the most emphasis on s
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!