Academic literature on the topic 'Security Suite'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Suite.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Suite"
Khare, Ruda, and Prof Nandana Prabhu. "Security Suite for IT and Telecom Industries." IOSR Journal of Computer Engineering 18, no. 04 (April 2016): 85–89. http://dx.doi.org/10.9790/0661-1804048589.
Full textSampangi, Raghav V. "A Security Suite for Wireless Body Area Networks." International Journal of Network Security & Its Applications 4, no. 1 (January 31, 2012): 97–116. http://dx.doi.org/10.5121/ijnsa.2012.4110.
Full textBoone, Adam. "Cyber-security must be a C-suite priority." Computer Fraud & Security 2017, no. 2 (February 2017): 13–15. http://dx.doi.org/10.1016/s1361-3723(17)30015-5.
Full textBellovin, S. M. "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review 19, no. 2 (April 1989): 32–48. http://dx.doi.org/10.1145/378444.378449.
Full textNikeshin, A., N. Pakulin, and V. Shnitman. "Test Suite development for verification of TLS security protocol." Proceedings of the Institute for System Programming of RAS 23 (2012): 387–404. http://dx.doi.org/10.15514/ispras-2012-23-22.
Full textYang, Wenze, Felix Kogan, and Wei Guo. "An Ongoing Blended Long-Term Vegetation Health Product for Monitoring Global Food Security." Agronomy 10, no. 12 (December 9, 2020): 1936. http://dx.doi.org/10.3390/agronomy10121936.
Full textFourney, Robert S., and Austin D. Hanson. "Torbit: Design of an open source security flaw measurement suite." Journal of Computational Methods in Sciences and Engineering 9, s2 (July 30, 2009): S137—S147. http://dx.doi.org/10.3233/jcm-2009-0242.
Full textZaba, Stefek. "Cryptographic security in the internet protocol suite: Practice and proposals." Information Security Technical Report 2, no. 2 (January 1997): 54–73. http://dx.doi.org/10.1016/s1363-4127(97)81329-5.
Full textKent, S. "Comments on “security problems in the TCP/IP protocol suite”." ACM SIGCOMM Computer Communication Review 19, no. 3 (July 1989): 10–19. http://dx.doi.org/10.1145/74674.74675.
Full textAmigorena, François. "Does your C-suite really understand the benefits of IT security?" Computer Fraud & Security 2015, no. 11 (November 2015): 18–20. http://dx.doi.org/10.1016/s1361-3723(15)30104-4.
Full textDissertations / Theses on the topic "Security Suite"
Bartoli, Andrea. "Security protocols suite for machine-to-machine systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.
Full textJohansson, Michael. "Internet of things security in healthcare : A test-suite and standard review." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.
Full textMcCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.
Full textKohout, David. "Implementace zabezpečení do DLMS protokolu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.
Full textMarchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Full textInternet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Třeštíková, Lenka. "Bezpečnostní metriky platformy SAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.
Full textRobert, Emilie. "L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001." Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.
Full textThe fight against terrorism, as well as its consequences in the field of Human Rights, is not a new theme for Europe. However, since the terrorist attacks of September the 11th 2001 in the United States of America, “confirmed” by the ones of Madrid in 2004 and London in 2005, it has never embodied such a priority. The larger part of the measures taken by the European Union falls under the heading of cooperation in criminal matters, i.e. within the scope of the former Third Pillar, among which the framework decision on combating terrorism, the framework decision on the European arrest warrant and the agreements between the European Union and the United States of America on extradition and mutual legal assistance. On basis of the European measures, some States, not historically concerned by terrorism, have been compelled to carry out counter-terrorism measures whereas, others have seen a legitimation to reinforce their existing body of law. What is the impact of the European measures and the ones taken by States on the delicate balance between security and liberty? In other words, what is the role of the Rule of Law: a limitation to those measures or, a principle aiming to the strengthening of the fight against terrorism?
Rehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.
Full textMoyer, Shawn P. "Creating a mix of spooks and suits : a new role for intelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.
Full textThesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
Ziani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.
Full textBooks on the topic "Security Suite"
Designing an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Find full textGhébali, Victor Yves. Le bilan de la reunion de Vienne sur les suites de la CSCE. Geneva: GIPRI, 1989.
Find full textNational Workshop on Social Security Protection (1996 Pasig City, Manila, Philippines). Social security protection in the Philippines: Proceedings of the National Workshop on Social Security Protection, Manila Galleria Suites, Pasig City, Philippines, 30-31 July 1996. [Manila]: Institute for Labor Studies with technical assistance from the United Nations Development Programme and the International Labour Organisation, 1996.
Find full textOracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.
Find full textAbel, John. Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.
Find full textTeam, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.
Find full textTeam, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.
Find full text1972-, Ng Tinny, ed. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.
Find full text1972-, Ng Tinny, ed. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.
Find full text1972-, Ng Tinny, ed. Understanding IBM SOA foundation suite: Learning visually with examples. Indianapolis, Ind: IBM Press, 2009.
Find full textBook chapters on the topic "Security Suite"
Hankerson, Darrel, and Alfred Menezes. "NSA Suite B." In Encyclopedia of Cryptography and Security, 857. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_648.
Full textZaheer, Syed, and Erman Arslan. "An Introduction to Oracle EBS Security." In Practical Oracle E-Business Suite, 641–74. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1422-0_12.
Full textPerois, Jean. "Selling Your Security Program to the C-Suite." In Strategic Security, 25–46. 1 Edition. | New York : Routledge, 2019.: CRC Press, 2019. http://dx.doi.org/10.4324/9781351123464-2.
Full textWilliams, Anthony A. "Capital Connections: Washington’s Public Safety Communications Suite." In Safeguarding Homeland Security, 241–52. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-1-4419-0371-6_22.
Full textNoel, Steven, and Sushil Jajodia. "A Suite of Metrics for Network Attack Graph Analytics." In Network Security Metrics, 141–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_7.
Full textde Ruiter, Joeri, and Erik Poll. "Formal Analysis of the EMV Protocol Suite." In Theory of Security and Applications, 113–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27375-9_7.
Full textJang, Jihyeon, Stephen J. Elliott, and Hakil Kim. "Implementation of BioAPI Conformance Test Suite Using BSP Testing Model." In Information Security Applications, 48–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_4.
Full textFamiliar, Bob, and Jeff Barnes. "Security and Identity." In Business in Real-Time Using Azure IoT and Cortana Intelligence Suite, 475–516. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2650-6_10.
Full textMoura, Ricardo, David R. Matos, Miguel L. Pardal, and Miguel Correia. "MultiTLS: Secure Communication Channels with Cipher Suite Diversity." In ICT Systems Security and Privacy Protection, 64–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.
Full textSýs, Marek, and Zdeněk Říha. "Faster Randomness Testing with the NIST Statistical Test Suite." In Security, Privacy, and Applied Cryptography Engineering, 272–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12060-7_18.
Full textConference papers on the topic "Security Suite"
Rapanotti, John. "Vehicle-network defensive aids suite." In Defense and Security, edited by Dawn A. Trevisani and Alex F. Sisti. SPIE, 2005. http://dx.doi.org/10.1117/12.603615.
Full textGranade, Stephen R. "Rendezvous and docking sensor suite." In Defense and Security Symposium, edited by Richard T. Howard and Robert D. Richards. SPIE, 2006. http://dx.doi.org/10.1117/12.666797.
Full text"FREE SECURITY SUITE 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002231003410344.
Full textBerger, Bernhard J., Karsten Sohr, and Rainer Koschke. "The Architectural Security Tool Suite — ARCHSEC." In 2019 IEEE 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2019. http://dx.doi.org/10.1109/scam.2019.00035.
Full textKrishnan, Deepa, and Madhumita Chatterjee. "Cloud security management suite — Security As a Service." In 2012 World Congress on Information and Communication Technologies (WICT). IEEE, 2012. http://dx.doi.org/10.1109/wict.2012.6409116.
Full textRoe, Fred, and Stephen R. Granade. "Hydra AR&D sensor suite." In Defense and Security Symposium, edited by Richard T. Howard and Robert D. Richards. SPIE, 2007. http://dx.doi.org/10.1117/12.719328.
Full textMontgomery, Joel B., Richard B. Sanderson, John F. McCalmont, R. S. Johnson, D. J. McDermott, and M. J. Taylor. "An advanced missile warning processing suite." In SPIE Defense and Security Symposium, edited by Oliver E. Drummond. SPIE, 2008. http://dx.doi.org/10.1117/12.778662.
Full textMaenner, Paul F. "Emerging standards suite for wide-area ISR." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.919806.
Full textTopiwala, Pankaj N., and David P. Casasent. "Correlation-based target detection for the Navy's SHARP sensor suite." In Defense and Security, edited by Firooz A. Sadjadi. SPIE, 2004. http://dx.doi.org/10.1117/12.542328.
Full textCoakley, Monica M., Michael W. Kelly, William J. Blackwell, Danette P. Ryan-Howard, Harry R. Finkle, Steven Kirkner, Andrew Carson, and Gene Martin. "Hyperspectral environmental suite for the Geostationary Operational Environmental Satellite (GOES)." In Defense and Security, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2004. http://dx.doi.org/10.1117/12.543503.
Full textReports on the topic "Security Suite"
Aldrich, Susan. EASI Security Unifier Suite: Security Backplane from Quadrasis. Boston, MA: Patricia Seybold Group, February 2003. http://dx.doi.org/10.1571/pr2-6-03cc.
Full textBurgin, K., and M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, October 2011. http://dx.doi.org/10.17487/rfc6380.
Full textSalter, M., and R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, January 2012. http://dx.doi.org/10.17487/rfc6460.
Full textSalter, M., E. Rescorla, and R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5430.
Full textJenkins, M., and L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8756.
Full textJenkins, M., and L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, May 2019. http://dx.doi.org/10.17487/rfc8603.
Full textJenkins, M. Using Commercial National Security Algorithm Suite Algorithms in Secure/Multipurpose Internet Mail Extensions. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8755.
Full textBadra, M., and I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5489.
Full textMcGrew, D., and D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, July 2012. http://dx.doi.org/10.17487/rfc6655.
Full textLangley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson, and S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, June 2016. http://dx.doi.org/10.17487/rfc7905.
Full text