Dissertations / Theses on the topic 'Security Suite'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 dissertations / theses for your research on the topic 'Security Suite.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bartoli, Andrea. "Security protocols suite for machine-to-machine systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.
Full textJohansson, Michael. "Internet of things security in healthcare : A test-suite and standard review." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.
Full textMcCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.
Full textKohout, David. "Implementace zabezpečení do DLMS protokolu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.
Full textMarchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Full textTřeštíková, Lenka. "Bezpečnostní metriky platformy SAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.
Full textRobert, Emilie. "L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001." Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.
Full textRehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.
Full textMoyer, Shawn P. "Creating a mix of spooks and suits : a new role for intelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.
Full textZiani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.
Full textNagy, Jan. "Zabezpečení bezdrátových senzorových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412805.
Full textWang, Qianxue. "Création et évaluation statistique d'une nouvelle de générateurs pseudo-aléatoires chaotiques." Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2031.
Full textSmall, Jeremiah. "Patterns in network security: an analysis of architectural complexity in securing recursive inter-network architecture networks." Thesis, 2012. https://hdl.handle.net/2144/17155.
Full textDollar, Timothy Wayne. "Ensuring document security, user coordination, and multimedia synchronization in a prototype groupware suite." 1997. http://catalog.hathitrust.org/api/volumes/oclc/39271833.html.
Full textHertenberger, Manfred Paul. "A reference framework for security in enterprise resource planning (ERP) systems." Thesis, 2008. http://hdl.handle.net/10210/496.
Full textBoshoff, Paul Marthinus. "Securing host and application information in the TCP/IP protocol suite." Thesis, 2012. http://hdl.handle.net/10210/5673.
Full textchiao-ju, chuang, and 莊喬汝. "The Study on the Suits and the Causation of Security Fraud." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41675261778053174337.
Full textWidyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.
Full textChuang, Wen-Chi, and 莊玟琦. "A Study of the Sense-of-security of Single Female College Students in Off-campus Rental Suites." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/28081919124317626086.
Full textChu, Wan-Ting, and 朱婉婷. "Security v.s. Child endorser match-up?--Best suited to the endorser for the airline’s advertising communication effect." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/6k9nrq.
Full text