Добірка наукової літератури з теми "CD Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "CD Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "CD Security"
Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (January 1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.
Повний текст джерелаHo-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (July 30, 2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Повний текст джерелаTipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (September 1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.
Повний текст джерелаBelsky, Jay, and Michael Rovine. "Q-Sort security and first-year nonmaternal care." New Directions for Child and Adolescent Development 1990, no. 49 (1990): 7–22. http://dx.doi.org/10.1002/cd.23219904903.
Повний текст джерелаWeimer, Katherine H., Laura Lillard, Wendi Arant, and David Mitchell. "Security and Access to CD-ROMs Accompanying Books." Library Resources & Technical Services 44, no. 4 (October 1, 2000): 201–8. http://dx.doi.org/10.5860/lrts.44n4.201.
Повний текст джерелаZhao, Li, Fei Juan Wang, Hui Yang, Yu Xing Duan, and Chen Zhu. "Impacts of Nitrogen (Urea) Fertilization on Cadmium Accumulation Nitrate Contents and Nutritive Values in Chinese Cabbage." Advanced Materials Research 393-395 (November 2011): 809–17. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.809.
Повний текст джерелаHu, Ji, and Christoph Meinel. "Tele-Lab “IT-Security” on CD: portable, reliable and safe IT security training." Computers & Security 23, no. 4 (June 2004): 282–89. http://dx.doi.org/10.1016/j.cose.2004.02.005.
Повний текст джерелаXia, Shiwei, Liangyun Song, Yi Wu, Zhoujun Ma, Jiangping Jing, Zhaohao Ding, and Gengyin Li. "An Integrated LHS–CD Approach for Power System Security Risk Assessment with Consideration of Source–Network and Load Uncertainties." Processes 7, no. 12 (December 2, 2019): 900. http://dx.doi.org/10.3390/pr7120900.
Повний текст джерелаNardone, Claudia, Simone Russo, Simone Gazzillo, Raffaele Migliorini, Marco Trabucco Aurilio, and Francesco Saverio Mennini. "PP36 Inflammatory Bowel Disease: The Disability Costs Among Italian Workers." International Journal of Technology Assessment in Health Care 35, S1 (2019): 44. http://dx.doi.org/10.1017/s0266462319001995.
Повний текст джерелаLinsmeier, Thomas J., Gerald J. Lobo, and George K. Kanaan. "Dispersion in Industry Price Changes and the Relative Association between Alternative Income Measures and Security Returns." Journal of Accounting, Auditing & Finance 10, no. 2 (April 1995): 365–79. http://dx.doi.org/10.1177/0148558x9501000211.
Повний текст джерелаДисертації з теми "CD Security"
Raižys, Artūras. "Duomenų apsaugos metodai CD/DVD laikmenoms." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_114615-63291.
Повний текст джерелаIn the current world data is one the most valued items. Loss of relevant and secret data may cause huge material harm. Grant sums of money are spent for data security methods. In the paper the available tools and methods of data security are analyzed, security methods for CD and DVD media are discussed. The information collected on the data copy-protect and cryptography as well as use security is used in an experiment aiming to identify the most fitting methods for software of data security. The implementation of the experiment is aimed at checking the time input for cryptography algorithms. For this purpose the crypt and decrypt operations with 10 MB and100 MB files are performed. The developed system allows to keep data safe from illegal review and use in CD and DVD. Safety data records developed with the help of the system may be used without any extra software in other computers in which Windows XP/Vista/Win7 operation system is installed.
Persson, Simone. "List of Security Concerns within Continuous Software Evolution." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.
Повний текст джерелаI en tid då mängden data som samlas in om individer ökar i ohindrad takt, blir frågor om integritet och informationssäkerhet viktigare än någonsin. Kraven på snabb utveckling och förändring präglar även metoderna för mjukvaruutveckling. Produkter och tjänster måste konstant anpassas efter kundernas önskemål för att förbli relevant på marknaden. Arbetssätt och teknologier har utvecklats över tid för att möjliggöra mjukvara som uppdateras kontinuerligt. Konstant föränderlig mjukvara leder dock till oro för kvalitén och säkerheten av uppdateringarna. Den här uppsatsen är en litteraturstudie som undersöker utmaningarna att säkerställa säkerhet för mjukvara som uppdateras kontinuerligt. Problemet som löses genom studien är den saknade helhetsbilden av säkerhetsproblem vid kontinuerligt föränderlig mjukvara. Resultatet sammanfattas i en checklista för områden som väcker oro för säkerheten vid arbetssätt som tillåter kontinuerliga uppdateringar i moln-miljöer. Studien visar att leverera säkra lösningar kontinuerligt är en svår uppgift. Det kräver nära samarbete mellan team som sköter olika delar av mjukvaruutveckling. Detta fordrar vida kompetenser som inkluderar förståelse av varandras arbete. Att finna personal med tillräckligt vida kompetenser uppskattas vara problematiskt.
Moriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.
Повний текст джерелаThis thesis explores data-driven approaches for automated root cause analysis of CI/CD build failures, focusing on identifying non-deterministic failures, locating root cause messages in build logs, and characterizing CI/CD systems' performance and security. Grounded on public and industrial datasets, we explore CI/CD workflow properties, such as execution times and failure patterns. The research introduces the use of Natural Language Processing (NLP) and Knowledge Graphs Embeddings (KGE) for classifying build failures with a 94% accuracy. Additionally, we introduce ChangeMyMind, a new method based on Recurrent Neural Networks (RNNs) to accurately locate root cause messages in build logs without prior labeling of root cause messages. We propose X-Ray-TLS, a generic and transparent approach for inspecting TLS-encrypted network traffic in CI/CD environments. Finally, the thesis also revisits security vulnerabilities in CI/CD systems, demonstrating the potential for undetectable long-term compromises. This work has resulted in three publications and two under-review submissions, contributing significantly to CI/CD system analysis and optimization
Arnold, Brose, Kupfer, Müller, Richter, Riedel, Schier, Trapp, and Ziegler. "Mitteilungen des URZ 3/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401111.
Повний текст джерелаBrás, André Emanuel Raínho. "Container security in CI/CD pipelines." Master's thesis, 2021. http://hdl.handle.net/10773/31292.
Повний текст джерелаA ascensão da estratégia DevOps e a transição de uma economia de produto para uma economia de serviços conduziu a mudanças significativas no paradigma do ciclo de vida do desenvolvimento de software, entre as quais o abandono do modelo em cascata em favor de métodos ágeis. Uma vez que o DevOps é parte integrante de um método ágil, permite-nos monitorizar as versões actuais, recebendo feedback constante dos clientes, e melhorando as próximas versões de software. Apesar do seu extraordinário desenvolvimento, o DevOps ainda apresenta limitações relativas à segurança, que necessita de ser incluída nas pipelines de integração contínua ou implantação contínua (CI/CD) utilizadas no desenvolvimento de software. A adopção em massa de serviços na nuvem e software aberto, a ampla difusão de contentores e respectiva orquestração bem como das arquitecturas de micro-serviços, quebraram assim todos os modelos convencionais de desenvolvimento de software. Devido a estas novas tecnologias, a preparação e expedição de novo software é hoje em dia feita em curtos períodos temporais e ficando disponível quase instantaneamente a utilizadores em todo o mundo. Face a estes fatores, a abordagem habitual que adiciona segurança ao final do ciclo de vida do desenvolvimento de software está a tornar-se obsoleta, sendo crucial adotar metodologias DevSecOps ou SecDevOps, injetando a segurança mais cedo nos processos de desenvolvimento de software e impedindo que defeitos ou problemas de segurança fluam para os ambientes de produção. O objectivo desta dissertação é reduzir o impacto de vulnerabilidades em micro-serviços através do exame das respectivas imagens e contentores por um conjunto flexível e adaptável de ferramentas de análise que funcionam em pipelines CI/CD dedicadas. Esta abordagem pretende fornecer uma coleção limpa e segura de micro-serviços para posteriormente serem lançados em ambientes de produção na nuvem. Para atingir este objectivo, desenvolvemos uma solução que permite programar e orquestrar uma bateria de testes. Existe um formulário onde podemos seleccionar várias ferramentas de análise de segurança, e a solução executa este conjunto de testes de uma forma controlada de acordo com as dependências definidas. Para demonstrar a eficácia da solução, programamos um conjunto de testes para diferentes cenários, definindo as pipelines de análise de segurança para incorporar várias ferramentas. Finalmente, mostraremos ferramentas de segurança a funcionar localmente, que posteriormente integradas na nossa solução devolvem os mesmos resultados.
Mestrado em Engenharia Informática
Zhygulskyy, Mykyta. "AUTOMATED, SCHEDULED AND CI /CD WEB INJECTION." Master's thesis, 2021. http://hdl.handle.net/10400.8/5786.
Повний текст джерелаКниги з теми "CD Security"
United States. Federal Trade Commission., ed. Business Briefcase, Now With Information Security Guide, (CD-ROM). [S.l: s.n., 2009.
Знайти повний текст джерелаDulaney, Emmett A. CompTIA Security+TM Study Guide. New York: John Wiley & Sons, Ltd., 2010.
Знайти повний текст джерелаJörn, Mothes, ed. Beschädigte Seelen: DDR-Jugend und Staatssicherheit : mit 136 Dokumenten und einer Audi-CD mit Original-Tonunterlagen. Bremen: Edition Temmen, 1996.
Знайти повний текст джерелаSpafford. Security Companion CD. O'Reilly Media, 2003.
Знайти повний текст джерелаDcd2, Master Carton 1000 Acscot. Cd/Cd-Rom Tattle Tape Security Strips. SCOTCH BLANK TAPE, 1996.
Знайти повний текст джерелаMedia, Syngress. The Ultimate Techno Security CD. Syngress, 2005.
Знайти повний текст джерелаRogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Syngress, 2007.
Знайти повний текст джерелаWolfe, Paul. CompTIA Security + VTC Training CD. Virtual Training Company Inc, 2004.
Знайти повний текст джерелаRogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Elsevier Science & Technology Books, 2007.
Знайти повний текст джерелаBrad Causey & Bobby Rogers. Linux Security VTC Training CD. Virtual Training Company, Inc., 2006.
Знайти повний текст джерелаЧастини книг з теми "CD Security"
Dingare, Pranoday Pramod. "Managing Security with Jenkins." In CI/CD Pipeline Using Jenkins Unleashed, 55–67. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_7.
Повний текст джерелаMoelyaningrum, Anita Dewi. "The Potential of Cacao Pod Rind Waste (Theobroma cacao) to Adsorb Heavy Metal (Pb and Cd) in Water." In Sustainable Future for Human Security, 265–76. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5433-4_18.
Повний текст джерелаFroehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "Initial Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD)." In The United Nations and Space Security, 7–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_2.
Повний текст джерелаKuvendziev, Stefan, Mirko Marinkovski, Kiril Lisichkov, and Perica Paunović. "Artificial Neural Network Modeling of Cd(II) Ions Adsorption on Nano-porous Inorganic Sorbents." In Nanoscience Advances in CBRN Agents Detection, Information and Energy Security, 469–76. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9697-2_48.
Повний текст джерелаSmulders, Marinus J. M., Luud J. W. J. Gilissen, Martina Juranić, Jan G. Schaart, and Clemens C. M. van de Wiel. "Gene Editing of Wheat to Reduce Coeliac Disease Epitopes in Gluten." In A Roadmap for Plant Genome Editing, 203–22. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-46150-7_13.
Повний текст джерелаFroehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "The Development of the Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD) and the Collaboration Between the Forums." In The United Nations and Space Security, 29–106. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_3.
Повний текст джерелаDakic, Vedran, Jasmin Redzepagic, and Matej Basic. "CI/CD Toolset Security." In DAAAM Proceedings, 0161–64. DAAAM International Vienna, 2022. http://dx.doi.org/10.2507/33rd.daaam.proceedings.022.
Повний текст джерелаBowman, Gerald, Ben Rothke, Christopher Steinke, Bruce Matthews, Alan Brusewitz, David Litzau, Tom Peltier, George Richards, and Jaymes Williams. "Physical Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch10.
Повний текст джерелаHerrmann, Debra, Ben Rothke, Robert Slade, Ralph Spencer Poore, Jeff Davis, Todd Fitzgerald, Stephen Fried, et al. "Outsourcing Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch3.
Повний текст джерелаSilberschatz, Avi, Henry Korth, S. Sudarshan, Dennis Shasha, Philippe Bonnet, Betty Salzberg, Donghui Zhang, et al. "Database Security and Privacy." In Computer Science Handbook, Second Edition CD-ROM. CRC Press, 2004. http://dx.doi.org/10.1201/9780203494455.sec6.
Повний текст джерелаТези доповідей конференцій з теми "CD Security"
Gugueoth, Vinay Kumar. "Enhanced Security Attack Detection and Prevention in 5G Networks Using CD-GELU-CNN and FMLRQC with HDFS-ECH-KMEANS." In 2024 8th International Conference on Computer, Software and Modeling (ICCSM), 36–43. IEEE, 2024. http://dx.doi.org/10.1109/iccsm63823.2024.00015.
Повний текст джерелаBi, Chuanxue, and Nenad Jukic. "A security paradigm for Web databases." In the 37th annual Southeast regional conference (CD-ROM). New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/306363.306420.
Повний текст джерелаDixson, Ronald, Boon Ping Ng, Craig D. McGray, Ndubuisi G. Orji, and Jon Geist. "Progress on CD-AFM tip width calibration standards." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.921597.
Повний текст джерелаHaigh, Mary K., Geoffrey R. Nash, Neil T. Gordon, James Edwards, Alan J. Hydes, David J. Hall, Andrew Graham, Jean Giess, Janet E. Hails, and Tim Ashley. "Progress in negative luminescent Hg 1-x Cd x Te diode arrays." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2005. http://dx.doi.org/10.1117/12.603292.
Повний текст джерелаChekanova, Galina V., Ivan Y. Lartsev, Mikhail S. Nikitin, Viacheslav G. Artyushenko, Vladimir A. Lobachev, Albina A. Drugova, Viacheslav A. Kholodnov, and Jim T. Ingram. "LWIR and VLWIR Hg 1-x Cd x Te photoconductors with improved responsivity." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.542056.
Повний текст джерелаVillanger, Asta, Trond Brudevoll, and Knut Stenersen. "IR laser induced heating in Hg 0.72 Cd 0.28 Te." In Optics/Photonics in Security and Defence, edited by David H. Titterton. SPIE, 2006. http://dx.doi.org/10.1117/12.689696.
Повний текст джерелаIrmler, Frank, and Reiner Creutzburg. "Possibilities of forensic investigation of CD, DVD and Blu-ray disc." In SPIE Defense, Security, and Sensing, edited by Sos S. Agaian, Sabah A. Jassim, and Yingzi Du. SPIE, 2011. http://dx.doi.org/10.1117/12.886118.
Повний текст джерелаGordon, Neil T., Chris L. Jones, David J. Lees, Chris D. Maxey, Tim S. Phillips, Les G. Hipwood, Paul C. Haynes, and Rose A. Catchpole. "High-performance 2D MWIR Hg 1-x Cd x Te array operating at 220K." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.544485.
Повний текст джерелаKeerthana, Bondugulapati, and Dr K. Ramakrishna. "Multiple Approach to Detect Duplicates in CD-Dataset." In National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics. AI Publications, 2016. http://dx.doi.org/10.22161/ijaers/si.18.
Повний текст джерелаHusain, Mohammad Iftekhar, Suyash Mahant, and Ramalingam Sridhar. "CD-PHY: Physical layer security in wireless networks through constellation diversity." In MILCOM 2012 - 2012 IEEE Military Communications Conference. IEEE, 2012. http://dx.doi.org/10.1109/milcom.2012.6415627.
Повний текст джерелаЗвіти організацій з теми "CD Security"
D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), August 2023. http://dx.doi.org/10.2172/2430395.
Повний текст джерелаChandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.
Повний текст джерелаSebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, August 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.
Повний текст джерелаSebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, August 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.
Повний текст джерела