To see the other types of publications on this topic, follow the link: Defence of information.

Dissertations / Theses on the topic 'Defence of information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Defence of information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Taylor, Jayne Louise. "Information processing & defence in psychosis." Thesis, Teesside University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518735.

Full text
Abstract:
In recent years, previous research has indicated that symptoms such as delusional beliefs may have a defensive function against underlying negative schemata (Candido & Romney, 1991; Lyon et al. 1994). However, hitherto research has failed to examine information processing in psychosis across the processing spectrum. The aim of the present research was to investigate cognitive functioning in psychosis on several tasks operating at different levels of conscious and non-conscious processing in order to ascertain at what level the defence operates. The research also investigated the impact of pers
APA, Harvard, Vancouver, ISO, and other styles
2

Deakin, Robert Luke. "Economic information warfare : analysis of the relationship between the protection of financial information infrastructure and Australia's national security." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15900/1/Robert_Deakin_Thesis.pdf.

Full text
Abstract:
The thesis presents an argument for the re-alignment of Australia's National Security efforts so that they mirror the changes occurring in our economy and society. Specifically, it seeks outcomes that can focus our efforts in protecting the critical infrastructure including our financial information infrastructure, from new and emerging threats. The thesis presents a definition of security as it applies to the Nation-State and provides the evidence of the changes in conflict and global security. It outlines the changes in the National Security environment and identifies emerging forms o
APA, Harvard, Vancouver, ISO, and other styles
3

Deakin, Robert Luke. "Economic Information Warfare : Analysis of the relationship between the protection of Financial Information Infrastructure and Australia's National Security." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15900/.

Full text
Abstract:
The thesis presents an argument for the re-alignment of Australia's National Security efforts so that they mirror the changes occurring in our economy and society. Specifically, it seeks outcomes that can focus our efforts in protecting the critical infrastructure including our financial information infrastructure, from new and emerging threats. The thesis presents a definition of security as it applies to the Nation-State and provides the evidence of the changes in conflict and global security. It outlines the changes in the National Security environment and identifies emerging forms of co
APA, Harvard, Vancouver, ISO, and other styles
4

Stiff, Harald. "Explainable AI as a Defence Mechanism for Adversarial Examples." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.

Full text
Abstract:
Deep learning is the gold standard for image classification tasks. With its introduction came many impressive improvements in computer vision outperforming all of the earlier machine learning models. However, in contrast to the success it has been shown that deep neural networks are easily fooled by adversarial examples, data that have been modified slightly to cause the neural networks to make incorrect classifications. This significant disadvantage has caused an increased doubt in neural networks and it has been questioned whether or not they are safe to use in practice. In this thesis we pr
APA, Harvard, Vancouver, ISO, and other styles
5

Bester, Christoffel. "The management of information inside the general support base concept of the South African National Defence Force." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/16475.

Full text
Abstract:
Thesis (MMil)--Stellenbosch University, 2003.<br>ENGLISH ABSTRACT: Managing any government institution has become increasingly complicated as the requirements for accountability; streamlined operations and greater flexibility have multiplied. As effective and efficient management becomes more complex and the demands of constant change are more insistent, consequently the role of information as an organisational resource assumes greater importance for management on all levels inside the organisation. Management relies heavily on information to thrive. The value of information is derived fr
APA, Harvard, Vancouver, ISO, and other styles
6

Pullinger, Stephen Bernard. "Parliament and the defence debate : the generation, provision and use of specialist information." Thesis, University of Bradford, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.235642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weiss, Alexander Peter William. "The use of commercial off-the-shelf information technology in operational defence equipment." Thesis, University College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karlsson, Terése. "Contingency planning for Bofors Defence AB, an application of existing methods." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1639.

Full text
Abstract:
<p>Bofors Defence AB is in the process of updating and documenting the company’s routines for information security. The object is to be certified according to the standard ISO 17799-1 during 2003. Among other things updating means that the company will be provided with contingency plans who should insure a reliable IT-environment. Basically it is all about protecting the company’s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities. The aim of the Thesis was to apply existing methods in the making of contingency plans. T
APA, Harvard, Vancouver, ISO, and other styles
9

Björklund, Kristoffer. "What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104886.

Full text
Abstract:
Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. Through a literature review, this thesis explores prevalent techniques used by attackers and their efficacy. Furthermore, it investigates detection techniques and defensive measures against stegomalware. The results show that embedding information in images is common for exfiltrating data or sending smaller files to an infected host. Wor
APA, Harvard, Vancouver, ISO, and other styles
10

Lekhawatthanapong, Thattaporn. "Establishing statutory ground for the public interest defence under international copyright law." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/50736/.

Full text
Abstract:
Maintaining a fair balance between individuals’ interests and the public interest is arguably believed to be the most effective approach in serving the ultimate objective of copyright: to promote social, economic and cultural development for the benefit of both rightsholders and the public at large. Through this balanced approach, creativity can be maximised and thrive better than by tilting towards one or the other. In copyright law, such balance is reflected by the way in which the short-term grant of exclusive rights respects the long-term public interest represented by limitations and exce
APA, Harvard, Vancouver, ISO, and other styles
11

Calbert, Gregory. "Information, game theory and patch defence in the parasitic wasp Trissolcus basalis Wollaston (Hymenoptera : Scelionidae) /." Title page, contents and summary only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phc143.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Eccleston, Anthony L., and n/a. "Coordinating information provision in government agencies using an integrated information management strategy." University of Canberra. Information, Language & Culture Studies, 1996. http://erl.canberra.edu.au./public/adt-AUC20060404.123006.

Full text
Abstract:
The specific aims of this study were determined on a conceptual appreciation that management of information assets and services in some government agencies was deficient in meeting both existing and developing demands. This appreciation manifested itself in a commitment to investigate the principles and processes intrinsic to existing management methodologies, to relate these processes to the needs of users, and to determine a strategy which could more ably meet the information provision requirements of those users. The achievement of these aims predicated the use of the case study research me
APA, Harvard, Vancouver, ISO, and other styles
13

Compton, Shane M., and n/a. "Information technology implementation and acceptance: a case study of change management." University of Canberra. Applied Science, 2002. http://erl.canberra.edu.au./public/adt-AUC20050331.145848.

Full text
Abstract:
The implementation of a new Information Technology in an organization represents a significant change. Little research, however, has been conducted on the collective power of Information Technology acceptance and change management. The current research seeks to integrate a prominent model of technology acceptance and change management theory to develop an holistic approach to Information Technology implementation and acceptance. Using Davis' (1989) Technology Acceptance Model (TAM) (Attitude) and Beer, Eisenstat and Specter's (1990) six step model of change (Change), this three phase longitudi
APA, Harvard, Vancouver, ISO, and other styles
14

Gavėnavičius, Vytautas. "Krašto apsaugos sistemos personalo duomenų analizės ir kontrolės posistemė." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060115_225641-21825.

Full text
Abstract:
Successful factor of the performance of each company or organisation is a well and adequately organised management and record keeping of personnel. At present, the staff administrating the personnel records of the National defence system of Lithuania (hereinafter - NDS) for recording and analysis of personnel data users Baltpers information system for personnel account for NDS. The analysis carried out in the Master‘s paper proved that the data controls and functions implemented in Baltpers system do not correspond with certain needs of the NDS personnel specialists. The Master‘s paper suggest
APA, Harvard, Vancouver, ISO, and other styles
15

Rudman, Lauren Lynne. "NetwIOC: a framework for the automated generation of network-based IOCS for malware information sharing and defence." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/60639.

Full text
Abstract:
With the substantial number of new malware variants found each day, it is useful to have an efficient way to retrieve Indicators of Compromise (IOCs) from the malware in a format suitable for sharing and detection. In the past, these indicators were manually created after inspection of binary samples and network traffic. The Cuckoo Sandbox, is an existing dynamic malware analysis system which meets the requirements for the proposed framework and was extended by adding a few custom modules. This research explored a way to automate the generation of detailed network-based IOCs in a popular forma
APA, Harvard, Vancouver, ISO, and other styles
16

Hållsten, Henrik. "Explanation and deduction : a defence of deductive chauvinism." Doctoral thesis, Stockholms universitet, Filosofiska institutionen, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-72182.

Full text
Abstract:
In this essay I defend the notion of deductive explanation mainly against two types of putative counterexamples: those found in genuinely indeterministic systems and those found in complex dynamic systems. Using Railton's notions of explanatory information and ideal explanatory text, deductivism is defended in an indeterministic setting. Furthermore, an argument against non-deductivism that hinges on peculiarities of probabilistic causality is presented. The use of the notion of an ideal explanatory text gives rise to problems in accounting for explanations in complex dynamic systems, regardle
APA, Harvard, Vancouver, ISO, and other styles
17

Broos, Elizabeth. "Information, communication and technological competencies in a digital working environment a case study in the Netherlands Defence Organization /." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-06182008-115804/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Opasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.

Full text
Abstract:
As advancement and usage of data communication has increased exponentially on a global scale, with a devastating exposure to attacks and varying security threats to home offices as well as to large enterprises, there is always a need for enhanced network protection. The IT department of the company OneDefence, located in western Sweden, was chosen for the thesis and based on the stated information from the organisation, aims were set on how to improve their network defence capabilities. The aim of this thesis is to list ten countries posing the most serious IT threats, and to limit the attack
APA, Harvard, Vancouver, ISO, and other styles
19

Ioannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.

Full text
Abstract:
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents concerned with critical information exfiltration from High Valued Targets (HVT's) by terrorists, cyber criminals or enemy states. Existing Cyber Defence frameworks and data fusion models do not adequately address (i) the multi-stage nature of XAPTs and (ii) the uncertainty and conflicting information associated with XAPTs. A new data fusion theory, called the Markov Multi-phase Transferable Belief Model (MM-TBM) is developed, for tracking and predicting XAPTs. MM-TBM expands the attack kill-chain model to attac
APA, Harvard, Vancouver, ISO, and other styles
20

Jenvald, Mattias, and Mikael Hovmöller. "Reducing Delays for Unplanned Maintenance of Service Parts in MRO Workshops : A case study at an aerospace and defence company." Thesis, Linköpings universitet, Produktionsekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167203.

Full text
Abstract:
Service parts sometimes break down unexpectedly and require maintenance. The irregular nature of the need for this type of maintenance makes forecasting difficult and unreliable. Saab currently experiences problems with long delays when performing unplanned maintenance of service parts used in the two models of Gripen aircraft, Gripen C and Gripen D. These delays are source of monetary waste, as late delivery of maintained service parts results in Saab having to pay penalty fines to the customers. The purpose of this master thesis was to analyze data collected during a case study at Saab in Li
APA, Harvard, Vancouver, ISO, and other styles
21

Горбатенко, Д. С. "Комплексний підхід у сфері захисту інформації". Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/34068.

Full text
Abstract:
Під захистом інформації слід розуміти використання засобів і методів, вжиття відповідних заходів з метою системного забезпечення необхідної надійності збереженої й оброблюваної інформації. При цитуванні документа, використовуйте посилання http://essuir.sumdu.edu.ua/handle/123456789/34068
APA, Harvard, Vancouver, ISO, and other styles
22

Maddison, A. "The impact of critical success factors on government IT projects : a case study of the Defence Information Infrastructure Programme." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8766.

Full text
Abstract:
Government IT mega-projects often end in costly failure, despite attempts to identify those Critical Success Factors (CSFs) that lead to project success. This raises questions about whether these CSFs are understood, applied and, if so, whether they are having an impact on the management and subsequent performance of government IT mega-projects. The literature review compared CSFs from the generic and IT project management literature to find that they are broadly similar. CSF frameworks were then assessed to find a measure of the impact of CSFs and a measure of ‘performance’ was also defined.
APA, Harvard, Vancouver, ISO, and other styles
23

Ehlin, Max. "An overview of Product Service System through Integrated Vehicle Health Management in an information sensitive industry." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75861.

Full text
Abstract:
Purpose – The research purpose is to enhance knowledge of how organizations can form a PSS through an IVHM system when information is sensitive. Method – A single case study design of abductive approach was used, with data collection through six semi-structured interviews. Findings – A system combining IVHM and PSS has many potential benefits, however there are several challenges that need to be overcome in order to implementing a successful model. Theoretical implications – This study treads a new area not previously explored in the literature when it combines PSS and IVHM, which relies heav
APA, Harvard, Vancouver, ISO, and other styles
24

Tsirigotis, Anthimos Alexandros. "Discourse on war in the Information Age : Corpus Assisted Discourse Analysis of the British Defence and Security policies from 1957 to 2011." Thesis, University of Reading, 2015. http://centaur.reading.ac.uk/76519/.

Full text
Abstract:
Are future wars between states going to be waged in cyberspace without the necessity of mobilisation of armed forces? In the literature, on the one hand, pundits argue that cyber attacks against the critical infrastructure of states resemble war operations and consider these as the new face of bellicosity. On the other hand, it is argued that cyber weapons do not change the conduct of war because targeting critical infrastructure or defacing web pages is not sufficient to make adversary states comply. For this school of thought, war remains always a mixture of chance, passion and rationality.
APA, Harvard, Vancouver, ISO, and other styles
25

Украинец, Ирина Васильевна, Руслан Николаевич Литнарович, Iryna Vasylivna Ukrainets, Ruslan Mykolaiovych Litnarovich та Руслан Миколайович Літнарович. "Аналіз і дослідження криптографічних засобів захисту інформації на базі «Укргазбанк»". Thesis, Міжнародний економіко-гуманітарний універсиитет імені академіка Степана Дем'янчука, 2012. http://elartu.tntu.edu.ua/handle/123456789/1569.

Full text
Abstract:
Практична значимість і реалізація роботи полягає в розробці програмного продукту, який є перевірений, протестований та впроваджений на базі УКРГАЗ Банку. Розроблена криптографічна система захисту інформації відповідає усім вимогам, які були поставлені до даного програмного забезпечення. Перевагою системи є забезпечення можливості її роботи на будь-якому ПК. Головною вимогою ставиться наявність NET Framework 4.0.<br>Важливість і актуальність питань захисту інформації вже давно вийшли на одне з перших місць серед інших завдань, що вирішуються в процесі проектування, створення та використання суч
APA, Harvard, Vancouver, ISO, and other styles
26

Kirsten, Frederik Fouche. "A critical analysis of the relationship between the South African Defence Force and the South African media from 1975-83." Thesis, Rhodes University, 2016. http://hdl.handle.net/10962/d1020841.

Full text
Abstract:
The main focus of this thesis is to show the nature of the relationship between the South African Defence Force and the local media from 1975-83. The thesis will analyse issues specifically relating to the nature of the relationship and show how and why they are relevant to understanding the authoritarianism of the apartheid state. The nature of the relationship will be conceptualised by way of the analogy of a marriage. The thesis will show that for the SADF the relationship was “a marriage of convenience” whereas for the media it was a “marriage of necessity”. This relationship operated with
APA, Harvard, Vancouver, ISO, and other styles
27

Du, Toit Mattheus Johannes. "The establishment, through action research, of an appropriate strategic ICT planning process for the South African Department of Defence as a diversified organisation." Thesis, Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-08082008-125042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Craveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Uddman, Lindh Carl, and Johan Norberg. "Augmented reality with holograms for combat management systems : Performance limitations for sonar tracks in a 3D map, presented with Microsoft HoloLens." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209412.

Full text
Abstract:
Technical advancements in 3D projection has recently made presentation of holographic images possible by using self-contained devices. Instead of using a screen to present objects, glasses like Microsoft HoloLens can render objects that appear as holograms around the user. SAAB Defence and Security are evaluating if this new technology can complement their command and control system 9LV Combat Management System. This degree project is a study of the technical possibilities and limitations of introducing holographic display of sonar tracks used for detecting submarines or sea mines. The project
APA, Harvard, Vancouver, ISO, and other styles
30

McGrath, Thomas M. Vargas Maurice R. "Improving information dissemination for the Defense Business Management University /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA293700.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1995.<br>Thesis advisor(s): M. Suh and S. F. Hurst. "March 1995." Includes bibliographical references. Also avaliable on microform and online.
APA, Harvard, Vancouver, ISO, and other styles
31

Trulock, Troy E. "Analysis of consolidating defense acquisition information on the Internet." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/7894.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Internet began over 30 years ago as a method of providing vital military communications following a nuclear attack. Today, due to the introduction of the World Wide Web and recent commercial interests, the Internet has grown into a multimedia source of information, and has become overloaded with information. Acquisition professionals in both the government and civilian defense acquisition sectors are attempting to use the Internet as an efficient and effective communications tool. However, due to the overloaded nature of the Interne
APA, Harvard, Vancouver, ISO, and other styles
32

McGrath, Thomas M., and Maurice R. Vargas. "Improving information dissemination for the Defense Business Management University." Thesis, Monterey, California. Naval Postgraduate School, 1995. http://hdl.handle.net/10945/7543.

Full text
Abstract:
Information has never been as accessible as it is today. The Internet has evolved into the Information Superhighway through which information can be exchanged and shared across geographic boundaries. The purpose of this thesis is to discuss the possibilities of utilizing Internet resources to meet the Department of Defense's (DoD) information dissemination needs. This thesis will look at the advantages and disadvantages of three methods for distributing information across the Internet. In order to learn more about the possibilities provided by the Internet, a case study using the Defense Busin
APA, Harvard, Vancouver, ISO, and other styles
33

Ott, Michael F. "Reengineering the Department of Defense : the Corporate Information Management initiative /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA289636.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1994.<br>Thesis advisor(s): James C. Emery, Frank J. Barrett. "September 1994." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
34

Neise, Patrick. "Graph-based Event Correlation for Network Security Defense." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10785425.

Full text
Abstract:
<p> Organizations of all types and their computer networks are constantly under threat of attack. While the overall detection time of these attacks is getting shorter, the average detection time of weeks to months allows the attacker ample time to potentially cause damage to the organization. Current detection methods are primarily signature based and typically rely on analyzing the available data sources in isolation. Any analysis of how the individual data sources relate to each other is usually a manual process, and will most likely occur as a forensic endeavor after the attack identificati
APA, Harvard, Vancouver, ISO, and other styles
35

France, Paul. "Preventing terrorism using information sharing networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FFrance.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Nadav Morag and Robert Simeral. "September 2006." Includes bibliographical references (p. 75-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
36

Webb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.

Full text
Abstract:
To determine an appropriate methodological approach for managing asymmetric threats to national security, this study investigates factors affecting Australia's national security from the information operations of terrorist groups and their use of such to conduct Information warfare. This is because personal observations and discussion with those operating In the national security arena alert to the need for research into this area. The reasoning examined provides the merit and purpose for conducting the research, and support from a myriad of parties allows it happen. This research's fundamenta
APA, Harvard, Vancouver, ISO, and other styles
37

Bellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Full text
Abstract:
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati.
APA, Harvard, Vancouver, ISO, and other styles
38

Hudson, Jerome. "Software agents and the Defense Information Infrastructure : reengineering the acquisition process." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA352554.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, September 1998.<br>"September 1998." Thesis advisor(s): Mark E. Nissen, Tung X. Bui. Includes bibliographical references (p. 113-115). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
39

Zeng, Kui. "Exploring cybersecurity requirements in the defense acquisition process." Thesis, Capitol Technology University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10165487.

Full text
Abstract:
<p> The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers innovation, enriches business, develops the economy, enhances security, fosters education, upholds democracy, and defends freedom. Despite many advantages&mdash; federal and Department of Defense cybersecurity policies and standards, the best military power equipped with the most innovative technologies in the world, and the best military and civilian workforces ready to perform any mission&mdash;the defense cyberspace is vulnerable to a variety of threats. This study explores cybersecurity re
APA, Harvard, Vancouver, ISO, and other styles
40

Dybman, Jennifer. "L'influence dans la doctrine militaire britannique : émergence et institutionnalisation d'un concept (2009-2015)." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCA135.

Full text
Abstract:
Pour faire face au nouvel environnement stratégique, opérationnel et médiatique né de la fin de la Guerre froide et surtout pour tenir compte des leçons de leur engagement en Irak et en Afghanistan, les militaires britanniques ont fait de l'influence le concept majeur de leurs opérations. En 2009, ils publient ainsi trois doctrines (stabilisation, contre-insurrection et exécution des opérations) qui font de l' « influence » le principe directeur de toute opération militaire, voire leur objectif même. En s'appuyant sur la théorie du changement dans les organisations, cette thèse retrace les rai
APA, Harvard, Vancouver, ISO, and other styles
41

Brintzinghoffer, Daniel M. "Naval Theater Ballistic Missile Defense (TBMD) : development of the information exchange requirements /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA314531.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control and Communications Systems)) Naval Postgraduate School, June 1996.<br>Thesis advisor(s): Orin E. Marvel, John Osmundson. "June 1996." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
42

Alexander, Richard David. "Insider information trading analysis of Defense companies prior to major contract awards." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Logan, Paul Robert. "A structured approach to information technology management in the Department of Defense." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA289740.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1994.<br>Thesis advisor(s): Carl R. Jones, James C. Emery. "September 1994." Bibliography: p. 3-13. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
44

Harkleroad, Joseph E. "A case study of information resource management in the Department of Defense." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23562.

Full text
Abstract:
Approved for public release; distribution unlimited.<br>This thesis develops a case study of a Department of Defense (DOD) activity that is suitable for presentation to military information resource management (IRM) students. The case will focus on the applicability of the Corporate Information Management (CIM) model as the framework for an IRM strategy for the Pacific Missile Range Facility (PMRF), Barking Sands, Hawaii. Presenting a case of organizational control and technical planning to future military managers will provide experience in analyzing problems that are unique to IRM i
APA, Harvard, Vancouver, ISO, and other styles
45

Ramorathudi, Moemedi Bini. "An enterprise information portal for cross-unit collaboration in Botswana Defense Force." Thesis, Monterey, Calif. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/6022.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis discusses the need for an information technology system to facilitate cross-unit collaboration in the Botswana Defence Force (BDF). The existing traditional means of communication and information sharing among the BDF units and bases do not meet the present requirements and may negatively impact productivity and mission readiness in the BDF. The thesis begins with a background discussion of the communication problems in the BDF and examines the problem in the context of designing and implementing an Enterprise Information Po
APA, Harvard, Vancouver, ISO, and other styles
46

Delibasis, D. "The right of states to individual self-defense in information warfare operations." Thesis, University of Westminster, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.434366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Dehlinger, Sean P. "Comparison of Department of Defense Information Technology Acquisition Processes : a case study." Thesis, Monterey, California. Naval Postgraduate School, 2001. http://hdl.handle.net/10945/1728.

Full text
Abstract:
This thesis presents a comparison and analysis of two Department of Defense (DoD) acquisition methods: the formal acquisition process and the Advanced Concept Technology Demonstration (ACTD). Both processes can be and are used by DoD to acquire information technology (IT), but while DoD has utilized the formal acquisition process for 30 years, the ACTD process is only 6 years old, and was specifically designed to improve upon the standard acquisition process (when applied to IT). By describing and studying the events surrounding, actors participating in, and results of one ACTD, this thesis wi
APA, Harvard, Vancouver, ISO, and other styles
48

Scarrott, Connie Elizabeth. "Explorations of knowledge management in a defence engineering environment." Thesis, Bournemouth University, 2003. http://eprints.bournemouth.ac.uk/300/.

Full text
Abstract:
This thesis originates from first hand early experiences of the researcher regarding current processes and practices in operation in BAE SYSTEMS Ltd (now referred to hereafter as `the Company'), and recognises the potential for improvement within the realm of knowledge management. The huge volume of internal and external information overwhelms the majority of organisations and knowledge management provides solutions to enable organisations to be effective, efficient, and competitive. The software agent approach and information retrieval technique indicates great potential for effectively manag
APA, Harvard, Vancouver, ISO, and other styles
49

Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Full text
Abstract:
A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending requests to tie up a server making it unable to answer legitimate requests. DDoS attacks are currently one of the biggest security threats on the internet according to security experts. We used a qualitative interview with experts in IT security to gather data to our research. We found that most companies are lacking both in knowledge and in their protection against DDoS attacks. The best way to minimize this threat would be to build a system with redundan
APA, Harvard, Vancouver, ISO, and other styles
50

Perry, Donnie. "Protecting small communities through domestic policing adopting an information analysis system to recognize potential terrorist activity." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FPerry.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Rasmussen, Maria ; Simeral, Robert. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Outcome Based Policing, Intelligence Sharing, Terrorism Prevention, Triangle of Terrorism, Public Safety Assessment Triangle, Domestic Preparedness Performance Model Includes bibliographical references (p. 75-77). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!