Academic literature on the topic 'Library Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Library Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Library Security"

1

Latuszek, Thomas. "Library Security." Library & Archival Security 15, no. 2 (June 22, 2000): 3–7. http://dx.doi.org/10.1300/j114v15n02_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bahr, Alice Harrison. "Library Security Training." Library & Archival Security 9, no. 1 (April 21, 1989): 37–43. http://dx.doi.org/10.1300/j114v09n01_06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abifarin, Amimbola. "Library Stock Security." Library & Archival Security 14, no. 1 (May 15, 1997): 11–19. http://dx.doi.org/10.1300/j114v14n01_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lincoln, Alan Jay, and Carol Zall Lincoln. "Patterns of Library Security." Library & Archival Security 8, no. 1-2 (September 9, 1987): 115–43. http://dx.doi.org/10.1300/j114v08n01_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chadwick, William E. "Special Collections Library Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 15–31. http://dx.doi.org/10.1300/j111v25n01_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Trinkaus-Randall, Gregor. "Library and Archival Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 91–112. http://dx.doi.org/10.1300/j111v25n01_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carey, Jeanne. "Library Security by Design." Library & Archival Security 21, no. 2 (September 11, 2008): 129–40. http://dx.doi.org/10.1080/01960070802201540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Westenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (September 11, 2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sokolov, Arkadiy V. "National Security and National Library." Bibliotekovedenie [Library and Information Science (Russia)] 68, no. 3 (July 27, 2019): 231–47. http://dx.doi.org/10.25281/0869-608x-2019-68-3-231-247.

Full text
Abstract:
The purpose of the study is to understand the mission of national library in the system of national security of Russia. The author formulates definition of national security basing on the analysis of state concepts and doctrines of national security. The national library is conceived as a humanistic resource of national security, which is protected from information wars. The author considers the components of national security: the nation at the level of individual, society and state; national values in the form of demographic stability, cultural heritage, favourable environment; hazards — hostile phenomena detrimental to the nation; types of security — the types of activities necessary to overcome external and internal hazards; resources — social institutions that ensure the integrity and sustainable development of the nation. The paper proposes definition of bibliosphere as a super-system (system of systems), carrying out production, preservation, use and further development of the national book communication. The components of bibliosphere are: professionally specialized social institutions (publishing, printing industry, book trade, librarianship, bibliography); bibliophile social and cultural movement; commercial and non-profit associations; government authorities and censorship, etc. Considering the doctrine of information security, the author notes that bibliosphere is not an element of information sphere and an object of information security. Culture is presented as a key factor in national security. The paper characterizes the dilemma of militarization and humanization of society in the post-industrial era and emphasizes the urgency of formation of moral and creative individual. The author grounds the new understanding of social mission of the national library.
APA, Harvard, Vancouver, ISO, and other styles
10

Nielsen, Erland Kolding. "Library Security Management: An Introduction." LIBER Quarterly 12, no. 4 (March 27, 2002): 293. http://dx.doi.org/10.18352/lq.7694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Library Security"

1

Liu, Hao. "Oracle ThinkQuest Library Security Issue Clean-up." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-133629.

Full text
Abstract:
As the Internet evolves and security attacks become more sophisticated, security has become one of the most challenging issues for website development and maintenance. Oracle Education Foundation (OEF funded by Oracle Corporation) maintains 7000 websites in ThinkQuest Library. These websites are developed by elementary school students, with PHP, Perl, and MySQL technologies. Because they have insufficient knowledge in website security, their websites may contain security issues and are hard for OEF to maintain. The purpose of this thesis is to seek an efficient and accurate solution to clean up the website security issues in ThinkQuest Library. The thesis consists 3 parts: improvement of Apache web server security configuration; summarizing methodology of manual fixing vulnerabilities and developing a simple script tool for security issue detection and cleaning up. These achievements can prevent illegal operations and attacks on the websites in ThinkQuest web server.
APA, Harvard, Vancouver, ISO, and other styles
2

Sterner, Robert N. "Child support does it provide economic security for single parent families /." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1992. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krishna, Emir. "Security issues on m-Commerce over 3G/UMTS /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/krishna.doc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sehdev, Rajat. "Framework for designing and implementing IS/IT information security /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/sehdev.doc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frame, Ethan Andrew. "GPUHElib and DistributedHElib: Distributed Computing Variants of HElib, a Homomorphic Encryption Library." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1407.

Full text
Abstract:
Homomorphic Encryption, an encryption scheme only developed in the last five years, allows for arbitrary operations to be performed on encrypted data. Using this scheme, a user can encrypt data, and send it to an online service. The online service can then perform an operation on the data and generate an encrypted result. This encrypted result is then sent back to the user, who decrypts it. This decryption produces the same data as if the operation performed by the online service had been performed on the unencrypted data. This is revolutionary because it allows for users to rely on online services, even untrusted online services, to perform operations on their data, without the online service gaining any knowledge from their data. A prominent implementation of homomorphic encryption is HElib. While one is able to perform homomorphic encryption with this library, there are problems with it. It, like all other homomorphic encryption libraries, is slow relative to other encryption systems. Thus there is a need to speed it up. Because homomorphic encryption will be deployed on online services, many of them distributed systems, it is natural to modify HElib to utilize some of the tools that are available on them in an attempt to speed up run times. Thus two modified libraries were designed: GPUHElib, which utilizes a GPU, and DistributedHElib, which utilizes a distributed computing design. These designs were then tested against the original library to see if they provided any speed up.
APA, Harvard, Vancouver, ISO, and other styles
6

Griffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.

Full text
Abstract:
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government contractor located in the southeastern region of the United States. Ludwig von Bertalanffy's general systems theory was used as the conceptual framework of this study. The data collection process included interviews with organization security managers (n = 5) and company documents and procedures (n = 13) from the target organization related to mobile device security. Data from the interviews and organizational documents were coded using thematic analysis. Methodological triangulation of the data uncovered 4 major themes: information security policies and procedures, security awareness, technology management tools, and defense-in-depth. The implications for positive social change from this study include the potential to enhance the organizations' security policies, cultivate a better security awareness training program, and improve the organizations data protection strategies. In addition, this study outlines some strategies for preventing data breaches caused by mobile devices while still providing maximum benefit to its external and internal customers.
APA, Harvard, Vancouver, ISO, and other styles
7

Mathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.

Full text
Abstract:
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured as a function of the user's perceived attributes of innovation represented by the independent variables: relative advantage, compatibility, complexity, observability, and trialability. The study included a cross-sectional survey distributed online to a convenience sample of 165 small businesses. Pearson correlations and multiple linear regression were used to statistically understand relationships between variables. There were no significant positive correlations between relative advantage, compatibility, and the dependent variable adoption; however, there were significant negative correlations between complexity, trialability, and the adoption. There was also a significant positive correlation between observability and the adoption. The implications for positive social change include an increase in knowledge, skill sets, and jobs for employees and increased confidentiality, integrity, and availability of systems and data for small businesses. Social benefits include improved decision making for small businesses and increased secure transactions between systems by detecting and eliminating advanced, persistent threats.
APA, Harvard, Vancouver, ISO, and other styles
8

Prakash, Aravind. "Confidential Data Dispersion using Thresholding." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/232.

Full text
Abstract:
With growing trend in "cloud computing" and increase in the data moving into the Internet, the need to store large amounts of data by service providers such as Google, Yahoo and Microsoft has increased over time. Now, more than ever, there is a need to efficiently and securely store large amounts of data. This thesis presents an implementation of a Ramp Scheme that confidentially splits a data file into a configurable number of parts or shares of equal size such that a subset of those shares can recover the data entirely. Furthermore, the implementation supports a threshold for data compromise and data verification to verify that the data parts have not been tampered with. This thesis addresses two key problems faced in large-scale data storage, namely, data availability and confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
9

Soldal, Johannes. "Lämna mig ifred : Digital övervakning och personlig integritet på svenska bibliotek." Thesis, Uppsala universitet, Institutionen för ABM, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-307921.

Full text
Abstract:
Introduction. Libraries have traditionally protected the privacy of their users. It is an ambition that is becoming increasingly difficult, with the introduction of new information technologies in libraries. This thesis consists of an examination of an incipient interest in digital security among Swedish libraries and librarians. It also consists of an examination to what degree Swedish municipality libraries are using social plugins, an information practice with potential privacy concerns, on their websites. Method. Key actors were interviewed to shed light on why issues on privacy and digital security have moved into the foreground. 59 municipality libraries were randomly selected, and their websites surveyed. Analysis. Contextual integrity (CI), a privacy concept developed by Helen Nissenbaum, was used as a theoreti-cal framework. According to the concept, privacy is linked to information norms in a specific context. The con-cept has both a descriptive and a prescriptive aspect. In this thesis I used CI to evaluate libraries’ information practice of using social plugins on their websites. Results. The study showed that one out of three municipality libraries in Sweden are using social plugins on their website. The interest in digital security among Swedish libraries is linked to privacy concerns for groups of people with the need of high digital protection. The interest was sparked by Edward Snowden revelations of mass surveillance and the refugee crisis in 2015. Conclusion. Contextual integrity was used to evaluate libraries’ practice of using social plugins on their web-sites. The evaluation showed that the practice encroaches on information norms normally taken for granted in the library. The use of social plugins should be cancelled. Libraries have a responsibility to secure the privacy of their users, and CI is a useful concept to evaluate different information practices.This is a two years master’s thesis in library and information science.
APA, Harvard, Vancouver, ISO, and other styles
10

Souza, Fernando Antonio Ferreira de. "Gestão da segurança da informação em bibliotecas: elementos para elaboração de uma política de segurança da informação na Biblioteca Central da Universidade Federal da Paraíba." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9680.

Full text
Abstract:
Submitted by Fernando Souza (fernando@biblioteca.ufpb.br) on 2017-10-03T16:52:37Z No. of bitstreams: 1 arquivototal.pdf: 2097465 bytes, checksum: d3bdb832ed8d7ca2faa35f212ab6ca2b (MD5)
Made available in DSpace on 2017-10-03T16:52:37Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2097465 bytes, checksum: d3bdb832ed8d7ca2faa35f212ab6ca2b (MD5) Previous issue date: 2017-08-02
The information protection has become an extremely critical factor for organizations and Government entities. This involves not only the conventional environment, but also the technological and informational networking infrastructure. This study set out to address the information security as part of a University Library context. Even though a familiar environment with the information management processes, the libraries come suffering with problems related to lack of information on security management. For this purpose, this research studies the elements of information security management that allow the elaboration of a minute of information security policy for the Central Library of the Federal University of Paraíba. As the methodological aspects, is characterized as qualitative, descriptive type. As instrument methodology of data collection, tabulation and analysis, uses the Facilitated Process of risk analysis and assessment (FRAAP), which was supplemented with quiz and analysis of content according to Bardin. The results indicat a group of fifteen threats, among which detected nine physical threats, two logical threats and four threats related to processes. Finally, it was found that the Central Library of UFPB needs to reflect on an action plan directed to information security, to guarantee the confidentiality, integrity and safeguard of the organization's critical management information. With the results, it is expected to contribute with information security in the context of the Central Library of UFPB with the proposed minute information security policy, enabling new contributions to the development of the processes of management of the University Library.
A proteção da informação tornou-se fator de extrema criticidade para as organizações e entidades de governo. Esta envolve não somente o ambiente convencional, mas a infraestrutura tecnológica e de redes informacionais. Este estudo se propôs abordar a Segurança da Informação no âmbito de uma biblioteca universitária. Mesmo sendo um ambiente familiarizado com os processos de gestão da informação, as bibliotecas vêm sofrendo com os problemas relacionados à falta de gestão da segurança da informação. Para tanto, esta pesquisa estuda os elementos de Gestão da Segurança da Informação que permitam a elaboração de uma minuta de Política de Segurança da Informação para a Biblioteca Central da Universidade Federal da Paraíba. Quanto os aspectos metodológicos, se caracteriza como qualitativa, do tipo descritiva. Como instrumento metodológico de coleta de dados, tabulação e análise, utiliza o Processo Facilitado de Análise e Avaliação de Risco (FRAAP), que foi complementado com questionário e a análise de conteúdo conforme Bardin. Os resultados apresentados indicam um grupo de quinze ameaças, dentre as quais se detectou nove ameaças físicas, duas ameaças lógicas e quatro ameaças relacionadas aos processos gerenciais. Por fim, verifica-se que a Biblioteca Central da UFPB necessita refletir sobre um plano de ação direcionado à segurança da informação, para a garantia de confidencialidade, integridade e salvaguarda das informações gerenciais críticas da organização. Com os resultados, espera-se contribuir com a Segurança da Informação no âmbito da Biblioteca Central da UFPB com uma proposta de minuta para Política de Segurança da Informação, permitindo novas contribuições para o desenvolvimento dos processos de gestão da Biblioteca Universitária.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Library Security"

1

Case studies in library security. Westport, Conn: Libraries Unlimited, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Office, National Preservation. Security matters: Carrying out a library security survey & drafting a security policy. London: National Preservation Office, British Library, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brady, Eileen. Library/archive/museum security: A bibliography. 5th ed. Moscow, Idaho: Catula Pinguis Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zall, Lincoln Carol, ed. Library crime and security: An international perspective. New York: Haworth Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Switzer, Teri R. Safe at work?: Library security and safety issues. Lanham, Md: Scarecrow Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

University, of California Los Angeles Library. Patron relations: A manual for library staff. [Los Angeles, Calif.]: UCLA Libraries, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Keele, H. C. Preventing library book theft. Ipswich: Access Keelaway, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shuman, Bruce A. Library security and safety handbook: Prevention, policies, and procedures. Chicago: American Library Association, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Library security and safety guide to prevention, planning, and response. Chicago: Amer Library Association, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saltalamachia, Joyce. Professional staffing and job security in the academic law library. London: Glanville Publishers, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Library Security"

1

Becker, George, and Kathy Slattery. "Security." In Sun Technical Reference Library, 231–40. New York, NY: Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4419-8716-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rumley, Dennis. "Regional Security Relations." In The GeoJournal Library, 166–78. Dordrecht: Springer Netherlands, 2001. http://dx.doi.org/10.1007/978-94-011-4529-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Russo, Michael. "System Security." In Sun Technical Reference Library, 185–89. New York, NY: Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-3000-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alrabaee, Saed, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, and Aiman Hanna. "Library Function Identification." In Advances in Information Security, 79–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34238-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brüggemann-Klein, A., and C. Haber. "The MeDoc library: Security aspects." In Digital Libraries in Computer Science: The MeDoc Approach, 103–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0052517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pinchinat, Sophie, François Schwarzentruber, and Sébastien Lê Cong. "Library-Based Attack Tree Synthesis." In Graphical Models for Security, 24–44. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kolhe, Shivam, Sonia Nagpal, and Jesal Desai. "Security in Internet of Things." In Intelligent Systems Reference Library, 279–90. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32644-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "IoT Security: A Comprehensive View." In Intelligent Systems Reference Library, 467–94. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33596-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Bradley. "A Framework for Network Security." In Sun Technical Reference Library, 147–52. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4612-3334-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malcolm, James A. "Blind Publication: A Copyright Library without Publication or Trust." In Security Protocols, 336–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Library Security"

1

Colquitt, Michelle E. "The Sun Shining in the Middle of the Night: How Moving Beyond IP Authentication Does Not Spoil the Fun, Ease, or Privacy of Accessing Library Resources." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317204.

Full text
Abstract:
Gone are the days of unsecure access to electronic resources. Adoption of standards regarding secure access to resources is a step forward for the security and integrity of library resources. GALILEO, Georgia’s virtual library, is in the process of transitioning to authentication using OpenAthens. This paper discusses the technology behind single sign-on authentication, motivations for moving in this direction, and ends with a discussion of the Gwinnett Technical College library’s pilot site implementation of OpenAthens authentication.
APA, Harvard, Vancouver, ISO, and other styles
2

Mattern Büttiker, Sharon M., James King, Susie Winter, and Crane Hassold. "Should You Pay for the Chicken When You Can Get It for Free? No Longer Life on the Farm as We Know It." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317182.

Full text
Abstract:
The scholarly publishing ecosystem is being forced to adapt following changes in funding, scholarly review, and distribution. Taken alone, each changemaker could markedly influence the entire chain of research consumption. Combining these change forces together has the potential for a complete upheaval in the biome. During the 2019 Charleston Library conference, a panel of stakeholders representing researchers, funders, librarians, publishers, digital security experts, and content aggregators addressed such questions as what essential components constitute scholarly literature and who should shepherd them. The 70-minute open dialogue with audience participation invited a range of opinions and viewpoints on the care, feeding, and safekeeping of peer-reviewed scholarly research. The panelists were: James King, Branch Chief & Information Architect at the NIH; Sharon Mattern Büttiker, Director of Content Management at Reprints Desk; Crane Hassold, Senior Director of Threat Research at Agari; and Susie Winter, Director of Communications and Engagement, Springer Nature. The panel was moderated by Beth Bernhardt, Consortia Account Manager at Oxford University Press. Beth posed questions to the panel and each panelist replied from their vantage point. The lively discussion touched on ideas and solutions not yet discussed in an open forum. Such collaborative approaches are now more essential than ever for shaping the progress of the scientific research community. In attendance were librarians, editorial staff, business development managers, data handlers, library collection managers, content aggregators, security experts and CEOs.
APA, Harvard, Vancouver, ISO, and other styles
3

Erickson, David, and Tie Peng. "libdrdc: software standards library." In SPIE Defense and Security Symposium, edited by Grant R. Gerhart, Douglas W. Gage, and Charles M. Shoemaker. SPIE, 2008. http://dx.doi.org/10.1117/12.773976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ehlers, Johan Hendrik, and Sabah A. Jassim. "Wavelet library for constrained devices." In Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2007. http://dx.doi.org/10.1117/12.720713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rinaldi, Filipe, and Matt Spencer. "Arm DDS Security library: Adding secure security to ROS2." In ROSCon2018. Mountain View, CA: Open Robotics, 2018. http://dx.doi.org/10.36288/roscon2018-900294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rinaldi, Filipe, and Matt Spencer. "Arm DDS Security library: Adding secure security to ROS2." In ROSCon2018. Mountain View, CA: Open Robotics, 2018. http://dx.doi.org/10.36288/roscon2018-900838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hongchang, Wei, Wang Qian, and Wu Xuefang. "The Security Design of Digital Library." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiankun, Sun. "Security Architecture of Digital Library Research." In 2011 International Conference on Intelligence Science and Information Engineering (ISIE). IEEE, 2011. http://dx.doi.org/10.1109/isie.2011.151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Erlianti, Gustina, Riya Fatmawati, and Dadi Satria. "Security System for Collectio In Library." In Proceedings of the International Conference on Language, Literature, and Education (ICLLE 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/iclle-18.2018.94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vaishnav, Anuj, Jose Raul Garcia Ordaz, and Dirk Koch. "A security library for FPGA interlays." In 2017 27th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2017. http://dx.doi.org/10.23919/fpl.2017.8056817.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Library Security"

1

Simic, Bojan, Arshan Dabirsiaghi, and Jeff Williams. Library Code Security Analysis. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada589844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garfinkel, Simson L. Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools. Fort Belvoir, VA: Defense Technical Information Center, August 2008. http://dx.doi.org/10.21236/ada485606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Steeves, Brye. Classified library critical in Lab’s Annual Assessment of weapons to U.S. President National Security Resource Center’s collections are the foundation to stockpile confidence By the National Security Research Center staff. Office of Scientific and Technical Information (OSTI), March 2021. http://dx.doi.org/10.2172/1773326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography