Dissertations / Theses on the topic 'Library Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 dissertations / theses for your research on the topic 'Library Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Liu, Hao. "Oracle ThinkQuest Library Security Issue Clean-up." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-133629.
Full textSterner, Robert N. "Child support does it provide economic security for single parent families /." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1992. http://www.kutztown.edu/library/services/remote_access.asp.
Full textKrishna, Emir. "Security issues on m-Commerce over 3G/UMTS /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/krishna.doc.
Full textSehdev, Rajat. "Framework for designing and implementing IS/IT information security /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/sehdev.doc.
Full textFrame, Ethan Andrew. "GPUHElib and DistributedHElib: Distributed Computing Variants of HElib, a Homomorphic Encryption Library." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1407.
Full textGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Full textMathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.
Full textPrakash, Aravind. "Confidential Data Dispersion using Thresholding." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/232.
Full textSoldal, Johannes. "Lämna mig ifred : Digital övervakning och personlig integritet på svenska bibliotek." Thesis, Uppsala universitet, Institutionen för ABM, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-307921.
Full textSouza, Fernando Antonio Ferreira de. "Gestão da segurança da informação em bibliotecas: elementos para elaboração de uma política de segurança da informação na Biblioteca Central da Universidade Federal da Paraíba." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9680.
Full textMade available in DSpace on 2017-10-03T16:52:37Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2097465 bytes, checksum: d3bdb832ed8d7ca2faa35f212ab6ca2b (MD5) Previous issue date: 2017-08-02
The information protection has become an extremely critical factor for organizations and Government entities. This involves not only the conventional environment, but also the technological and informational networking infrastructure. This study set out to address the information security as part of a University Library context. Even though a familiar environment with the information management processes, the libraries come suffering with problems related to lack of information on security management. For this purpose, this research studies the elements of information security management that allow the elaboration of a minute of information security policy for the Central Library of the Federal University of Paraíba. As the methodological aspects, is characterized as qualitative, descriptive type. As instrument methodology of data collection, tabulation and analysis, uses the Facilitated Process of risk analysis and assessment (FRAAP), which was supplemented with quiz and analysis of content according to Bardin. The results indicat a group of fifteen threats, among which detected nine physical threats, two logical threats and four threats related to processes. Finally, it was found that the Central Library of UFPB needs to reflect on an action plan directed to information security, to guarantee the confidentiality, integrity and safeguard of the organization's critical management information. With the results, it is expected to contribute with information security in the context of the Central Library of UFPB with the proposed minute information security policy, enabling new contributions to the development of the processes of management of the University Library.
A proteção da informação tornou-se fator de extrema criticidade para as organizações e entidades de governo. Esta envolve não somente o ambiente convencional, mas a infraestrutura tecnológica e de redes informacionais. Este estudo se propôs abordar a Segurança da Informação no âmbito de uma biblioteca universitária. Mesmo sendo um ambiente familiarizado com os processos de gestão da informação, as bibliotecas vêm sofrendo com os problemas relacionados à falta de gestão da segurança da informação. Para tanto, esta pesquisa estuda os elementos de Gestão da Segurança da Informação que permitam a elaboração de uma minuta de Política de Segurança da Informação para a Biblioteca Central da Universidade Federal da Paraíba. Quanto os aspectos metodológicos, se caracteriza como qualitativa, do tipo descritiva. Como instrumento metodológico de coleta de dados, tabulação e análise, utiliza o Processo Facilitado de Análise e Avaliação de Risco (FRAAP), que foi complementado com questionário e a análise de conteúdo conforme Bardin. Os resultados apresentados indicam um grupo de quinze ameaças, dentre as quais se detectou nove ameaças físicas, duas ameaças lógicas e quatro ameaças relacionadas aos processos gerenciais. Por fim, verifica-se que a Biblioteca Central da UFPB necessita refletir sobre um plano de ação direcionado à segurança da informação, para a garantia de confidencialidade, integridade e salvaguarda das informações gerenciais críticas da organização. Com os resultados, espera-se contribuir com a Segurança da Informação no âmbito da Biblioteca Central da UFPB com uma proposta de minuta para Política de Segurança da Informação, permitindo novas contribuições para o desenvolvimento dos processos de gestão da Biblioteca Universitária.
Oberreiter, Vladimír. "GUI nástroj na měření zranitelností systémů pomocí knihovny OpenSCAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235526.
Full textHazanov, Julia, and Sara Elfström. "Högdalens bibliotek som mötesplats : En studie om trygghet med utgångspunkt i besökares och personals upplevelser." Thesis, KTH, Urbana och regionala studier, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298535.
Full textOtrygghet är ett problem på många offentliga platser i samhället, däribland bibliotek, där både ordningsstörningar och brott är förekommande problem. Förmodligen upplever många människor biblioteket som en lugn och trygg plats, utan bråk, skadegörelser, våld, stöld, eller trakasserier, ändock är alla dessa återkommande problem på bibliotek. Den här studien genomförs med förhoppningen att klara ut orsakerna till otryggande faktorer på bibliotek, och i bästa fall ta fram åtgärder för att motverka dessa faktorer. Undersökningen görs i form av en fallstudie av Högdalens bibliotek, där syftet med studien är att få en ökad förståelse för hur miljön på biblioteket påverkar tryggheten på platsen utifrån besökares och personals trygghetsupplevelser. I syfte att få svar på studiens huvudsakliga forskningsfråga – alltså hur besökare och personal upplever tryggheten på Högdalens bibliotek – görs en enkätundersökning besvarad av 43 biblioteksbesökare, samt intervjuer med fyra personer från bibliotekets personal. Studien innefattar därtill en granskning och sammanställning av statistik från besvärande händelser som inträffat på biblioteket mellan åren 2017 och 2020 för att vidare, tillsammans med enkätundersökningen och intervjuerna, få svar på vilka problem som är mest förekommande på biblioteket idag. Förhoppningen är att enkätundersökningen, intervjuerna, statistiken och studiens teori- och litteraturunderlag ska ge svar på hur brottsprevention genom urban design kan användas som referens för att förbättra tryggheten på Högdalens bibliotek. Studien är avgränsad och innefattar inte någon jämförelse mellan Högdalens bibliotek och andra bibliotek i avseende på trygghetsupplevelsen. Studiens resultat visar att besökare och personal har en positiv bild av trygghetsupplevelsen på Högdalens bibliotek. Majoriteten av enkätrespondenterna (83,7 %) har inte upplevt någon situation som frambringat känslan av otrygghet, medan personalen i stället menar att händelser som upplevts besvärande har ökat deras kunskaper och erfarenheter om hur sådana situationer kan hanteras, samt vidare ökat deras motivation att sträva efter en trygg miljö för alla biblioteks- besökare. Trots att ovannämnda resultat visar en positiv trygghetsupplevelse på Högdalens bibliotek finns det ett mindre antal besökare (16,3 %) som upplever, eller har upplevt, känslan av otrygghet i bibliotekets lokaler. Dessa otrygghetsupplevelser grundar sig på fall kopplat till ordningsstörningar, trakasserier, narkotika eller egendomsbrott, men också problem med hinder, orienteringsmöjligheter och siktlinjer. Personalen belyser också att vissa besvärande situationer – förknippat med exempelvis ungdomsgrupper och missbrukare – har bidragit med ökad stress och en känsla av obehag, vilket fortsättningsvis påverkat deras välbefinnande på arbetsplatsen. Det är dock viktigt att komma ihåg att alla människor upplever trygghet på olika sätt, och att en fullständig eliminering av otrygghet således kan vara svårt att uppnå – men det är trots detta betydelsefullt att i största möjliga grad försöka förebygga de risker som finns.
Arffmann, Jens. "Værktøjer til sikring af en effektiv strategiimplementering = Tools for securing an effective strategy implementation /." Aarhus : Institut for Økonomi, Aarhus Universitet, 2007. http://mit.econ.au.dk/Library/Specialer/20011066.pdf.
Full textFigueiredo, Rob. "Securing group communication in dynamic, disadvantaged networks : implementation of an elliptic-curve pairing-based cryptography library." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/41602.
Full textIncludes bibliographical references (p. 155-158).
This thesis considers the problem of securing communication among dynamic groups of participants without relying on an online group keying service. As a solution, we offer the design and implementation of the Public Key Group Encryption (PKGE) service. It is a cryptography library, written in C, and designed to be shared among all communications applications on any particular system. PKGE imposes low communication overhead and embraces disconnected operation, making it especially appropriate for deployment in low-bandwidth tactical environments. PKGE provides forward-secure confidentiality and authentication among any subset of users using small communication overhead by bringing together a number of modern cryptographic developments, with the piece de resistance being the elliptic curve-based Collusion-Resistant Broadcast Encryption. The focus of this thesis is primarily the engineering and synthesis of known theoretical schemes; we also present novel extensions to the Boneh-Gentry-Waters encryption scheme. 1. Forward secrecy: Add forward secrecy to the scheme at a cost of T private keys for T security epochs. 2. Optimized session protocols: Sidestep the majority of costs in computation and bandwidth. 3. Cheap over-provisioning of system capacity: Support up to 232 users for resource costs proportional only to the number actually registered. 4. Chosen Ciphertext Attack (CCA) Security: Elevate security from CPA to CCA strength. Using PKGE, we have developed a plugin for Gaim2 as a motivating launch application. The plugin both demonstrates the use of PKGE and enables secure conferencing over the range of Gaim-supported protocols, including Jabber, IRC, AIM, and ICQ. PKGE and its Gaim plugin may be run and further developed under MS Windows, Mac OS X, and Linux operating systems.
by Rob Figueiredo.
M.Eng.
Tsai, Tzong-Yiing, and 蔡宗穎. "An Integrated Approach to Network Security Library." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/48717824530929174406.
Full text國立交通大學
資訊科學與工程研究所
95
Nowadays, Internet is so popular not only to individuals but also to enterprises. For enterprises, the management and security issues are very important. IDC estimates worldwide security software/services will grow 20% a year ( to 43 billion US dollars in 2008). There are new security problems discovered every day. Meanwhile, hacker grows as the defender grows. Therefore, the security solutions will never be perfect. In this paper, we focus on bandwidth control, application-firewall, and real-time traffic analysis to build a network security management library, NSML, which can acts as a stand alone library to saving the time to develop network security software through its API, and provides architecture to manage and protect the networks in an enterprise. NSML saves the time to develop a network security software and also reduces its complexity. By using our architecture, critical resources in enterprise network are protected and their quality of service are also guaranteed.
Chou, Shu-lai, and 周澍來. "A Study on Collection Security in University Library:the Usage Evaluation for Library Security Systems." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/01434564872374960137.
Full text國立臺灣大學
圖書資訊學研究所
93
The questionnaire and the follow-up interview were used to collect data in this thesis. After analyzing these data, this thesis discussed the findings in three aspects: 1.The current situation of collections security in university libraries. 2.The usage and evaluation of library security systems in university libraries. 3.The applicability of RFID technology in collections security. The following shows suggestions based on the findings of this research: 1.The library should draw up a policy for collection security to build an integrated protection mechanism. 2.The library should establish the criteria to evaluate library security systems by writing a system requirement for proposal. 3.The training programs or courses of schools, organizations, and libraries should cover the issue on “collection security” to build up a fundamental cognition on it for librarians. 4.The libraries ought to keep the continuing interests in the researches and applications of RFID system and technology.
Huang, Ching-min, and 黃靖閔. "Performance Evaluation of API for Java Security and OpenSSL library JNI." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/01821942867634165733.
Full text國立高雄第一科技大學
電腦與通訊工程所
97
Data transfer and message services, trading in a variety of different platforms to communicate. Data and file transfer, its impact on the accuracy and integrity of a number of different decision-making and the meaning of. Different trading platforms, in addition to considering the validity of transmission, the lower the complexity of data conversion and reduce maintenance costs is worth exploring. Even if the use of personal computer system or developed by business needs, as well as the client''s e-commerce Internet applications. In a wide variety of operating conditions, if not managed, will be easily derived from a variety of independent, function similar to the situation. In a different framework, how to reduce the occurrence of information security risks and avoid waste of resources while maintaining the effectiveness of real-time system can be used with the full information environment, information security has become the application architecture.In this paper, a cross-platform Java itself and use anywhere on the merits, combined with Password Authentication OpenSSL features of open source,through the JNI interface to the implementation of cryptography algorithms and designed to provide a library interface.Library document and with reference to the use of Java solution will be able to provide more security in the information layer of choice.In addition to the libraries provided in the performance than the Java implementation of Security API in itself a good addition to the results, which can be extended depending on demand and expansion of library whether in the Windows iii environment through the dynamic link library can be an effective platform to provide different programming language or inter-integration of resources and effective control.
Tsai, Ming-ling, and 蔡明麟. "Building the Core of Library Service for Junior High and Elementary School in Yunlin County through Security, Cross-Platform and Free Software." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/20536909496716511669.
Full text國立雲林科技大學
資訊管理系碩士班
92
Library circulation service and cataloguing are the major duties of teacher-librarians, and the library Online Public Access Catalogue(OPAC)plays an important role for expanding reader service. This research focuses on reducing the workload of teacher- librarians; moreover an intergated system structure which contains all routine of library operation is proposed. In order to process automating catalogue in a short time is suggested here. The system structure of book cataloguing agent mentioned here uses both National Bibliographic Information Network(NBIT)and Wenkiang Bibliographic Information Network(WBIT)as cataloguing data source. The reduction of cataloging efforts is one of our major purposes in this study. The existing servers equipped for junior high or elementary schools in Yunlin County could be applied to store book data and consequently increase utility rate. To reduce the squander of education resource is our another concern. We apply the SSL protocol as an encryption device for both browser and JAVA application. The encryption device serves as the safeguard for protecting reader''s personal information. It is hoped the JAVA language(with cross platform characteristic) and free software(such as php ,openSSL, FreeBSD and so on)adopted in this study would help to construct an effective library system which can take care both concerns regarding finance and security.
Dias, Maria Carolina Gaspar. "Os meus pais não se importam - Por trás de um click!" Master's thesis, 2019. http://hdl.handle.net/10316/94927.
Full textO presente relatório visa apresentar o trabalho desenvolvido no decorrer do estágio curricular do Mestrado em Ciências da Educação da Faculdade de Psicologia e de Ciências da Educação da Universidade de Coimbra (FPCEUC). O estágio decorreu em contexto de Biblioteca Escolar (BE) no Agrupamento de Escolas Coimbra Centro (AECC) no ano letivo de 2018-2019.Apresentam-se, de forma particular, as atividades desenvolvidas no contexto do estágio curricular e o desenvolvimento do projeto de estágio “Por trás de um click!”. No que respeita às atividades desenvolvidas no contexto do estágio é dado enfoque ao projetos desenvolvidos durante o ano no âmbito da BE e as atividades realizadas para os alunos, cuja intervenção se baseou na colaboração da preparação e desenvolvimento das atividades. Dado o crescente desenvolvimento das Tecnologias da Informação e Comunicação (TIC) e a utilização cada vez mais precoce do público mais jovem, torna-se importante consciencializa-los para a utilização segura e consciente das novas tecnologias, sobretudo da Internet, permitindo a aquisição e aprofundamento dos conhecimentos na área que possam ser utilizados para o próprio benefício. Com este projeto pretendeu-se abordar diferentes faixas etárias, sendo o público-alvo uma turma do 1º, 2º e 3º ciclo, de forma a entender os diferentes hábitos diários dos jovens na Internet. Este projeto é descrito detalhadamente, bem como fundamentado através da revisão da literatura, e apresentadas as principais reações do público-alvo e uma breve reflexão do trabalho realizado ao longo do ano letivo.
This report aims to present the work developed during the curricular intership of the Master´s Degree in Educational Sciences of the Faculdade de Psicologia e de Ciências da Educação da Universidade de Coimbra (FPCEUC). The intership took place in the context of school library at the Agrupamento de Escolas Coimbra Centro (AECC) in the school year of 2018-2019.It is presented in particular the activities developed in the context at the intership and the development of the internship project "Por trás de um click!". Regarding the activities developed in the context at the intership, focus is given to projects developed during the year under the BE and the activities carried out for students, whose intervention was based on the collaboration of the preparation and development of the activities.As the growing development of Information and Communication Technologies (ICT) and the increasingly early use of younger audiences, it is important to make them aware of the safe and conscious use of new technologies, especially from the Internet, allowing the acquisition and deepening of knowledge in the area that can be used for their own benefit. With this project it was intended to address different age groups, the audience being a class of 1º, 2º and 3º cycle class, to understand the different daily habits of young people on the Internet. This project is described in detail as well as grounded through the literature review, the main reactions of the target audience and a brief reflection on the work done during the school year are presented.
Retief, Esther. "The role of inventory control in service quality in a South African academic library." Diss., 2005. http://hdl.handle.net/10500/2250.
Full textInformation Science
M. Inf.
Angus, Lynne. Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1006023.
Full textClossum, Rhonda Marisa. "Information Privacy: A Quantitative Study of Citizen Awareness, Concern and Information Seeking Behavior Related to the Use of the Social Security Number as a Personal Identifier." 2010. http://trace.tennessee.edu/utk_gradthes/614.
Full textMogiba, Ntombizandile Cynthia. "Utilising radio-frequency identification technologies as knowledge management enablers in academic libraries: a case study of the University of South Africa." Diss., 2018. http://hdl.handle.net/10500/25322.
Full textInformation Science
M. Inf. (Information Science)
Li, Hongwei. "Multilevel adaptive security system." Thesis, 2006. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2006-029.
Full textBajracharya, Mandur Bajra. "Cluster-based wireless mobile ad-hoc network security." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-046.
Full textGang, Litao. "On the data hiding theory and multimedia content security applications." Thesis, 2002. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2002-018.
Full textYoon, Dae-Gwun. "Analysis of truck delays at container terminal security inspection stations." Thesis, 2007. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2007-059.
Full textIncludes bibliographical references. Also available via the World Wide Web.
Ling, Li. "Unified architecture of mobile ad hoc network security (MANS) system." Thesis, 2006. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2006-112.
Full textZhang, Congzhe. "Ad hoc network security and modeling with stochastic petri nets." Thesis, 2004. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2004-107.
Full textYan, Wei. "Security information management with frame-based attack presentation and first-order reasoning." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-089.
Full textPoupart, Clay Andrew. "When will my turn come? the Civil Service purges and the construction of a gay security risk in the Cold War United States, 1945-1955 /." 2005. http://library2.usask.ca/theses/available/etd-09142005-114258/unrestricted/clay_poupart.pdf.
Full text