Academic literature on the topic 'Security Automation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Automation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Automation"

1

Potter, Bruce. "Security automation." Network Security 2007, no. 9 (2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Highland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shahane, Gauri. "Network Security (Automation)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30835.

Full text
Abstract:
The security of an operator’s network is crucial while being increasingly complex to ensure. This is all the more the case with the evolution of the network towards virtualization. In this paper, we will explain how to secure a network and then give some real examples of automation implemented to ensure this security. Finally, we will detail the new risks associated with the implementation of automation tools and share some good security practices around their implementation. Keywords : Network security automation
APA, Harvard, Vancouver, ISO, and other styles
4

Avinash, Singh, Singh Bharat, Rawat Divyanshu, and Jaint Bhavnesh. "Automation Security System." International Journal of Engineering Research & Science 6, no. 4 (2020): 09–15. https://doi.org/10.5281/zenodo.3767642.

Full text
Abstract:
<strong><em>Abstract</em></strong><strong>&mdash;</strong> <em>Security systems has seen a rapid rise in its place in research and development, in the field of home automation and industries. This is a field where development occurs regularly yet still always leave some room for growth. In this paper, an endeavour has been made to develop advanced automation security system with ultrasonic range module, stepper motor and GSM module to detect theft. When a person comes within the range of the system, along with an alarm buzz and led indication, an alert message is sent using GSM module touser&r
APA, Harvard, Vancouver, ISO, and other styles
5

Bipin Gajbhiye, Anshika Aggarwal, and DR. Punit Goel. "Security Automation in Application Development Using Robotic Process Automation (RPA)." Universal Research Reports 10, no. 3 (2023): 167–80. http://dx.doi.org/10.36676/urr.v10.i3.1331.

Full text
Abstract:
In the contemporary digital landscape, the rapid advancement of application development necessitates a parallel evolution in security measures. Traditional security practices often struggle to keep pace with the dynamic nature of modern software development. To address these challenges, Robotic Process Automation (RPA) emerges as a transformative tool, offering substantial potential to automate security tasks within the application development lifecycle. This paper explores the integration of RPA into security automation, focusing on its capabilities to enhance security protocols, minimize hum
APA, Harvard, Vancouver, ISO, and other styles
6

Sagar, K. E. CH Vidya, J Swetha, T J Deepika, and S Rajesh. "SIGNIFICANT GROWTH IN HOME AUTOMATION AND ITS SECURITY SYSTEM USING ARDUINO." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 920–28. https://doi.org/10.36893/jnao.2024.v15i2.143.

Full text
Abstract:
Because automation enables activities to be accomplished with less human interaction and more effectively, it has become increasingly important in today's society (for example, in household and industrial automation). The practise of automating household chores and appliances so they may be managed remotely via a phone or computer is known as home automation. A home security system includes alarm systems, smoke detectors, security cameras, and other sensors. In this project, a home automation and security system is created. The HC05 Bluetooth module and an Arduino UNO R3 microcontroller board
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Roberto De Carvalho. "AUTOMATION AND OPTIMIZATION OF THE SAP SOFTWARE INSTALLATION PROCESS IN CORPORATE WORKSTATIONS: IMPACTS ON SCALABILITY AND SECURITY." Revista ft 29, no. 145 (2025): 34–35. https://doi.org/10.69849/revistaft/ch10202504040734.

Full text
Abstract:
The automation and optimization of SAP software installation in corporate workstations are critical for enhancing scalability, security, and efficiency. Manual deployment processes are time-consuming, error-prone, and challenging to standardize in large-scale environments. This study explores automation tools such as Ansible, Terraform, and SCCM to streamline SAP deployment, reducing manual intervention and ensuring consistent configurations across multiple devices. The research also highlights the significance of security measures, including system hardening, least privilege policies, and mul
APA, Harvard, Vancouver, ISO, and other styles
8

Runde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.

Full text
Abstract:
Um Security-Schutzmaßnahmen für die Automatisierungstechnik sinnvoll zu implementieren, wird eine Entscheidungsgrundlage benötigt. Eine Risikoanalyse, die Werte erfasst und ermittelt, kann das leisten. Der Beitrag stellt praktische Herangehensweisen zur Durchführung von Risikoanalysen vor, die eine Auswahl von hinreichenden Schutzmaßnahmen erlaubt.
APA, Harvard, Vancouver, ISO, and other styles
9

Kothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Automation"

1

BRINGHENTI, DANIELE. "Network Security Automation." Doctoral thesis, Politecnico di Torino, 2022. https://hdl.handle.net/11583/2973798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.

Full text
Abstract:
Home automation systems (HASs)seek to improve the quality of life for individuals through the automation of household devices. Recently, there has been a trend, in academia and industry, to research and develop low-cost Wireless Sensor Network (WSN) based HASs (Varchola et al. 2007). WSNs are designed to achieve a low-cost wireless networking solution, through the incorporation of limited processing, memory, and power resources. Consequently, providing secure and reliable remote access for resource limited WSNs, such as WSN based HASs, poses a significant challenge (Perrig et al. 2004). This t
APA, Harvard, Vancouver, ISO, and other styles
3

Peacock, Matthew. "Anomaly Detection in BACnet/IP managed Building Automation Systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2019. https://ro.ecu.edu.au/theses/2178.

Full text
Abstract:
Building Automation Systems (BAS) are a collection of devices and software which manage the operation of building services. The BAS market is expected to be a $19.25 billion USD industry by 2023, as a core feature of both the Internet of Things and Smart City technologies. However, securing these systems from cyber security threats is an emerging research area. Since initial deployment, BAS have evolved from isolated standalone networks to heterogeneous, interconnected networks allowing external connectivity through the Internet. The most prominent BAS protocol is BACnet/IP, which is estimated
APA, Harvard, Vancouver, ISO, and other styles
4

Habeeb, Richard. "Improving the Security of Building Automation Systems Through an seL4-based Communication Framework." Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7161.

Full text
Abstract:
Existing Building Automation Systems (BASs) and Building Automation Networks (BANs) have been shown to have serious cybersecurity problems. Due to the safety-critical and interconnected nature of building subsystems, local and network access control needs to be finer grained, taking into consideration the varying criticality of applications running on heterogeneous devices. In this paper, we present a secure communication framework for BASs that 1) enforces rich access control policy for operating system services and objects, leveraging a microkernel-based architecture; 2) supports fine-graine
APA, Harvard, Vancouver, ISO, and other styles
5

Jose, Arun Cyril. "Intelligent home automation security system based on novel logical sensing and behaviour prediction." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/65012.

Full text
Abstract:
The thesis, Intelligent Home Automation Security System Based on Novel Logical Sensing and Behavior Prediction, was designed to enhance authentication, authorization and security in smart home devices and services. The work proposes a three prong defensive strategy each of which are analyzed and evaluated separately to drastically improve security. The Device Fingerprinting techniques proposed, not only improves the existing approaches but also identifies the physical device accessing the home cybernetic and mechatronic systems using device specific and browser specific parameters. The Logical
APA, Harvard, Vancouver, ISO, and other styles
6

Oulaaffart, Mohamed. "Automating Security Enhancement for Cloud Services." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0232.

Full text
Abstract:
Les avancées des techniques de virtualisation et la maturité des langages d'orchestration ont contribué à la conception et au déploiement de services cloud composites. Ces services cloud peuvent être sujets à des changements dans le temps, en raison de la migration de leurs ressources. Cela peut introduire de nouvelles vulnérabilités, qui compromettent un service cloud dans son ensemble. Dans ce contexte, cette thèse propose d'améliorer et d'automatiser la sécurité des services cloud composites selon trois axes principaux. Le premier axe consiste en un framework de sécurité automatique basé su
APA, Harvard, Vancouver, ISO, and other styles
7

Costley, Austin D. "Platform Development and Path Following Controller Design for Full-Sized Vehicle Automation." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/6429.

Full text
Abstract:
The purpose of this thesis is to discuss the design and development of a platform used to automate a stock 2013 Ford Focus EV. The platform is low-cost and open-source to encourage collaboration and provide a starting point for fellow researchers to advance the work in the field of automated vehicle control. This thesis starts by discussing the process of obtaining control of the vehicle by taking advantage of internal communication protocols. The controller design process is detailed and a description of the components and software used to control the vehicle is provided. The automated system
APA, Harvard, Vancouver, ISO, and other styles
8

Janes, Ricardo. "Estudo sobre sistemas de segurança em instalações elétricas automatizadas." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3143/tde-29062009-181507/.

Full text
Abstract:
Este trabalho apresenta um estudo sobre os principais sistemas de segurança utilizados em instalações elétricas automatizadas, com enfoque no controle de acesso físico, utilizando tecnologias biométricas. São apresentadas neste trabalho as principais características dos sistemas de segurança aplicados à detecção e combate de incêndios, ao controle do acesso físico, ao controle interno e externo da segurança, como circuitos fechados de televisão e controle de segurança perimetral, e as tecnologias biométricas que podem ser usadas para o controle de acesso de pessoas. É apresentado o desenvolvim
APA, Harvard, Vancouver, ISO, and other styles
9

Jonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.

Full text
Abstract:
Internet of Things, has started to mark its existence from past few years. Right from its inception with a coke machine at Carnegie Mellon University, it has come a long way, connecting billions of devices to internet. This journey is well supported by the advancements in networking, hardware miniaturization and sensing capabilities. Diverse nature of applications of Internet of Things, has cut the communication barriers between the varieties of fields ranging from manufacturing industry to health-care industry. Smart Home is one such application of Internet of Things. Connectivity of home a
APA, Harvard, Vancouver, ISO, and other styles
10

Allwood, Gary Andrew. "Intensity based interrogation of optical fibre sensors for industrial automation and intrusion detection systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1702.

Full text
Abstract:
In this study, the use of optical fibre sensors for intrusion detection and industrial automation systems has been demonstrated, with a particular focus on low cost, intensity-based, interrogation techniques. The use of optical fibre sensors for intrusion detection systems to secure residential, commercial, and industrial premises against potential security breaches has been extensively reviewed in this thesis. Fibre Bragg grating (FBG) sensing is one form of optical fibre sensing that has been underutilised in applications such as in-ground, in-fence, and window and door monitoring, and addre
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Automation"

1

Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bryan, Singer, ed. Industrial automation and process control security. CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krutz, Ronald L. Industrial automation and control system security principles. International Society of Automation (ISA), 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Soper, Mark Edward. Absolute beginner's guide to home automation. Que, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Division, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Division, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Division, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Albrecht, Eduardo. Political Automation. Oxford University Press, 2025. https://doi.org/10.1093/9780197696989.001.0001.

Full text
Abstract:
Abstract Governments, once staffed exclusively with human bureaucrats, now routinely use AI-based software to gather information about citizens and make decisions that impact their lives. In many nations, AI determines the level of privacy a person can enjoy, how far they can travel, what public benefits they may receive, and what they can and cannot say publicly. This amounts to a phenomenon of political automation rapidly materializing globally and begs the question: What input do citizens have in how these machines think? The book explores this question in various domains—including policing
APA, Harvard, Vancouver, ISO, and other styles
10

Girardin, Pierre. La domotique. Société d'habitation du Québec, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Automation"

1

Caelli, W. "Office Automation Security." In Information Security for Managers. Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-10137-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oxer, Jonathan, and Hugh Blemings. "Security/Automation Sensors." In Practical Arduino. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2478-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sabharwal, Navin, and Subramani Kasiviswanathan. "HWA Security." In Workload Automation Using HWA. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8885-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Irani, Mohammad Tabatabai, and Edgar R. Weippl. "Automation of Post-exploitation." In Security Technology. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aldrian, Andreas, Peter Priller, Christophy Schmittner, et al. "10 Application system design - High security." In IoT Automation. CRC Press, 2017. http://dx.doi.org/10.1201/9781315367897-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dutt, Bhishm, Karan Singh, Satvik Vats, Manisha Manjul, Vikrant Sharma, and Ahmad Aziz. "Data security for digital environment." In Automation and Computation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003333500-56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calleja, Julian, Lalit Garg, and Vijay Prakash. "Security in Home Automation." In Internet of Things. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21940-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mehta, Kaushal, Anmol Sharma, and Lakshya Bhalla. "College Automation Security Management." In Role of ICT in Higher Education. Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003130864-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stevens, Alex. "Security Automation and Orchestration." In Enterprise Fortress. CRC Press, 2025. https://doi.org/10.1201/9781003585923-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rawat, Abhay Singh, Pankaj Kumar, Sumeshwar Singh, Resham Taluja, and Rajeev Gupta. "Optimization-based watermarking scheme for security." In Automation and Computation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003333500-35.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Automation"

1

Bennett, Kelly W., and James Robertson. "Database optimization: automation, security, and resiliency." In Disruptive Technologies in Information Sciences IX, edited by Bryant T. Wysocki and Misty Blowers. SPIE, 2025. https://doi.org/10.1117/12.3057423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bagade, Jayashree V., Sukhvinder Singh Dari, Rekha Dhivrani, Santosh Chowhan, G. Ravivarman, and V. Janakiraman. "Automation Through Machine Learning: Reinvigorating Cyber Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morales-Gonzalez, Christopher, Matthew Harper, Boya Yuan, and Xinwen Fu. "On Software Security of Building Automation Systems." In 2025 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2025. https://doi.org/10.1109/icnc64010.2025.10993917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krishna, Dondapati Manoj, Medasani Veda Pranay, and Shaik Khaja Mohiddin. "Security Measures in Cloud-Driven Home Automation Systems." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Leander, Björn, Bjarne Johansson, Saad Mubeen, Mohammad Ashjaei, and Tomas Lindström. "Redundancy Link Security Analysis: An Automation Industry Perspective." In 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2024. http://dx.doi.org/10.1109/etfa61755.2024.10710694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ciupa, Martin, Nicole Tedesco, and Mostafa Ghobadi. "Automating Automation : Master Mentoring Process." In 11th International Conference on Security and its Applications. Academy & Industry Research Collaboration Center (AIRCC), 2018. http://dx.doi.org/10.5121/csit.2018.80103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edwards, W. Keith, Erika Shehan Poole, and Jennifer Stoll. "Security automation considered harmful?" In the 2007 Workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1600176.1600182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tunc, Cihan, Salim Hariri, Mheni Merzouki, et al. "Cloud Security Automation Framework." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kathuria, Samta, Poonam Rawat, Rajesh Singh, Anita Gehlot, Namrata Kathuria, and Shweta Pandey. "Automation Intercession: Cyber Security." In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2022. http://dx.doi.org/10.1109/ic3i56241.2022.10073023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McKay, Murray. "Best practices in automation security." In 2012 IEEE-IAS/PCA Cement Industry Technical Conference. IEEE, 2012. http://dx.doi.org/10.1109/citcon.2012.6215678.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Automation"

1

Dempsey, Kelley, Nedim Goren, Paul Eavy, and George Moore. Automation support for security control assessments:. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.ir.8011-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dempsey, Kelley, Eduardo Takamura, Paul Eavy, and George Moore. Automation support for security control assessments:. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8011-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cam-Winget, N., and L. Lorenzin. Security Automation and Continuous Monitoring (SACM) Requirements. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Booth, Harold, and Adam Halbardier. Trust model for security automation data 1.0 (TMSAD). National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Farrag, Khalid. Utilizing Cloud Computing Log Events for Security Automation. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dempsey, Kelley, Paul Eavy, and George Moore. Automation support for security control assessments. volume 1: overview. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.ir.8011-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quinn, S. D., D. A. Waltermire, C. S. Johnson, K. A. Scarfone, and J. F. Banghart. The technical specification for the Security Content Automation Protocol (SCAP) :. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Waltermire, D. A., S. D. Quinn, and K. A. Scarfone. The technical specification for the Security Content Automation Protocol (SCAP) :. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Waltermire, D. A., S. D. Quinn, K. A. Scarfone, and A. M. Halbardier. The technical specification for the Security Content Automation Protocol (SCAP) :. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Waltermire, David, and Jessica Fitzgerald-McKay. Transitioning to the Security Content Automation Protocol (SCAP) Version 2. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.cswp.09102018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!