Dissertations / Theses on the topic 'Security guide'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 dissertations / theses for your research on the topic 'Security guide.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gjercek, Albin, and Alexander Andersson. "Wireless Security, a practical guide." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21570.
Full textClarinsson, Richard, and Samuel Magnusson. "The PHP programmer`s guide to secure code." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-492.
Full textAbstract
Security threats against computer systems are a big problem today which also includes PHP made applications. The report is focused on protection with the help of code and not how you protect a web server. Its purpose is not to educate the readers of the thesis how to make a PHP application, the purpose is how to program a safer PHP application. The thesis contains information about common security threats against PHP scripts. It contains in most cases examples of what an attack can look like and how a protection for that example can be achieved. We have tested all code examples if they work by installing our own server with the configurations according to the delimitations of the thesis and putting up small PHP applications, which we have attacked and then protected. The contents and result of this thesis can benefit developers that use PHP as a programming language for creating web applications, by giving them information about common threats and protection.
Criswell, Deanne B. "Homeland Security : Developing National Doctrine to Guide State Strategy Development." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6783.
Full textIf one subscribes to the belief that doctrine is a common understanding of what fundamental principles guide an organization, then this thesis demonstrates that there is currently no common understanding of homeland security. There is currently a lack of institutional doctrine that can be applied nationally for state level government to develop their homeland security strategies. The military has a long history of successfully using doctrine to develop war-fighting strategy. Comparisons can be made to the Air Forces use of doctrine to gain autonomy as well as the effect joint doctrine has on achieving unity of effort across disciplines. Additional lessons can be learned from past civil defense attempts at institutionalization and the evolution to emergency management and homeland security. By modeling of these existing, known and accepted doctrines or lack thereof, a national homeland security doctrine could emerge.
Broughton, Hubert Lee. "Combating terrorism: a guide for U.S. Naval forces afloat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1985. http://handle.dtic.mil/100.2/ADA164863.
Full textMoreira, Katia Beatris Rovaron. "Diretrizes para projeto de segurança patrimonial em edificações." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/16/16132/tde-17052010-090837/.
Full textThe urban landscape has been modified along the last few decades because of interventions made aiming at personal and asset protection. These modifications have occurred without any kind of methodology, legislation and normalization in this regard. The objective of the present study is to do a theoretical and methodological survey as well as a survey of the application practice of security measures in buildings. The architectural modifications due to urban violence and the need of the participation of architects in the process of security planning are discussed along this dissertation. Through this research, we try to find out the existent methodologies in order to develop basic guidelines for security planning. It was proven that in order to elaborate a design it is necessary to make surveys of the patrimonial values and of the risks and vulnerabilities to which the building is subject to, in order to determine with high accuracy the necessary security levels. This research tries to show to the architect the importance of his/her contribution in determining the adoption of measures of passive and active protection as well as supplying the basic tools for its application in the design. The knowledge of the theoretical base for determining the necessary safety level and measures that can be applied allows the architect to elaborate a design with more functionality and effectiveness.
Lambert, Reiner W. "Budget execution a management guide for Naval Security Group Commanding Officers, Officers in Charge and Department Heads /." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA245985.
Full textThesis Advisor(s): Eberling, Glenn D. Second Reader: Moses, Doug. "December 1990." Description based on title screen as viewed on March 31, 2010. DTIC Identifier(s): Naval Budgets, Naval Security Group Commanding Officers, OIC (Officer In Charge), DH (Department Heads), Budget Execution. Author(s) subject terms: Budget Execution, Management, Naval Security Group, Accounting, Operating Budget, Operating Target. Includes bibliographical references (p. 7). Also available in print.
Djurberg, Siri, and Antonia Miocic. "Molntjänster för svenska sjukvårdsorganisationer : En guide för behandling av patientdata." Thesis, Uppsala universitet, Informationssystem, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356409.
Full textMikulová, Aneta. "Management informační bezpečnosti ve zdravotnickém zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223234.
Full textTrtílek, Ivo. "Uplatnění managementu bezpečnosti informací ve veřejné správě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224216.
Full textBauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.
Full textCommittee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Sauvage-Vincent, Jean. "Les modes de plasmon sur film métallique ondulé, appliqués aux documents de sécurité." Phd thesis, Université Jean Monnet - Saint-Etienne, 2013. http://tel.archives-ouvertes.fr/tel-01068070.
Full textPatton, Mark B. "A case study of Internet Protocol Telephony implementation at United States Coast Guard headquarters." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FPatton.pdf.
Full textThesis Advisor(s): Dan C. Boger, R. Scott Coté. Includes bibliographical references (p. 134-138). Also available online.
Szubartowicz, Eva [Verfasser], Guido [Akademischer Betreuer] Schryen, and Günther [Akademischer Betreuer] Pernul. "Planning and Evaluation of Information Security Investments / Eva Szubartowicz ; Guido Schryen, Günther Pernul." Regensburg : Universitätsbibliothek Regensburg, 2018. http://d-nb.info/1165869055/34.
Full textYasasin, Emrah [Verfasser], Guido [Akademischer Betreuer] Schryen, and Günther [Akademischer Betreuer] Pernul. "Decision Problems in Information Security: Methodologies and Quantitative Models / Emrah Yasasin ; Guido Schryen, Günther Pernul." Regensburg : Universitätsbibliothek Regensburg, 2018. http://d-nb.info/1173974717/34.
Full textSchmitz, Guido [Verfasser], and Ralf [Akademischer Betreuer] Küsters. "Privacy-preserving web single sign-on : formal security analysis and design / Guido Schmitz ; Betreuer: Ralf Küsters." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2019. http://d-nb.info/1211649679/34.
Full textStaicu, Cristian-Alexandru [Verfasser], Guido [Akademischer Betreuer] Salvaneschi, Michael [Akademischer Betreuer] Pradel, and Andrei [Akademischer Betreuer] Sabelfeld. "Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications / Cristian-Alexandru Staicu ; Guido Salvaneschi, Michael Pradel, Andrei Sabelfeld." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2020. http://d-nb.info/1213027012/34.
Full textStaicu, Cristian-Alexandru [Verfasser], Guido Akademischer Betreuer] Salvaneschi, Michael [Akademischer Betreuer] [Pradel, and Andrei [Akademischer Betreuer] Sabelfeld. "Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications / Cristian-Alexandru Staicu ; Guido Salvaneschi, Michael Pradel, Andrei Sabelfeld." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2020. http://d-nb.info/1213027012/34.
Full textOberle, John P. "Japanese-U.S. missile defense : stepping stone towards normalization /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FOberle.pdf.
Full textThesis Advisor(s): Edward A. Olsen, H. Lyman Miller. Includes bibliographical references (p. 89-95). Also available online.
Marissal, Alain. "Collision bidimensionnelle dans les transports guidés : Expérimentation et modélisation des risques de chevauchement." Valenciennes, 1993. https://ged.uphf.fr/nuxeo/site/esupversions/a3c3014d-5275-41b2-bd52-4225197636b6.
Full textDARRICAU, MYRIAM. "Contribution a la reutilisation de connaissances pour l'aide a l'elaboration et a l'evaluation des specifications de logiciels : application a la securite des systemes de transport guides." Paris 6, 1999. http://www.theses.fr/1999PA066139.
Full textSung, Hsieh Chih, and 謝志松. "Wireless LAN Security Guide of Study." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/72141812041243127113.
Full text國立臺灣科技大學
資訊管理系
93
The WLANs is more and more popular in the Internet environment, since it is the very convenient network. Following this trend, the security of WLAN is also more and more important, causing that the information security society is focusing on the WLANs security right now. According to the statistics in the Taiwan government, about 60% Taiwan WLANs user don’t consider the security issue. Also many intruding events in the WLANs network happened in the last year. These things cause the personnel and company information security is more and more serious, so I want to develop a security standard to provide them to refer. For this standard, I begin from studying some document, and then analyze WLANs security mechanism, management operation, security technology, and security requirement. After thinking and concluding some results, I establish the WLANs network security standard and also build up the self-examination list. This list can guide the government and personnel to install a security environment or to be a reference. Finally the practicability of the WLANs network security standard is discussed. I adopt the requirement of the mobile office network as my model, and use threat analysis, security police and security structure to build up the self-examination list.
Mignault, Sylvain. "L'audit de sécurité et la protection des organisations." Thèse, 2009. http://hdl.handle.net/1866/7395.
Full textBarbosa, João Fernando da Costa Meireles. "Automated Repair of Security Vulnerabilities using Coverage-guided Fuzzing." Dissertação, 2021. https://hdl.handle.net/10216/135943.
Full textBarbosa, João Fernando da Costa Meireles. "Automated Repair of Security Vulnerabilities using Coverage-guided Fuzzing." Master's thesis, 2021. https://hdl.handle.net/10216/135943.
Full textWimmel, Guido Oliver [Verfasser]. "Model-based development of security-critical cystems / Guido Oliver Wimmel." 2005. http://d-nb.info/979096634/34.
Full textKrantz, Amanda Ebitz David. "The effects of security guards and gallery guides on visitor experience at the Solomon R. Guggenheim Museum." 2009. http://etda.libraries.psu.edu/theses/approved/PSUonlyIndex/ETD-3986/index.html.
Full textOPOKU, EFUA BABOA. "Human Rights Violations under the Guise of Counter-Terrorism Measures: A Question of Reconciling Security Concerns and Protecting the Fundamental Right to Life." Thesis, 2011. http://hdl.handle.net/1974/6815.
Full textThesis (Master, Law) -- Queen's University, 2011-10-03 13:40:21.534
"Yehezkel Lein ; Alon Cohen-Lifshitz: Under the guise of security. Routing the Separation Barrier to Enable the Expansion of Israeli Settlements in the West Bank / [Rezension]." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2011/5643/.
Full textQuigg, Gary Francis. "JB-2: America's First Cruise Missile." Thesis, 2014. http://hdl.handle.net/1805/5517.
Full text