To see the other types of publications on this topic, follow the link: Security report.

Dissertations / Theses on the topic 'Security report'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security report.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Klasson, Daniel, Kim Klasson, and Anatoly Iourtchenko. "Network Security Report : Penetration Tools for Network Security." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24545.

Full text
Abstract:
This report, will show by demonstration with Network Penetration, how to reveal security holes by using the same methods as an outside attack and carry out attacks against wired and wireless networks when it comes to sniffing user traffic, abuse VLAN, cracking password, WEP, WPA/WPA2, hacking WPS and analysing traffic. The tests was performed at the Halmstad University with lab equipment and at home with own equipment. Using Backtrack 5 R3 which is compatible with Linux, performance of the tests could be done by making use of various tools that comes with Backtrack.The goal of the project was to demonstrate how to reveal security holes by using the same methods as an outside attack. By testing, demonstrate and report the security of wired and wireless network, the achievement of these goals could be done and a greater insight into network security was gained, which gives more experience and knowledge that can be taken to a future professional life. The results show how simple it can be to abuse a network or sniff a password if there is no attention to the safety and the security configurations that can be implemented.In other words, during this project, both learning and demonstration has been done to show how vulnerable individuals, civilians and entrepreneurs are. It is easier than someone can imagine to obtaining unauthorized information that nobody wants to share out.
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Brad. "U.S. EPA NATIONAL HOMELAND SECURITY RESEARCH CENTER: AN INTERNSHIP REPORT." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1163622231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gjercek, Albin, and Alexander Andersson. "Wireless Security, a practical guide." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21570.

Full text
Abstract:
Wireless networks are continuing to grow around the world due to the advantages it offers and all the different services that it provides. In networking environments where the communication goes through a wireless connection, the importance of protecting the private information is a very significant task for network administrators. Beside the great benefits from having this type of network, the major issue of wireless communications is the weak security it provides. Companies and business organizations are more and more involved with the use of wireless networks because of the flexibility, mobility and the scalability it offers, but they are also concerned about the consequences of having a weaker security to protect their expensive investments and information. This thesis discusses the issues behind the security of wireless networks. It explains the background of the wireless networks and describes how the different security algorithms and encryptions work. The authors of this thesis decided to present some of the possible attacks that could occur in wireless networks and also give some security solutions to help others protect their network. The group that worked together on this project had the idea of investigating how secure the actual wireless algorithms and encryptions are. The approach of finding the necessary information for presenting the results and conclusions was to perform penetration tests on wireless networks that were implemented with the three famous security algorithms of WEP, WPA and WPA2. The penetrations tests were performed in lab environments and in home networks with the use of cracking tools. The group used the open source Linux based distribution called BackTrack 5. This operating system provided the group the different cracking tools that would help them perform their investigation. The purpose of performing the penetration tests was to find out the vulnerabilities that each of the security algorithms poses and therefore be able to determine which of them offers the best protection to a wireless network. After the penetration tests were done, the group came up with some solutions by configuring a wireless network with the strongest security options. The solutions were aimed to help others how to configure a specific wireless network in a simple but effective way. The results indicated that the weakest security algorithm would present some major issues for a wireless network. It included a greater possibility of experiencing different network attacks by configuring a wireless network with a weak security algorithm. Overall, this thesis provided the group the necessary information that was beneficial for them to understand how strong a wireless network actually is, and how a penetration test was performed.
APA, Harvard, Vancouver, ISO, and other styles
4

Topping, John R. "Beyond the Pattern Report : The Governance of Security in Policing with the Community." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.516423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, R. Augustus. "Anti terrorism and force protection application in facilities this report is presented to the Department of Civil and Coastal Engineering graduate committee /." Thesis, (2.01 MB), 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FLim.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vice, President Research Office of the. "Freedom from Fear." Office of the Vice President Research, The University of British Columbia, 2006. http://hdl.handle.net/2429/2698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dodou, Bienvenue. "Le report des garanties accessoires sur l'obligation de restitution en cas d'anéantissement du contrat principal : étude des droits privés français et de l'OHADA." Thesis, Strasbourg, 2018. http://www.theses.fr/2018STRAA024.

Full text
Abstract:
Le report des garanties accessoires sur l’obligation de restitution du contrat principal anéanti est une règle du code civil dans sa version issue de l’ordonnance n° 2016-131 du 10 février 2016 portant réforme du droit des contrats, du régime général et de la preuve des obligations. Précisément, la règle est formulée par l’article 1352-9 du code civil : « Les sûretés constituées pour le paiement de l'obligation sont reportées de plein droit sur l'obligation de restituer sans toutefois que la caution soit privée du bénéfice du terme ». Il s’agit de la codification d’une jurisprudence rendue en d’abord en matière de cautionnement, ensuite étendue à l’hypothèque, enfin, par généralisation, à l’ensemble des sûretés, y compris à la solidarité. La portée d’une telle règle est donc générale en droit français. En droit uniforme des affaires issu de l’OHADA, l’Acte uniforme portant organisation des sûretés révisé n’a pas prévu une telle règle. Par contre, le récent projet de texte d’Acte uniforme portant droit général des obligations dans l’espace OHADA prévoit, en s’inspirant de la solution retenue en droit français, d’adopter la règle sous la forme d’une « extension » des garanties accessoires sur l’obligation de restitution du contrat principal anéanti. En effet, l’article 210 alinéa 1 du projet de texte uniforme précité énonce : « Les garanties stipulées pour le paiement de l’obligation primitive sont étendues à l’obligation de restitution ». Les formulations des deux textes, les articles 1352-9 du code civil et 210 alinéa 1 du projet de texte uniforme, sont différentes mais la logique et la politique législative de deux systèmes juridiques convergent. La thèse défendue est que le terme « report » employé par le code civil en son article 1352-9 dans sa version issue de l’ordonnance n° 2016-131 du 10 février 2016 n’existe pas en tant que tel. Le report est en réalité une double substitution ; il y a une substitution d’abord, dans le rapport principal d’obligation et une substitution consécutive dans le rapport de cautionnement. La première substitution qui a lieu concerne le rapport entre le débiteur principal et le créancier. L’anéantissement des effets du contrat principal produit une substitution à l’obligation initiale de source conventionnelle d’une obligation légale fondé sur le quasi-contrat de paiement de l’indu. Cette première substitution conduit à la disparition, par le jeu ou la règle de l’accessoire, de l’obligation initiale de la caution et de son remplacement par une obligation légale nouvelle. Il y a donc une substitution dans le rapport entre le créancier et la caution due à la première substitution. L’obligation légale nouvelle de la caution reprend certains éléments de l’obligation conventionnelle ancienne de celle-ci, tout en étant distincte par d’autres éléments. La base même de l’obligation nouvelle de la caution reste le cautionnement que la caution avait souscrit préalablement<br>The postponement of ancillary guarantees on the obligation to return the terminated main contract is a rule of the Civil Code in the version resulting from Order No. 2016-131 of 10 February 2016 related to the reform of contract law of the general regime and the proof of obligations. Specifically, the rule is formulated by article 1352-9 of the Civil Code: "Securities created for the payment of the obligation are automatically transferred under the obligation to return without however depriving the surety of the benefit of the term". It is about the codification of case law handed down first in the field of suretyship, then extended to mortgages, and finally, by generalization, to all securities, including solidarity. The scope of such a rule is therefore general in French law. In the uniform business law of OHADA, the revised Uniform Act on the Organization of Security Interests has not provided for such a rule. On the other hand, the recent draft text of the Uniform Act on the general law of obligations in the OHADA area provides, under the inspiration of the solution adopted in French law, for the adoption of the rule in the form of an "extension" of the accessory guarantees on the obligation to return the terminated main contract. Indeed, Article 210 paragraph 1 of the aforementioned draft uniform text states: "The guarantees stipulated for the payment of the original obligation are extended to the obligation of restitution". The wording of the two texts, Articles 1352-9 of the Civil Code and 210 paragraph 1 of the draft uniform text, are different, but the logic and legislative policy of both legal systems converge. This thesis focuses on the determination of the legal nature of the deferral (or extension) mechanism and its regime. It defends the view that postponement (or extension) is not a technical concept. The deferral is actually a double substitution: a substitution in the main report and a substitution in the bond report
APA, Harvard, Vancouver, ISO, and other styles
8

Schiebel, Jennifer, and Daria Hasse. "Global Policies: Discrepancy Between Global Desires and Local Conditions? The Suitability of Global Policies to raise Local Agricultural Productivity Rates and Food Security in Lago District, Mozambique." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47112.

Full text
Abstract:
The majority of the rural population in developing countries sustains their livelihoods through small-scale family farming on subsistence level. However, agricultural productivity is far from its potential and food insecurity and high absolute poverty rates are widespread challenges in Sub Saharan Africa (SSA), including Mozambique. Global actors, such as the World Bank (WB), frequently publish policy guidelines, strategy papers and reports, all aiming at tackling the focal problem of low agricultural productivity and claiming to be dedicated to the overall goal of economic, social, inclusive and sustainable development. But as agricultural productivity rates in many developing countries remain low, and food insecurity rates have been high for several decades, the adequacy of global policy guidelines for local structures, conditions and needs is questionable. The aim of this study is therefore to analyze the suitability of and identify possible discrepancies between global strategies – that claim to raise agricultural productivity and food security – and the local level. A strong emphasis is placed on a people-centered, local grassroots perspective. To gather data, a five-week field study in Lago District, Mozambique, was carried out, following an abductive approach and using semi-structured interviews on household level, and with a variety of other stakeholders from the public and private sector. The Logical Framework Approach was applied to structure the findings from the WB report and from the field work, with the aim to create a basis for the analysis and comparison of that data, which provides an answer to the research problem of the suitability of global policies on local level. Additional analytical guidance is provided by the concept of human security and a gender perspective. Conclusions from the study demonstrate that the neoliberal point of departure and the different understandings of small-scale farming underlying the problem and objective of (low) agricultural productivity rates identified by the WB, are not coherent in comparison to the local situation identified in Lago District. The development interventions suggested by the WB rather tend to be an obstacle for sustainable rural and agricultural development, as well as local food security/sovereignty, poverty alleviation and inclusive economic growth in the context of Lago District.
APA, Harvard, Vancouver, ISO, and other styles
9

Hall, Dennis H. H. "Impact of the Clery Act: An Examination of the Relationship between Clery Act Data and Recruitment at Private Colleges and Universities." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc984250/.

Full text
Abstract:
The problem this study addressed is the relationship between Clery Act crime data and student recruitment at private colleges and universities. For this quantitative study, I used secondary data from the Department of Education and the Delta Cost Project (2013) to conduct ordinary least squares regression analyses to determine the predictive ability of institutional characteristics, specifically the total number of crime incidents reported in compliance with the Clery Act, on the variance in number of applications and applicant yield rate at private four-year institutions in the United States. Findings showed that the total number of reported incidents was a significant positive predictor of the total number of applications. Conversely, findings also showed that the total number of incidents had a significant negative impact on institutional yield rates. An implication of this study is that although crime statistics required by the Clery Act may not serve as variables used in the student application process, they are part of numerous variables used in the student's decision to enroll at a particular school. The findings highlight the importance of prioritizing and investing in safety and security measures designed to reduce rates of crime; especially for private, enrollment-driven institutions of higher education.
APA, Harvard, Vancouver, ISO, and other styles
10

ROUSSEAU, LUDOVIC. "Rose : systeme reparti a objets securise." Paris, CNAM, 1997. http://www.theses.fr/1997CNAM0299.

Full text
Abstract:
Cette these presente les principes de gestion de la securite d'un systeme d'exploitation distribue a objets suivant deux axes : distribution des traitements, du stockage et de la gestion des donnees en general et distribution de la responsabilite de gestion des droits basee sur la cooperation entre plusieurs responsables securite. Les objets securises sont appeles des entites. Pour realiser le controle des droits, rose utilise des capacites qui ne sont utilisables que par une seule entite (capacites nominatives) et qui ne sont pas falsifiable (capacites signees). Les protocoles lies a chaque etape de la vie d'une capacite (creation, propagation, utilisation et revocation) sont etudies. La securite repose partiellement sur la synchronisation des horloges des differents sites du systeme reparti. Nous etudions plusieurs possibilites de limitation temporelle des droits (date donnee, intervalle et execution unique pendant un intervalle). Les ecarts de synchronisation des horloges sont pris en compte par ces contraintes temporelles et les possibilites d'attaques sont analysees en consequence. Nous proposons une solution optimisee en terme de performance et d'espace memoire occupe au probleme de distribution des cles publiques. Ces cles sont employees pour l'authentification des entites et la signature des capacites. Elles doivent etre accessibles a l'ensemble des entites du systeme. Chaque etape de la vie des cles publiques (changement de cle, generation, distribution, stockage, invalidation et utilisation) est analysee. Nous presentons les principes d'implantation et la modelisation du systeme rose realisee avec l'outil asa+. La modelisation statique permet de rendre compte de l'organisation sous forme de modules et de flots d'informations. Le modele dynamique decrit le comportement des modules et des messages echanges. Enfin, nous presentons quelques simulations du modele.
APA, Harvard, Vancouver, ISO, and other styles
11

Chattin, Jody. "Formal critiques and after action reports from conventional emergencies tools for homeland security training and education." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5121.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>The activities and tasks performed by firefighters when responding to emergencies caused by asymmetric threats to homeland security mirror the activities and tasks that firefighters regularly employ when responding to conventional emergencies. However, the learning opportunities created by conventional incidents are not routinely exploited for the purposes of preparing firefighters to respond to incidents of asymmetric origin. Instead, homeland security training and education is often conducted in a manner that is stand-alone and requires a dedicated budget. The policy analysis conducted assesses the similarities and differences between mitigation procedures and technical skills used when responding to incidents of similar nature but different origin and whether or not formal critiques and after action reports from conventional incidents can be used to effectively support the long-term sustainment of specialized training and education. Efficiency, process values, and robustness and improvability are the criterion used to conduct a modified cost-benefit analysis. The findings suggest that expanding the scope of formal critiques and after action reports from conventional incidents to include "what if" questions about potential incidents of asymmetric origin does facilitate the long-term sustainment of specialized training and education programs in a manner that capitalizes on adult and organizational learning theory principles.
APA, Harvard, Vancouver, ISO, and other styles
12

Shapira, Yoav. "A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/35093.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2006.<br>Page 141 blank.<br>Includes bibliographical references (p. 84-87).<br>There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how a novel organizational form, the open-source software development community known as the Apache Software Foundation, responds to a specific type of threat: security issues reported to exist in its software products. An analysis of publicly available data from the Apache Software Foundation is conducted, the security issue handling process is described in detail, and an analysis on security issue origin, severity, and resolution is provided. Special attention is given to communication along the issue resolution process, as the threat-rigidity hypothesis predicts a reduction in the flow of information across the organization.<br>(cont.) The results show that this organization defies some central predictions of the hypothesis: there is little reduction in information flow, little or no centralization in decision-making, and no loss of group-level focus. The research results are framed within the literature of user-led innovation and organizational behavior. The implications for traditional software development organizations are discussed, and recommendations for further research are provided.<br>by Yoav Shapira.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
13

Vignoli, Benedetto Gabriele. "Optimization of the Security Incident Management plan of NNIT A/s via the Integration of the Vulnerability Reports Creator." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190116.

Full text
Abstract:
Modern IT companies manage security of their customers'networks following particular models, processes and procedures. In this thesis are presented the most important and widespread guidelines on Security Incident Response Plans as well as the implementation of a software for an IT danish company called NNIT. In particular, this software aims to improve NNIT's Security Incident Management Process generating automatic reports of vulnerabilities found in NNIT clients networks. Enhancing this process reducing its execution time is directly translated into a proactive response where vulnerabilities are tackled and patched before an attacker could exploit them. The software developed and described in this thesis is called VRC and thanks to a particular algorithm analyzes the database of vulnerabilities found by the vulnerability scanner and produces customizable reports. In the reports, the list of vulnerabilities is ordered by severity and number of machines a ected in order to present the most urgent vulnerabilities that should be xed. Finally, an evaluation of the VRC performance and usefulness is also included.
APA, Harvard, Vancouver, ISO, and other styles
14

Parthey, Mirko. "IP Security für Linux." Thesis, Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100087.

Full text
Abstract:
Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht<br>Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IPsec. A Linux implementation of IPsec is examined under the aspects of extendability and usability
APA, Harvard, Vancouver, ISO, and other styles
15

Faltynková, Pavla. "Bytové domy A a B v Nemocniční ulici v Uničově - stavebně technologická příprava stavby." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2012. http://www.nusl.cz/ntk/nusl-225557.

Full text
Abstract:
This thesis deals with constructive -technological solutions of construction of two residential buildings A and B in Uničov. The thesis includes preparation and construction site equipment, technological prescription for implementation of anhydrite floors, time schedule and financial plan of construction, project budget, monitoring and test plans, instructions for maintenance, fire problem solution and security plan for requirements of the EMS.
APA, Harvard, Vancouver, ISO, and other styles
16

Langer, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.

Full text
Abstract:
Dynamic address assignment is one of the most important features in wireless ad hoc networks if nodes should be enabled to join and to work in the network by automatically configuring all necessary settings. Different approaches have been developed throughout the last years to achieve this objective of Dynamic Address Autoconfiguration but research primarily focused on efficiency and correctness, less on security issues. Whereas Duplicate Address Detection has become reliable in commonplace scenarios, it is still relatively easy to suspend the whole network functionality in extraordinary situations within the boundaries of a Dynamic Address Configuration Protocol. In this paper, we therefore want to point out shortcomings and weaknesses in existing protocol solutions which address dynamic IP address assignment. We concentrate on a leader-based approach called ODACP and want to propose several solutions which improve the original protocol in such a way that it is safer against malicious host activities. Finally, we will demonstrate the improvements of our solution in a separate test scenario.
APA, Harvard, Vancouver, ISO, and other styles
17

Nilsson, Stina, and Indra Stenhammar. "Kreativa lösningar : En kvalitativ undersökning om att polisanmäla hedersrelaterat våld mot barn inom socialtjänsten." Thesis, Stockholm University, Department of Social Work, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-28881.

Full text
Abstract:
<p>The purpose of this study has been to investigate how socialworkers describe their attitudes towards reporting childabuse to the police and if they make different decisions when they believe the violence to be honour related and how they handle these questions. The main questions are; How does socialworkers describe their and their colleagues attitudes towards reporting childabuse to the police and when do they believe they should report? Do they describe honourviolence as a specific kind of violence that should be lifted and in what way does it affect their work? The study is written from a legal sociologist perspective with a qualitative approach. Four socialworkers were interviewed and the interviews were analyzed with an anti-racist theory and with the theory about freedom of action.</p><p>The conclusions is that the socialworkers mostly report childabuse to the police when the violence is physical. This means that children who describes to be subjected to psychological violence, including honourviolence, has poor legal security. Socialworkers describes honourviolence as a specific kind of violence that has to be lifted. Without knowledge they wont be able to help. They feel limited by the legislation and have invented <em>creative solutions</em> that focuses on the child’s best interest.</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Skokanová, Šárka. "Stavebně technologický projekt modernizace objektu T8, VUT v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2015. http://www.nusl.cz/ntk/nusl-227454.

Full text
Abstract:
The subject of this diploma thesis is the architectural and technological modernization project object T8 the Technical University in Brno. Reconstruction of the partial operation affects investor during reconstruction and access to various floors of the building which is secured by a connecting bridge passing over five floors of the building and articulated halls adjacent buildings. The aim is to design technology solutions, spatio-temporal, financial and legislative aspects, taken on the basis of project documentation.
APA, Harvard, Vancouver, ISO, and other styles
19

Mason, Alissa L. "How Female Correctional Officers Influence the Security of an Institution." Youngstown State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1434015292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Tuchscheerer, Sven. "Human Factors in Automotive Crime and Security." Doctoral thesis, Universitätsbibliothek Chemnitz, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-70586.

Full text
Abstract:
Als vor 120 Jahren, am 5. August 1888, Bertha Benz eine 106 Kilometer lange Fahrt mit dem Prototypenfahrzeug ihres Mannes Carl Benz unternahm legte sie den Grundstein für die erste Überlandfahrt mit einem Benzinautomobil überhaupt. Damit trug sie wesentlich zum Abbau von Vorurteilen in der Gesellschaft gegenüber Benzinfahrzeugen bei und verhalf der Firma ihres Mannes zum Erfolg. Gleichzeitig beging sie auch den ersten dokumentierten Fahrzeugdiebstahl, da die Nutzung ohne das Wissen ihres Mannes erfolgte. Strafrechtliche Sanktionen musste Frau Benz nicht fürchten, schließlich war dieser Fall durchaus von Vorteil für die Vermarktung. Das erkannte auch Herr Benz und verzichtete auf eine Anzeige. Am 23.12.2008 wurde ein PKW Toyota Landcruiser gegen 01:20 Uhr an der Landstrasse L46 zwischen Herforst und Rothaus gefunden. Der Täter, welcher das Fahrzeug am 17.12.2008 bei einem Bauunternehmer stahl, stellte es – vermutlich auf Grund von Treibstoffmangel – dort ab. Ihm drohen bis zu drei Jahren Haft und / oder eine Geldstrafe. Am 24.02.2008 schrieb eine Benutzerin namens Kitty in einem Internetforum zum Thema Erfahrungen mit Autodiebstahl: „…mir hat man nur bei meinem jetzigen Fahrzeug schon die Nummernschilder geklaut, was mich dann 80 Euro gekostet hat.“ ("AW: Auto geklaut", 2008). Diese drei Beispiele repräsentieren ansatzweise, wie vielfältig die Fälle sind, welche gemeinhin unter dem Begriff Fahrzeugkriminalität gefasst werden. Sie unterscheiden sich hinsichtlich der Motive der Täter, dem Besitzer zugefügten Schaden oder den strafrechtlichen Konsequenzen. Zusätzlich zu dieser Vielfalt ist die Fahrzeugkriminalität dem Einfluss der Zeit unterworfen, in Bezug auf die Anzahl im Verkehr befindlicher Fahrzeuge, deren Nutzung, deren Diebstahlschutzvorrichtung oder Vorgehen der Täter. Somit ist das Konstrukt Fahrzeugkriminalität durch einen hohen Komplexitätsgrad gekennzeichnet. Aus dieser Komplexität heraus begründet sich das fundamentale Ziel der vorliegenden Arbeit, eine detaillierte und systematische Beschreibung von Fahrzeugkriminalität zu geben. Darauf aufbauend werden Ursachen- und Wirkungszusammenhänge identifiziert, beschrieben und in einem numerischen Relativ abgebildet. Dabei wird ein ganzheitlicher Ansatz verfolgt, in Abgrenzung zu bisherigen wissenschaftlichen Arbeiten, welche einen Erkenntnisgewinn zur Beschreibung, Erklärung und Vorhersage von Fahrzeugkriminalität für einen mehr oder weniger eng umschriebenen Teilaspekt leisten. In diesem Ansatz werden gezielt psychologische Aspekte in den Fokus gestellt und mit gesellschaftlichen, technischen, legislativen, judikativen und exekutiven Rahmenfaktoren in Beziehung gesetzt. Damit kann der Arbeit ein wissenschaftlicher Erkenntnisgewinn im Sinne einer ganzheitlichen Analyse beigemessen werden, in den Ansätze zur Beschreibung und Erklärung separater Aspekte integriert und bewertet werden können. Eine – damit eng verknüpfte – Voraussetzung ist die Entwicklung und Evaluation von Untersuchungsmethoden um die relevanten Aspekte in den beteiligten Personengruppen so detailliert und umfassend wie zur Erklärung nötig sowie so ökonomisch wie möglich zu erfassen. Im Zentrum der Betrachtung steht die Interaktion zwischen den beiden hauptsächlich beteiligten Personengruppen: Fahrzeugbesitzer und Täter. Betrachtete Aspekte in diesen Gruppen sind neben Motiven, Risiko- und Gewinneinschätzungen auch Faktoren wie finanzieller Konnex oder Ausstattung mit Sicherheitstechnik, bzw. Werkzeug zu dessen Überwindung, Furcht vor Fahrzeugkriminalität oder finanzielle und zeitliche Schäden durch Fahrzeugkriminalität.
APA, Harvard, Vancouver, ISO, and other styles
21

Poller, Andreas. "Approaches for Automated Software Security Evaluations." Master's thesis, Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200601872.

Full text
Abstract:
As a consequence of the highly increasing cross-linking of computer systems in computer networks, the possibilities for accessing programs operated at these machines is becoming more and more independent from the possibilities of having physical access to them. Thus the former existing physical access controls have to be replaced by logical access controls which ensure that computer systems are only used for the intended purpose and that the stored data are handled securely and confidentially. The efficiency of such logical protection mechanism is verified by applying software security tests. During such tests it is proved whether security functions can be bypassed especially by exploiting software errors. In this diploma thesis approaches for the automation of software security tests are examined regarding their effectiveness and applicability. The results are used to introduce a requirement and evaluation model for the qualitative analysis of such security evaluation automation approaches. Additionally, the assertion is made that a highly automated software security evaluation is not a sensible development goal referring to the estimated cost-benefit ratio which is gained by trying to realise this goal. Based on this assertion, this diploma thesis discusses how to join the capabilities of a human tester and a software evaluation assistance system in an efficient test process. Based on this considerations, the design and implementation of a software security evaluation system which has been developed prototypically for this diploma thesis is described. This system significantly involves the human tester in the evaluation process but provides approaches for automation where possible. Furthermore this proof-of-concept prototype is evaluated regarding its practical applicability<br>Durch die zunehmende starke Vernetzung von Computertechnologie wird die Möglichkeit des Zugriffs auf einzelne Computersysteme und den darauf ablaufenden Programmen zunehmend ebenso stark unabhängig von den physischen Zugangsmöglichkeiten des Zugreifenden zu diesen Systemen. Diese wegfallenden physischen Zugangsbarrieren müssen deshalb durch logische Zugriffsbeschränkungen ersetzt werden, die sicherstellen, dass Computersysteme nur zu den vorgesehen Zwecken verwendet und die darin gespeicherten Daten sicher und vertraulich verarbeitet werden. Die Wirksamkeit dieser logischen Schutzmechanismen wird mit Hilfe von s.g. Softwaresicherheitstests verifiziert. Dabei wird insbesondere überprüft, inwiefern Schutzfunktionen durch Zuhilfenahme von in der Software vorhandenen Programmfehlern umgangen werden können. Diese Diplomarbeit überprüft bestehende Ansätze für die Automatisierung solcher Sicherheitstests hinsichtlich ihrer Wirksamkeit und Anwendbarkeit. Aus den Resultaten dieser Untersuchung wird ein allgemeines Anforderungs- und Bewertungsmodell entwickelt, welches die qualitative Bewertung von Ansätzen zur Sicherheitstestautomatisierung zulässt. Desweiteren wird die Behauptung aufgestellt, dass die Forderung nach einer zu starken Automatisierung des Testverfahrens sich ungünstig gegenüber des Kosten-Nutzen-Verhältnisses auswirkt, welches bei der Realisierung dieser Forderungen zu erwarten ist. Darauf aufbauend versucht die Diplomarbeit abzugrenzen, wie sich die Fähigkeiten des menschlichen Testers und eines teilautomatisierbaren Softwaresystems effizient in einem Sicherheitstestprozess verbinden lassen. Basierend auf diesen Betrachtungen wird beschrieben, wie ein Sicherheitsevaluierungssystem, welches prototypisch für diese Diplomarbeit entwickelt wurde, den Menschen zur Erstellung von Testalgorithmen einbindet aber, wenn dies zweckmäßig ist, Automatisierungen ermöglicht. Dieses System wird daraufhin auf seine praktische Anwendbarkeit untersucht
APA, Harvard, Vancouver, ISO, and other styles
22

Nascimento, Fernando Ferraz do. "Uma metodologia semi-parametrica para IBNR (Incurred But Not Reported)." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/306514.

Full text
Abstract:
Orientadores: Ronaldo Dias, Nancy Lopes Garcia<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Matematica, Estatistica e Computação Cientifica<br>Made available in DSpace on 2018-08-06T03:32:13Z (GMT). No. of bitstreams: 1 Nascimento_FernandoFerrazdo_M.pdf: 973412 bytes, checksum: 97b1cf4137bd59eb99ae987305700439 (MD5) Previous issue date: 2006<br>Resumo: Neste trabalho, comparamos diversas técnicas de previsão de IBNR (Incurred But Not Reported) para dados de um triângulo Run-OjJ, desde as mais simples, como por exemplo as técnicas Chain- Ladder e a técnica da Separação, até as técnicas mais sofisticadas, considerando modelos Log-Normais ou pela distribuição Poisson Composta. Além disso, nosso trabalho enfatiza a necessidade do uso de técnicas não-paramétricas, considerando um modelo de truncamento das variáveis. Foi possível mostrar que, mesmo não tendo nenhuma informação sobre a distribuição dos dados, é possível estimar o IBNR com menor erro e variabilidade do que as técnicas usuais conhecidas. Para fazer as comparações, foram realizadas simulações de sinistros ocorrendo através de um Processo de Poisson não homogêneo, e com dependência no tempo de relato e valor do sinistro. A medida de comparação utilizada foi o Erro Quadrático Médio (EQM) entre os valores simulados e os valores previstos por cada técnica. A abordagem paramétrica, quando os dados provém de uma distribuição Poisson Composta, apresentou o menor EQM dentre todas as técnicas. Entretanto, se não há informação sobre a distribuição dos dados, a técnica de Mista de truncamento foi a melhor entre as não-paramétricas<br>Abstract: We compare several forecast techniques for IBNR(Incurred But Not Reported) from a Run-Off triangle data, since the most simple techniques like Chain-Ladder and Separation Technique, to the more complex using Log-Normal models and Compound Poisson distribution. Therefore, exist the necessity of the use of Nonparametric techniques, using a model that consider variable Truncation. It was possible shown that, when we don't have any information about the data, it's possible estimate de IBNR forecasting with less mistake and variability than the usual techniques. For make the forecasting, we used claims simulations occurring by a nonhomogeneous Poisson process and with dependence entry the time to report and value paid for one claim. The measure of comparison used was the Mean Square Error (MSE) of simulated values and forecasting values for each technique. The parametric boarding when the data come from a Compound Poisson distribution, was the best MSE entry all techniques. However, when we don't have any information about the data, the Truncation Technique was the best of the nonparametric techniques<br>Mestrado<br>Mestre em Estatística
APA, Harvard, Vancouver, ISO, and other styles
23

O'Donovan, David, and Alexandra Marshakova. "Overcoming the security quagmire: behavioural science and modern technology hold the key to solving the complex issue of law firm cyber security." Universität Leipzig, 2018. https://ul.qucosa.de/id/qucosa%3A21216.

Full text
Abstract:
While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not likely. Part 1 of this paper outlines the current threat landscape and details the integral role of human error in successful cyber breaches before turning to discuss recent cyber security incidents involving law firms. In Part 2, we analyse elements of law firm short-termism and the underregulation of law firm cyber security conduct and how these, when combined, play a key role in shaping law firm cyber security posture. Finally, in Part 3 we outline a realistic solution, incorporating principles from behavioural science and modern technological developments.
APA, Harvard, Vancouver, ISO, and other styles
24

Elsayed-Ahmed, Sameh M. (Sameh Metwally). "An Empirical Examination of the Effects of FASB Statement No. 52 on Security Returns and Reported Earnings of U.S.-Based Multinational Corporations." Thesis, North Texas State University, 1986. https://digital.library.unt.edu/ark:/67531/metadc331437/.

Full text
Abstract:
Prior to the issuance of Financial Accounting Standards Board Statement No. 8 (SFAS No. 8), there was a marked inconsistency in the area of accounting for foreign currency translation. Though designed to make the diverse accounting practices of multinational corporations (MNCs) more compatible, SFAS No. 8 was the subject of a great deal of criticism, eventually leading to the issuance of Financial Accounting Standards Board Statement No. 52 (SFAS No. 52). SFAS No. 52 differs from SFAS No. 8 on objectives and method of translation, and on accounting treatments of translation adjustments. This dissertation provides an empirical examination of the security market reaction to the accounting policy change embodied in SFAS No. 52, and its impact on the volatility of reported earnings of MNCs. The effects of the issuance and early adoption of SFAS No. 52 on security return distributions were determined by both cross-sectional comparisons of cumulative average residuals (CAR) between MNCs and domestic firms and between early and late adopters, and by time-series tests on CAR of MNCs. Two volume analyses were performed to test the effects of SFAS No. 52 on security volume. The first analysis was adjusted to remove the effects of the marketwide factors on volume, and the second analysis was unadjusted for the market influences. Four nonparametric tests were used in testing the effects of SFAS No. 52 vis-a-vis SFAS No. 8 on the volatility of reported earnings of MNCs. The findings of this study led to the following conclusions: (1) SFAS No. 52 had significantly affected security returns of MNCs, but had no significant effects on security volume of MNCs; (2) the early adoption of SFAS No. 52 had no effects on security returns and volume of early adopters as opposed to late adopters; and (3) SFAS No. 52 did not have any significant effects on the volatility of reported earnings of MNCs. However, the impact of exchange adjustments on MNCs* earnings under SFAS No. 52 was significantly affected by the size of foreign operations and industry classifications.
APA, Harvard, Vancouver, ISO, and other styles
25

Feske, Norman, and Christian Helmuth. "Overlay Window Management: User interaction with multiple security domains." Technische Universität Dresden, 2004. https://tud.qucosa.de/id/qucosa%3A26247.

Full text
Abstract:
Graphical user interfaces for high-assurance systems must fulfill a range of security requirements such as protected and reliable presentation, prevention of unauthorized cross-domain talk, and prevention of user-input eavesdropping. Additionally, it is desirable to support legacy applications running in confined compartments. Standard isolation methods such as virtual-machine monitors provide one frame buffer per security domain, where each frame buffer is managed by one legacy window system. This raises the question of how to safely integrate multiple (legacy) window systems and protect the displayed data while preserving the usability of modern user interfaces. Our paper describes the OverlayWindow System, a general mechanism for multiplexing windows of multiple distinct window systems into the host frame buffer. Thus, each legacy window appears to the user as one corresponding host window that can be moved and resized. To achieve this, only slight modifications of the legacy window system are required whereby, the source code does not have to be available. Our implementation of an Overlay Window System successfully multiplexes Linux, GEM and native L4 applications.
APA, Harvard, Vancouver, ISO, and other styles
26

Chew, Leung Jennifer. "Responding to Client Emotional Expression: A Study from the Perspective of Self-Reported Securely-Attached Novice Counsellors." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32880.

Full text
Abstract:
Client emotional expression in session is valuable as it promotes clients’ sense of agency, increases their capacity for introspection, and is linked to decreases in depressive symptoms. By extension, understanding counsellors’ responses to client emotional expression is relevant. In the current study, retrospective accounts of self-reported securely-attached novice counsellors were collected for the purpose of exploring how they responded to client emotional expression. To obtain meaningful and descriptive accounts of the data, a thematic analysis (Braun & Clarke, 2006) was used as the research methodology. Resultant themes showed that novice counsellors reported experiencing their own covert and overt emotional reactions in response to clients’ emotional expression. They also reported struggling with the decision to use their preferred response. The results provided insights into how the task of responding to client emotion was complex for novice counsellors. Analyses and understanding of these results have potential developmental and educational implications.
APA, Harvard, Vancouver, ISO, and other styles
27

Humpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kapičák, Daniel. "Agregace hlášení o bezpečnostních událostech." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255432.

Full text
Abstract:
In this thesis, I present analysis of security incident reports in IDEA format from Mentat and their aggregation and correlation methods design and implementation. In data analysis, I show huge security reports diversity. Next, I show design of simple framework and system of templates. This framework and system of templates simplify aggregation and correlation methods design and implementation. Finally, I evaluate designed methods using Mentat database dumps. The results showed that designed methods can reduce the number of security reports up to 90% without loss of any significant information.
APA, Harvard, Vancouver, ISO, and other styles
29

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramifications beyond single individuals and with a booming black market to trade leaked personal data. To enhance information security in managing personal data by web systems for the mutual benefit of individual persons, companies and governments, this dissertation proposes a solution architecture and three research contributions. While the solution architecture establishes the foundation for a more secure management of personal data by web systems, the research contributions represent complementary components for protecting personal data against unwanted data disclosure, tampering and use without the actual data owner’s intent or knowledge. Not only do these components enable seamless integration and combination, but they also contribute to assure quality and maintainability. The dissertation concludes with discussing evaluation results and providing an outlook towards future work.
APA, Harvard, Vancouver, ISO, and other styles
30

Süßkraut, Martin. "Automatic Hardening against Dependability and Security Software Bugs." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-38342.

Full text
Abstract:
It is a fact that software has bugs. These bugs can lead to failures. Especially dependability and security failures are a great threat to software users. This thesis introduces four novel approaches that can be used to automatically harden software at the user's site. Automatic hardening removes bugs from already deployed software. All four approaches are automated, i.e., they require little support from the end-user. However, some support from the software developer is needed for two of these approaches. The presented approaches can be grouped into error toleration and bug removal. The two error toleration approaches are focused primarily on fast detection of security errors. When an error is detected it can be tolerated with well-known existing approaches. The other two approaches are bug removal approaches. They remove dependability bugs from already deployed software. We tested all approaches with existing benchmarks and applications, like the Apache web-server.
APA, Harvard, Vancouver, ISO, and other styles
31

Willey, James R. "The presence and perceived impact of video surveillance technology in Indiana public schools as reported by building principals." Muncie, Ind. : Ball State University, 2008. http://cardinalscholar.bsu.edu/750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mueller, Thomas. "Internet-Attacken und Schutzmoeglichkeiten." Universitätsbibliothek Chemnitz, 1995. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199500079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Figura, Tomáš. "Bytový dům v Jihlavě, stavebně technologická příprava stavby." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2014. http://www.nusl.cz/ntk/nusl-226975.

Full text
Abstract:
The topic of this master´s thesis deals with a structural and technological preparation of implementation of apartment building in Jihlava. The Apartment building is designed as a building including garages and dwelling units. In the lower part of the building is constructed of reinforced concrete combined system, which is from the 2.PP to 2.NP. The building is designed as a brick system with concrete ceilings on the upper floors. The lower 3 floors are designed as parking garage and a remaining six floors are designed as apartments. The project deals with the entire construction of buildings from technological processes, time and financial plan to safety during construction.
APA, Harvard, Vancouver, ISO, and other styles
34

Haar, Christoph, and Erik Buchmann. "Securing Orchestrated Containers with BSI Module SYS.1.6." Hochschule für Telekommunikation, 2021. https://slub.qucosa.de/id/qucosa%3A73371.

Full text
Abstract:
Orchestrated container virtualization, such as Docker/Kubernetes, is an attractive option to transfer complex IT ecosystems into the cloud. However, this is associated with new challenges for IT security. Containers store sensitive data with the code. The orchestration decides at run-time which containers are executed on which host. Application code is obtained as images from external sources at run-time. Typically, the operator of the cloud is not the owner of the data. Therefore, the configuration of the orchestration is critical, and an attractive target for attackers. A prominent option to secure IT infrastructures is to use security guidelines from agencies, such as Germany’s Federal Office for Information Security. In this work, we analyze the module ”SYS.1.6 Container” from this agency. We want to find out how suitable this module is to secure a typical Kubernetes scenario. Our scenario is a classical 3-tier architecture with front end, business logic and databaseback end. We show that with orchestration, the protection needs for the entire Kubernetes cluster in terms of confidentiality, integrity and availability automatically become ”high” as soon as a sensitive data object is processed or stored in any container. Our analysis has shown that the SYS.1.6 module is generally suitable. However, we have identified three additional threats. Two of them could be exploited automatically, as soon as a respective vulnerability in Docker/Kubernetes appears.
APA, Harvard, Vancouver, ISO, and other styles
35

Arlotti, Luca. "Studio di fattibilità tecnico economico per l'automazione di un reparto presse tramite l'applicazione di cobot." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16184/.

Full text
Abstract:
In questa tesi viene eseguita una ricerca applicativa sull'implementazione di un robot collaborativo, con lo scopo di sgravare gli operatori da mansioni ripetitive e impiegare il loro tempo per migliorare la qualità della produzione e dei prodotti finali. Dopo una parte introduttiva dedicata alla descrizione dei punti salienti dell’Industria 4.0 e alle scelte che il mercato propone riguardo ai robot collaborativi, si è preso in considerazione il caso specifico di ASA San Marino: l’analisi del processo produttivo del reparto presse ha posto la lente di ingrandimento sulle mansioni che il singolo operatore è chiamato a svolgere. Le problematiche evidenziate non riguardavano tutto il reparto ma solo un gruppo di 6 macchine che operano su più turni e costantemente. Per risolvere le problematiche si è ipotizzata un’implementazione robotica di tipo collaborativa, che potesse garantire l’interazione tra uomo e macchina, che non invadesse il layout di reparto con gabbie di recinzione e che, soprattutto, fosse di facile e veloce installazione. Partendo dall'esperienza maturata durante il percorso di tirocinio in ambito di programmazione del cobot, l’obiettivo della tesi è arrivare all'installazione effettiva del cobot al termine del processo di produzione della pressa, utilizzandolo per pallettizzare i prodotti in maniera automatica, collaborando con l’operatore nel raggiungimento dell’obiettivo comune. Per ottenere ciò si è dunque passati prima per un’analisi delle caratteristiche del cobot, inquadrando le sue esigenze e definendo i suoi limiti, poi risolvendo i vari problemi sorti e implementando il sistema per far svolgere le mansioni al robot senza l’aiuto di altri macchinari che richiedessero modifiche del layout.
APA, Harvard, Vancouver, ISO, and other styles
36

Novák, Martin. "Stavebně technologický projekt ZŠ Otevřená, Brno - Žebětín." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2014. http://www.nusl.cz/ntk/nusl-227003.

Full text
Abstract:
The constructive – technological project of elementary school in town district Brno – Žebětín, contains the technical report, the assessment of the wider transport relations, the time and financial plan of buildings, technological project of the site equipment, the main construction machines and mechanisms, the technological prescription for the underground construction, the inspection and test plan for the underground construction, the calculation of buildings for the objects, the safety report and the contract for work.
APA, Harvard, Vancouver, ISO, and other styles
37

Müller, Thomas. "Was leisten Port-Scanner?" Universitätsbibliothek Chemnitz, 2000. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200000309.

Full text
Abstract:
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze und verteilte Systeme (Fakultaet fuer Informatik) der TU Chemnitz. Workshop-Thema: Infrastruktur der ¨Digitalen Universitaet¨ Port-Scanner sind Software-Werkzeuge, die benutzt werden, um Informationen über Rechnersysteme im Internet zu ermitteln. Häufig werden solche Werkzeuge von Angreifern benutzt, um verwundbare Rechnersysteme zu finden. Der Vortrag stellt die Leistungsfähigkeit und die verwendeten Techniken von frei verfügbaren Port-Scannern dar. Weiterhin werden Werkzeuge vorgestellt, mit denen Port-Scan-Vorgänge erkannt werden können.
APA, Harvard, Vancouver, ISO, and other styles
38

Richter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28133.

Full text
Abstract:
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
APA, Harvard, Vancouver, ISO, and other styles
39

Hoefler, Torsten. "Entfernte Analyse von Netzen." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Baštová, Veronika. "Stavebně technologický projekt terasového bytového domu v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2012. http://www.nusl.cz/ntk/nusl-225670.

Full text
Abstract:
The project deals with building technological study of the new building apartment house in Brno. Dimensions of the apartment building are 29.2 m x 57.2 m with shape of a rectangle. The apartment house is designed terraced in five floors as a brick structure of the ceramic blocks. Ceilings and construction in contact with the ground is reinforced concrete. In groundfloor are located garages, other floors are designed as residential. The project deals with technological processes of bottom building, time and financial demands of construction.
APA, Harvard, Vancouver, ISO, and other styles
41

Winkler, Marcus. "Eine Einführung in SELinux." Thesis, Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700108.

Full text
Abstract:
SELinux ist eine Erweiterung für das Betriebssystem Linux, deren Einsatz eine Erhöhung der Systemsicherheit verspricht. Dieses Tutorial stellt einige der Grundlagen und Mechanismen von SELinux vor. Es gibt einen Einblick in Nutzung und Konfiguration<br>SELinux is an extension to the Linux operating system. It promises an increase in system security. This tutorial introduces some of the principles and mechanisms of SELinux. It provides insight into its usage and configuration
APA, Harvard, Vancouver, ISO, and other styles
42

Hartman, Lynne I. "A Narrative Study of Emotions Associated with Negative Childhood Experiences Reported in the Adult Attachment Interview." Antioch University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1443730177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Krüger, Daniel. "Porting the MIRO Middleware to a Mobile Robot Platform." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500986.

Full text
Abstract:
Mobile autonomous robotics in outdoor areas is a challenging task. This domain combines many fields like computer science and electrical engineering. This diploma thesis will show how Miro (Middleware for Robots) has been ported to a new mobile robot platform developed at the Institute for Automation at Chemnitz University of Technology. Additionally, security aspects will be covered, that arise because CORBA is used as middleware, which is an open standard and by default implements no communication security between server and client. Three approaches to solve this problem will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
44

Olsson, Terese, and Cecilia Hermanson. "Avskaffad revisionsplikt : En studie om vilka faktorer som är avgörande i valet att ha en revisor eller inte." Thesis, Södertörns högskola, Institutionen för ekonomi och företagande, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-16540.

Full text
Abstract:
Bakgrund och problem: Revisionsplikten avskaffades 1 november 2010 vilket betyder att mindre aktiebolag som uppfyller vissa kriterier inte längre behöver anställa en revisor. Enligt uppgifter från Bolagsverket är det en stor majoritet av de äldre aktiebolagen som väljer att behålla sin revisor medan det hos de nyregistrerade aktiebolagen är vanligare att inte ha en revisor. Syfte: Syftet med uppsatsen är att undersöka vilka faktorer som är avgörande för mindre aktiebolag i valet att ha en revisor. Vi ska även undersöka vilka fördelar och nackdelar de mindre aktiebolagen ser med revision och om synen varierar beroende på om det är ett bolag som registrerades innan eller efter avskaffandet av revisionsplikten. Metod: I studien används en kvalitativ metod i form av intervjuer. Personliga intervjuer genomfördes med sju olika mindre aktiebolag. Resultat och slutsats: Samtliga bolag är allmänt positiva till avskaffandet av revisionsplikten och menar att majoriteten av mindre aktiebolag inte har ett behov av en revisor. Majoriteten av bolagen anser att revision är en bra kvalitetsgaranti gentemot ett bolags intressenter. De aktiebolag som i dagsläget har en revisor anser att värdet revisorn ger överstiger kostnaden, medan bolag som inte har revisor anser att revision enbart innebär en betungande och onödig kostnad. Förslag till vidare forskning: Vi skulle tycka att det vore intressant att undersöka avskaffandet av revisionsplikten utifrån revisorns perspektiv. Hur har revisorerna påverkats av den nya lagen och vad har den lett till för konsekvenser?<br>Background to problem: Auditing obligation was abolished november 1, 2010. According to Bolagsverket, the vast majority of the older companies choose to retain its auditor, while that of the newly registered companies are more likely to not have an auditor. Purpose: The purpose of this paper is to investigate which factors are crucial for small companies in the elections to be audited. We will also examine the advantages and disadvantages of the smaller companies look to the audit and whether the vision depends on whether it is a company registered before and after abolition. Methodology: The study used a qualitative method using interviews, the interviews were conducted with seven smaller companies. Conclusions: All companies are in favor of the abolition of the audit requirement and believe that the majority of smaller companies do not have a need for an auditor. The majority of companies believe that the audit is a good quality guarantee against a company's stakeholders. The companies that have an auditor believe that the value the auditor gives exceeds the expenses, while companies that do not have an auditor believe that auditing merely constitutes an unnecessary expense. Suggestions for further research: It would be interesting to investigate the removal of the audit requirement based on the auditor's perspective.
APA, Harvard, Vancouver, ISO, and other styles
45

Bègue, Guillaume. "Confidentialité et prévention de la criminalité financière : étude de droit comparé." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D019.

Full text
Abstract:
La tendance contemporaine vers plus de transparence dans la vie des affaires illustre une désaffection générale pour toute forme de confidentialité. Toutefois, cette dernière bénéficie de traductions juridiques dont les sources lui confèrent une indéniable légitimité. Cette observation doit amener à reconnaître l'existence d'un "principe de confidentialité". La rencontre des normes sur la prévention de la criminalité financière avec le principe de confidentialité est source d'insécurité juridique, non seulement pour les professionnels assujettis aux obligations de lutte anti-blanchiment et contre le financement du terrorisme, mais également pour tous les individus dont les données son traitées dans ce cadre. Ces deux blocs de normes aux logiques contradictoires tendant pourtant vers des objectifs communs : le respect des droits fondamentaux. Néanmoins, les excès liés à l'utilisation potentiellement illicite des outils juridiques offerts par l'un, et les défauts des dispositions constituant l'autre, font obstacle à l'application efficace et mesurée du droit. Cette étude se propose d'analyser ces principes antagonistes pour mieux envisager leur équilibre latent au moyen de solutions préservant leurs intérêts propres et concourant à l'amélioration de la sécurité juridique. Dans cette optique, l'exercice de droit comparé permet de parfaire l'interprétation des obligations de vigilance tout en plaidant la réhabilitation du principe de confidentialité. Il témoigne de l'émergence d'un véritable "droit du blanchiment", et en particulier de son volet préventif qui occupe désormais une place prépondérante dans le domaine de la régulation bancaire et financière<br>The recent trend towards transaprency in business highlights a more global disenchantment with the concept of secrecy. The concept of secrecy benefits from various legal expressions whose origins give it as undisputable legitimacy. This observation leads us to recognise the existence of a "Principle of confidentiality". The clash betxeen the rules of Financial Crime prevention and this principle of confidentiality is causing legal uncertainty not only for professional subject to Anti-money laundering and counter-terrorism financing regulations but also gor persons whose data is being processed. These two sets of conflicting rules nevertheless share a common goal, namely to ensure respect for fundamental rights. Notwithstanding this, both the risk of abuse of legal instruments offered by one set for illegitimate purposes and the shortcomings attached to the other set potentially hinder the efficient and reasonable use of Law. This study aims at analysing antagonistic principles to reach a certain balance by applying solutions which preserve their respective interests and contribute to legal certainty. In this regard, the comparative law analysis helps better interpret customer due diligence measures whilst rehabilitating the arguments in favour of the principle of confidentiality. This shows the development of e genuine AML/CFT Law and in particular its preventive aspects that form a major part of the Banking and Financial Regulations
APA, Harvard, Vancouver, ISO, and other styles
46

Franz, Elke, Stefan Pfennig, and André Fischer. "Communication Overhead of Network Coding Schemes Secure against Pollution Attacks." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-89807.

Full text
Abstract:
Network coding is a promising approach for increasing performance of multicast data transmission and reducing energy costs. Of course, it is essential to consider security aspects to ensure a reliable data transmission. Particularly, pollution attacks may have serious impacts in network coding since a single attacker can jam large parts of the network. Therefore, various approaches have been introduced to secure network coding against this type of attack. However, introducing security increases costs. Even though there are some performance analysis of secure schemes, to our knowledge there are no details whether these schemes are worthwhile to replace routing under the facet of efficiency. Thus, we discuss in this report parameters to assess the efficiency of secure network coding schemes. Using three network graphs, we evaluate parameters focusing on communication overhead for selected schemes. Our results show that there are still benefits in comparison to routing depending on the network topology.
APA, Harvard, Vancouver, ISO, and other styles
47

Barreto, Razquin Oscar Maximiliano, Torpoco Karem Angelli Cardenas, Espinoza Cinthia Alejandra Rojas, Alvarado Sebastian Sanchez, and Quiroz Nicole Suheid Serna. "Proyecto Pulsos App." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/654648.

Full text
Abstract:
El presente documento de investigación contiene la implementación de un proyecto de emprendimiento orientado hacia la venta de un servicio aplicativo móvil que reduzca la cantidad de mujeres que sufren de acoso de cualquier tipo en la ciudad de Lima, Perú. Dicha investigación se realizó dentro de los NSE “A” y “B” que posean Smartphone en Lima Metropolitana. Se considera a este proyecto como una idea disruptiva debido a la escasez de competencias, falta de productos similares, aparición de nuevas tecnologías y tendencias. Así mismo, se considera importante abordar esta problemática con un producto efectivo debido a la continua aparición de incidencias, quejas y noticias que se manifiestan día a día en el país. Para concretar este proyecto, se logró efectuar un análisis a detalle para poder validar la rentabilidad, escalabilidad y viabilidad de nuestro servicio con los siguientes temas: Validación del modelo de negocio, Desarrollo del plan de negocios, Plan de operaciones, Plan de recursos humanos, Plan de marketing, Plan de responsabilidad social empresarial, Plan financiero y presupuestos. Por último, la aplicación de este servicio al mercado empresarial puede despertar intereses en organizaciones sin fines de lucro, organizaciones civiles, políticas y gubernamentales con la finalidad que generen un cambio en la sociedad tras la problemática existente.<br>This research document contains the implementation of an entrepreneurial project aimed at selling a mobile application service that will reduce the number of women suffering from harassment of any kind in the city of Lima, Peru. This research was conducted within the NSE "A" and "B" that have smartphones in Metropolitan Lima. This project is considered a disruptive idea due to the shortage of skills, lack of similar products, emergence of new technologies and trends. Likewise, it is considered important to address this issue with an effective product due to the continuous appearance of incidents, complaints and news that are manifested every day in the country. In order to make this project concrete, a detailed analysis was carried out to validate the profitability, scalability and viability of our service with the following topics: Validation of the business model, Development of the business plan, Operations plan, Human resources plan, Marketing plan, Corporate social responsibility plan, Financial plan and budgets. Finally, the application of this service to the business market can arouse interest in nonprofit organizations, civil organizations, political and government in order to generate a change in society after the existing problems.<br>Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
48

Guillen, Vasquez Aranza Antuanet, Olivares Sandra Huamanchumo, Eras Harold Giancarlo Ortiz, Sánchez Yuniel Perera, and Fernández Indira Zevallos. "Qhatipay Perú." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/654826.

Full text
Abstract:
El presente trabajo de investigación desarrolla un proyecto empresarial enfocado en el diseño y comercialización de calzado para niñas, niños y adolescentes, cuyas edades oscilan entre 0 y 14 años de edad. Un aspecto relevante de este emprendimiento social es que operará bajo el modelo de negocios “Buy one, give one”, lo que implica que al efectuarse la venta de determinados modelos la empresa entregará a niños y adolescentes en situación de vulnerabilidad un par de zapatos. Además, se tiene previsto canalizar un porcentaje de las utilidades hacia entidades que realizan ayuda social. El trabajo está estructurado en siete partes: (i) Aspectos Generales, (ii) Planeamiento Estratégico, (iii) Investigación y Validación del Mercado, (vi) Plan de Marketing, (v) Plan de Operaciones, (vi) Estructura Organizacional y de Recursos Humanos y (vii) Planeamiento Económico Financiero. Se trata de un proyecto rentable. Se ha calculado una Tasa Interna de Retorno (TIR) FCNI de 64.32 %. Se observa que este proyecto genera un VPN FCNI de S/268,455.84 lo cual demuestra la viabilidad del mismo.<br>This research work develops a business project focused on the design and marketing of footwear for girls, boys and teenagers, whose ages range from 0 to 14 years old. A relevant aspect of this social enterprise is that it will operate under the “Buy one, give one” business model, which implies that when certain models are sold, the company will give children and adolescents in vulnerable situations a pair of shoes. In addition, it is planned to channel a percentage of the profits to entities that provide social assistance. The work is structured in seven parts: (i) General Aspects, (ii) Strategic Planning, (iii) Market Research and Validation, (vi) Marketing Plan, (v) Operations Plan, (vi) Organizational Structure and Human Resources and (vii) Financial Economic Planning. It is a highly profitable project. An Internal Rate of Return (IRR) of 64.32 % has been calculated. It is observed that this project generates a NPV of S/268,455.84, which demonstrates its viability.<br>Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
49

Alvarez, Rivera Luiggi Andre, and Huaman Bryan Eduardo Orellana. "Solución tecnológica para optimizar el proceso de identificación de delincuentes en Lima Metropolitana." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655226.

Full text
Abstract:
En la actualidad, el incremento de actos delictivos se ha hecho más frecuente en Lima, por lo que es considerado como uno de los mayores problemas que afecta a nuestra sociedad. Esto se ve reflejado en los últimos reportes de seguridad ciudadana donde Lima es considerada una de las ciudades más peligrosas de América Latina. A su vez, las autoridades no cuentan con las herramientas suficientes para combatir a la delincuencia generando que la población se sienta insegura de caminar por las calles y aumentando la cantidad de actos delictivos. Esto incluye la escasez de tecnología que permita optimizar los procesos de identificación o captura de delincuentes, ya que existe un lapso entre que el acto delictivo se realizó y la llegada de las autoridades a la escena. Este tiempo es de suma importancia para poder capturar a un delincuente o poder identificarlo. El presente proyecto tiene como objetivo brindar una solución tecnológica para las autoridades correspondientes que permita optimizar el tiempo de identificación de delincuentes a través del uso del reconocimiento facial. Esta tecnología permite reconocer a delincuentes mediante un análisis de los rasgos faciales del sospechoso y poder realizar una comparación con la base de datos de los delincuentes. La solución tecnológica facultara una alerta en tiempo real con los datos del sospechoso identificado y la ubicación de la cámara que lo idéntico. Esto permitirá que las autoridades puedan realizar mejores estrategias logrando anticiparse al hecho delictivo o capturando al criminal. Los resultados preliminares mostraron que la solución tecnológica permite reducir el tiempo actual de identificación de 5 minutos aproximadamente en un 91.46% y cuenta con una eficacia del 90% basándonos en las pruebas realizadas que son detallas en los capítulos correspondientes<br>At present, the increase in criminal acts has become more frequent in Lima. For this reason, it is considered one of the biggest problems affecting our society. We can see it in the latest citizen security reports, where Lima is one of the most dangerous cities in Latin America. Another fact is that the authorities do not have enough tools to fight crime, making the population feel unsafe to walk the streets and increasing the number of criminal acts. This problem includes the scarcity of technology that allows optimizing the processes of identification or capture of criminals since there is a period between when the criminal act was carried out and the arrival of the authorities on the scene. This time is of the utmost importance to be able to capture a criminal or to be able to identify him. The objective of this project is to provide a technological solution for the corresponding authorities that allows optimizing the identification time of criminals through the use of facial recognition. This technology makes it possible to recognize criminals through an analysis of the suspect's facial features and to be able to make a comparison with the criminal database. The technological solution will enable an alert in real-time with the data of the identified suspect and the location of the identical camera. This will allow the authorities to carry out better strategies, anticipating the crime, or capturing the criminal. Preliminary results showed that the technological solution reduces the current identification time of 5 minutes approximately by 91.46% and has an efficiency of 90% based on the tests carried out, which are detailed in the corresponding chapters.<br>Tesis
APA, Harvard, Vancouver, ISO, and other styles
50

Samán, Roque Tiffany Katiuska, and Cerrón María Greca Marroquín. "Evaluación del costo, volumen, utilidad y su impacto en la gestión financiera de las empresas del sector seguridad del distrito de Chorrillos, año 2018." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653946.

Full text
Abstract:
Este trabajo de investigación busca evaluar la incidencia del Costo, Volumen y Utilidad en la gestión financiera en las empresas del Sector Seguridad empresarial del distrito de Chorrillos en el ejercicio 2018. Se brindará a las empresas del sector una herramienta que les permita optimizar los costos relacionados a los servicios brindados, y a partir de ello, las empresas puedan tomar decisiones estratégicas para maximizar la rentabilidad. Esta investigación está conformada por cinco capítulos. En primer lugar, está el marco teórico, dividido en tres partes desarrolladas para dar a conocer información preliminar necesaria para la comprensión de la investigación: Primero analizamos la variable independiente, el Costo volumen utilidad, indicando los principales conceptos y dimensiones. Luego, la Gestión Financiera, indicando su importancia y los principales indicadores relacionados y finalmente el Sector Seguridad, del cual mencionamos el comportamiento del sector de estudio en el Perú y el mundo. En el segundo capítulo, se presenta el plan de investigación, el cual describe su importancia, los problemas planteados, objetivos e hipótesis, así mismo, mencionamos las investigaciones nacionales e internacionales relacionadas al tema investigado. En el tercero, se muestra la metodología utilizada para la recolección de información y el tamaño de la muestra que se usará para realizar el análisis cuantitativo y cualitativo. El cuarto capítulo, desarrolla la aplicación de los instrumentos, cuantitativos y cualitativos, así mismo presenta un caso de aplicación. Finalmente, se analiza la información obtenida y los resultados del caso práctico. Al finalizar, se realizan las conclusiones y recomendaciones del tema desarrollado.<br>The aim of this research is to evaluate the prevalence of the cost-volume-profit model in financial management of business security companies of Chorrillos in the year 2018. Companies in this industry will be given a tool to optimize costs related to the services they provide, and from there, make strategic decisions to maximize profitability. This research is made up of five chapters. The first chapter, Theoretical Framework, is divided in three detailed parts to give preliminary information needed to understand this research. Firstly, independent variable Cost-Volume-Profit is analyzed, indicating main concepts and dimensions; then, Financial Management, showing its importance and main related indicators; and finally, Security Industry, mentioning its performance in Peru and around the world. In the second chapter, the research plan is shown describing its importance, problems posed, objectives and hypothesis. Likewise, related national and international research is mentioned. On the third, the methodology used to collect information and sample size used to give a quantitative and qualitative analysis. The fourth chapter explores the data collection of each instrument used and shows an application scenario. Then, the information and results obtained will be analyzed. Lastly, conclusions and recommendations regarding this topic will be given.<br>Tesis
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography