Academic literature on the topic 'Security Suite'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Suite.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Dissertations / Theses on the topic "Security Suite"

1

Bartoli, Andrea. "Security protocols suite for machine-to-machine systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.

Full text
Abstract:
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a bus
APA, Harvard, Vancouver, ISO, and other styles
2

Johansson, Michael. "Internet of things security in healthcare : A test-suite and standard review." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.

Full text
Abstract:
Internet of things is getting more and more popular in healthcare as it comes with benefits that help with efficiency in saving lives and reduce its cost, but it also presents a new attack vector for an attacker to steal or manipulate information sent between them. This report will focus on three properties in the definition of security, confidentiality, integrity and access control. The report will look into what challenges there is in healthcare IoT today through a literature review and from those challenges look into what could minimise these challenges before a device gets into production.
APA, Harvard, Vancouver, ISO, and other styles
3

McCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.

Full text
Abstract:
Widespread adoption of cloud services is fundamentally changing the way IT services are delivered and how data is stored. Current forensic tools and techniques have been slow to adapt to new challenges and demands of collecting and analyzing cloud artifacts. Traditional methods focusing only on client data collection are incomplete, as the client may have only a (partial) snapshot and misses cloud-native artifacts that may contain valuable historical information. In this work, we demonstrate the importance of recovering and analyzing cloud-native artifacts using G Suite as a case study. We dev
APA, Harvard, Vancouver, ISO, and other styles
4

Kohout, David. "Implementace zabezpečení do DLMS protokolu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.

Full text
Abstract:
This thesis is focused on smart meters cyber security using DLMS Security Suite standard. Security is more important every day and DLMS specifies multiple methods of authentication and message encryption which is defined in Security Suites. For message creation there are multiple possible formats that can be used. For a better understanding all formats are analysed and compared using a specific example. Main part of this work is about making a testing application called VUT DLMS Tester which is used for testing this standard for real usage in distribution network. Whole development is cooperat
APA, Harvard, Vancouver, ISO, and other styles
5

Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.

Full text
Abstract:
Les protocoles historiques d’Internet (TCP/IP) qui servaient à interconnecter les tous premiers ordinateurs ne sont plus adaptés à la diffusion massive de contenus qui en est fait aujourd’hui. De nouveaux protocoles réseau centrés sur les contenus (Information-Centric Networking) sont actuellement conçus pour optimiser ces échanges en pariant sur un changement de paradigme où les contenus, plutôt que les machines sont adressables à l’échelle d’Internet. Cependant, un tel changement ne peut se faire que progressivement et si tous les impératifs opérationnels sont assurés. Ainsi, cette thèse a p
APA, Harvard, Vancouver, ISO, and other styles
6

Třeštíková, Lenka. "Bezpečnostní metriky platformy SAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.

Full text
Abstract:
Main goal of this thesis is analyzing potential security risks of the SAP NetWeaver platform and identifying various vulnerabilities, that are results of poor system configuration, incorrect segregation of duties or insufficient patch management. Methodology for platform evaluation is defined by vulnerabilities, security requirements and controls will be created.
APA, Harvard, Vancouver, ISO, and other styles
7

Robert, Emilie. "L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001." Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.

Full text
Abstract:
La lutte contre le terrorisme, ainsi que ses conséquences sur la sphère des droits de l'Homme, n'est pas un thème nouveau en Europe. Cependant, depuis les attentats du 11 septembre 2001 perpétrés sur le sol des Etats-Unis, «confirmés» par ceux de Madrid en 2004 et Londres en 2005, elle n'a jamais incarné une telle priorité. La majeure partie des mesures prises par l'Union européenne tombe sous le titre de la coopération en matière pénale, c’est-à-dire sousl’ex-troisième Pilier, parmi lesquelles la décision-cadre sur la lutte contre le terrorisme, la décision-cadre sur le mandat d'arrêt europée
APA, Harvard, Vancouver, ISO, and other styles
8

Rehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.

Full text
Abstract:
Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of products,shortened development cycles and heightened expectations of quality. MDD(Model Driven Development) has been counting as an exciting and magicaldevelopment approach in the software industry from several years. The ideabehind MDD is the separation of business logic of a system from its implementationdetails expressing problem domain using models. This separation andmodeling of p
APA, Harvard, Vancouver, ISO, and other styles
9

Moyer, Shawn P. "Creating a mix of spooks and suits : a new role for intelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Ziani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.

Full text
Abstract:
Non-functional requirements such as Security and Dependability (S&D) become more and more important as well as more and more difficult to achieve, particularly in embedded systems development. Such systems come with a large number of common characteristics, including real-time and temperature constraints, security and dependability as well as efficiency requirements. In particular, the development of Resource Constrained Embedded Systems (RCES) has to address constraints regarding memory, computational processing power and/or energy consumption. In this work, we propose a modeling environment
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!