Finding a Safe Port: Cyber-Security Analysis for Open Source Digital Library Software

Author(s):  
Alex Tudu ◽  
David Bainbridge ◽  
Bill Rogers
2019 ◽  
Vol 9 (2) ◽  
pp. 1-4
Author(s):  
Sukumar Mandal

Digital library is a collection of electronic objects. Information retrieval is a part of digital library system. Digital library can be developed through open source software and tools. Institutional digital repository is also an important field in present and next generation automated and digital library system. Now, this paper is present how to import metadata formats from different database by EPrints for the development of institutional digital repository. There are different types of metadata formats available in open source environment but this paper is shows some high and matured level software for development and designing this integrated framework. However, in this section has a show how to data import from Koha, Emerald, D-Space, and Vu-Find for the better management of digital information services among the users as well as library professionals.


Author(s):  
Munawaroh

Repository Banking and Finance (ReBaf) is one of the digital library services developed by STIE Perbanas Surabaya in an effort to extend the collection of banking and financial data organized by the Library of STIE Perbanas Surabaya. The ReBaf SISFO (information system) applies open-source software basis with PHP SQL programming language and Postgre SQL database.


Author(s):  
Ievgen Babeshko ◽  
Kostiantyn Leontiiev

Safety assessment of nuclear power plant instrumentation and control systems (NPP I&Cs) is a complicated and resource-consuming process that is required to be done so as to ensure the required safety level and comply to normative regulations. A lot of work has been performed in the field of application of different assessment methods and techniques, modifying them, and using their combinations so as to provide a unified approach in comprehensive safety assessment. Performed research has shown that there are still challenges to overcome, including rationale and choice of the safety assessment method, verification of assessment results, choosing and applying techniques that support safety assessment process, especially in the nuclear field. This chapter presents a developed framework that aggregates the most appropriate safety assessment methods typically used for NPP I&Cs.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 196
Author(s):  
R Vignesh ◽  
K Rohini

This paper analyzes a variety of Challenging Roles of Ethical Hacking employed in Cyber Security. The requirement for more viable requesting data security rehearses is progressively evident with every security encroaches revealed in the media. Ethical hacking set forward a target investigation of an association's data security bearing for associations of numerous phase of security capability. Programmers must output for shortcomings, test section focuses, needs targets, and build up a procedure that best use their assets. The reason for this sort of security appraisal directly affects the estimation of the entire assessment. More finished it is recognized that electronic devices are fundamental to forestall digital culprits hacking into online systems to contain their administrations and access secret information for uncalled for purposes. Ethical Hacking is capably required where approved programmers endeavor to penetrate a business' frameworks/arranges for the benefit of the proprietors with the goal of discovering security shortcomings. It give bits of knowledge into how Ethical Hacking, as Penetration Testing utilizing free open source devices, can be utilized by associations to secure their system's administrations/activities. Utilizing Nmap, Google Hacking, Nessus, Brutus and Acunetix .Thus measures were placed in to determine these vulnerabilities and dodge the delicate information from potential digital threats.  


Sign in / Sign up

Export Citation Format

Share Document