Narrow your search

Library

KU Leuven (1129)

ULiège (512)

VDIC (499)

Thomas More Mechelen (446)

Odisee (445)

VIVES (444)

Thomas More Kempen (443)

ULB (441)

UCLL (438)

UGent (246)

More...

Resource type

book (1367)

periodical (35)

undetermined (11)

digital (9)

dissertation (1)

More...

Language

English (1415)


Year
From To Submit

2024 (10)

2023 (23)

2022 (33)

2021 (31)

2020 (26)

More...
Listing 1 - 10 of 1415 << page
of 142
>>
Sort by

Book
Building Cyber Resilience Against Hybrid Threats
Author:
ISBN: 9781643682938 Year: 2022 Publisher: Amsterdam : IOS Press, Incorporated,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Careers in Computer Desktop Publishing : Use Your Artistic and Writing Skills to Create Publications for Freelance and Franchise Shop Clients
Author:
ISBN: 142374313X 9781423743132 Year: 2005 Publisher: Chicago : Institute for Career Research,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Criminal justice information and protection of privacy act of 1975 : hearings before the Subcommittee on Constitutional Rights of the Committee on the Judiciary, United States Senate, Ninety-fourth Congress, first session, on S. 2008, S. 1427, and S. 1428, July 15 and 16, 1975
Author:
Year: 1975 Publisher: Washington : U.S. G.P.O.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computing Inequality : Have Computers Changed the Labor Market?
Authors: --- --- ---
Year: 1997 Publisher: Cambridge, Mass. National Bureau of Economic Research

Loading...
Export citation

Choose an application

Bookmark

Abstract

This paper examines the effect of technological change and other factors on the relative demand for workers with different education levels and on the recent growth of U.S. educational wage differentials. A simple supply-demand framework is used to interpret changes in the relative quantities, wages, and wage bill shares of workers by education in the aggregate U.S. labor market in each decade since 1940 and from 1990 to 1995. The results suggest that the relative demand for college graduates grew more rapidly on average during the past 25 years (1970-95) than during the previous three decades (1940-70). The increased rate of growth of relative demand for college graduates beginning in the 1970s did not lead to an increase in the college/high school wage diffe- rential until the 1980s because the growth in the supply of college graduates increased even more sharply in the 1970s before returning to historical levels in the 1980s. The acceleration in demand shifts for more-skilled workers in the 1970s and 1980s relative to the 1960s is entirely accounted for by an increase in within-industry changes in skill utilization rather than between- industry employment shifts. Industries with large increases in the rate of skill upgrading in the 1970s and 1980s versus the 1960s are those with greater growth in employee computer usage, more computer capital per worker and larger investment as a share of total investment. The results suggest that the spread of computer technology may `explain' as much as 30-50% of the increase in the rate of growth of the relative demand for more-skilled workers since 1970.

Keywords

Computers --- Access control


Book
DIVANet '17 : Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications : November 21-25, 2017, Miami, FL, USA
Authors: --- ---
Year: 2017 Publisher: New York, NY : ACM,

Loading...
Export citation

Choose an application

Bookmark

Abstract

We are pleased to welcome you to the Seventh ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet'17), held in conjunction with the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'17), in Miami Beach, USA on November 21 to 26, 2017. The Seventh ACM DIVANet'17 International Symposium aims to provide researchers and practitioners with a venue to disseminate and share state-of-the-art research on vehicular networks, intelligent transportation systems and wireless mobile ad hoc networking. Every paper submitted has been peerreviewed by at least two referees from the Technical Program Committee. We have received a large number of papers and due to the time limitation, we could only accommodate fifteen papers, which represent a 29% acceptance rate. Finally, we would like to thank the authors for their paper contributions and all the reviewers for their timely feedbacks. We hope you will find this program interesting and that the symposium provides you with a forum of discussion and an opportunity to share ideas with other researchers and specialists from around the world.


Book
Criminal justice information and protection of privacy act of 1975 : hearings before the Subcommittee on Constitutional Rights of the Committee on the Judiciary, United States Senate, Ninety-fourth Congress, first session, on S. 2008, S. 1427, and S. 1428, July 15 and 16, 1975
Author:
Year: 1975 Publisher: Washington : U.S. G.P.O.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security and Privacy, 1997: Proceedings, IEEE Symposium on Security and Privacy (1997: Oakland, CA).
Author:
Year: 1997 Publisher: [Place of publication not identified] IEEE Computer Society Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Three brief summaries of panel discussions and 28 papers cover the trusted computing base model, authorization and authentication, applications, security theory, ensuring assurance in mobile computing, architecture, intrusion detection and beyond, security in innovative new operating systems, and system vulnerability. Among specific topics are some weaknesses of the trusted computing base model, acceptable metrics of authentication, anonymous connections and onion routing, secure software architectures, local enforcement for global policies, surviving information warfare attacks on databases, research on proof- carrying code for untrusted-code security, and the possibility of evasive electronic espionage by deniable password snatching. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.

Keywords

Computers --- Access control


Book
Implementing multifactor authentication : protect your applications from cyberattacks with the help of MFA
Author:
ISBN: 180324058X Year: 2023 Publisher: Birmingham, England : Packt Publishing Ltd.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Avoid MFA pitfalls--learn how to choose, implement, and troubleshoot MFA in your company Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenarios Choose the right MFA solutions to enhance your organization's security Book Description MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience. You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you'll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you'll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys. By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud. What you will learn Evaluate the advantages and limitations of MFA methods in use today Choose the best MFA product or solution for your security needs Deploy and configure the chosen solution for maximum effectiveness Identify and mitigate problems associated with different MFA solutions Reduce UX friction with ForgeRock and behavioral biometrics Stay informed about technologies and future trends in the field Who this book is for This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. While basic knowledge of authentication and IAM is helpful, it is not a prerequisite.


Book
Secure web-site access with tickets and message-dependent digests
Authors: ---
Year: 2008 Publisher: Reston, Va. : U.S. Dept. of the Interior, U.S. Geological Survey,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Web sites --- Access control.


Book
Assessment of access control systems
Authors: --- --- ---
Year: 2006 Publisher: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 1415 << page
of 142
>>
Sort by