Narrow your search

Library

EhB (3)

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

UCLouvain (1)

More...

Resource type

book (3)


Language

English (3)


Year
From To Submit

2010 (1)

2008 (1)

2007 (1)

Listing 1 - 3 of 3
Sort by

Book
Economics of Information Security and Privacy
Authors: --- --- ---
ISBN: 9781441969675 9781441969668 1441969667 Year: 2010 Publisher: Boston MA Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.

EC2ND 2006 : proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis
Authors: --- --- ---
ISBN: 9781846287503 1846287499 9781846287497 9786612823350 1846287502 1282823353 Year: 2007 Publisher: London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK. The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area. The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006. Topics and issues discussed include: Computer Network Operations Computer Network Attack Network Application Security Network Forensics Web Security Vulnerability Management and Tracking Network Defence Wireless and Mobile Security Cryptography Network Discovery and Mapping Network Security Intrusion Detection Systems Incident Response and Management Computer Forensics Practice Malicious Software Analysis Network Architectures and Management Legal and Ethical Issues The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners.

Keywords

Computer Science. --- Management of Computing and Information Systems. --- Legal Aspects of Computing. --- Information Systems Applications (incl.Internet). --- Information Storage and Retrieval. --- Computer Communication Networks. --- Computer science. --- Information storage and retrieval systems. --- Information systems. --- Computers --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Systèmes d'information --- Ordinateurs --- Law and legislation. --- Droit --- Information storage and retrieval systems --- Computer networks -- Security measures -- Congresses. --- Computer Science -- Information technology. --- Computer security -- Congresses. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Security measures --- Computer communication systems. --- Information storage and retrieval. --- Computers. --- Management information systems. --- Information Systems Applications (incl. Internet). --- Information storage and retrieva. --- Cyberspace --- Law and legislation --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Informatics --- Science --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing


Book
Intrusion detection systems
Authors: ---
ISBN: 9780387772653 0387772650 9780387772660 1441945857 9786611491758 1281491756 0387772669 Year: 2008 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

Keywords

Computer networks --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Computer networks -- Security measures. --- Computer Science -- IT. --- Computer security. --- Intrusion detection systems (Computer security). --- Engineering & Applied Sciences --- Computer Science --- Electrical & Computer Engineering --- Telecommunications --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- Computer network architectures. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 3 of 3
Sort by