Narrow your search

Library

KU Leuven (10)

Odisee (6)

Thomas More Kempen (6)

Thomas More Mechelen (6)

VIVES (6)

UCLL (5)

UGent (4)

KBC (3)

LUCA School of Arts (3)

ULB (3)

More...

Resource type

book (10)


Language

English (10)


Year
From To Submit

2024 (1)

2019 (1)

2018 (2)

2015 (1)

2014 (1)

More...
Listing 1 - 10 of 10
Sort by

Book
ACM SIGGRAPH 2011 studio talks
Authors: ---
ISBN: 1450309739 Year: 2011 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The Richard Burton diaries.
Authors: ---
ISBN: 9780300197280 Year: 2013 Publisher: New Haven Yale university press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Shell structures for architecture : from finding and optimization
Authors: --- --- ---
ISBN: 9780415840606 9780415840590 0415840600 0415840597 9781315849270 9781317909361 9781317909378 1315849275 Year: 2014 Publisher: London Routledge

History & crime
Authors: --- ---
ISBN: 9781412920803 9781412920797 1412920795 1412920809 Year: 2008 Publisher: Los Angeles, Calif. SAGE

Loading...
Export citation

Choose an application

Bookmark

Abstract

History and crime
Authors: --- ---
ISBN: 1446213455 1282021028 9786612021022 1849202354 9781849202350 9781446213452 1412920809 9781282021020 6612021020 9781412920797 1412920795 9781412920803 1412920809 1446229645 Year: 2007 Publisher: London : SAGE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Providing an introduction to the history of crime and crime control, this title explains the historical background that is essential for an understanding of contemporary criminal justice and examines the historical context for contemporary criminological debates.


Book
Understanding security issues
Authors: --- ---
ISBN: 1501506366 1501506501 Year: 2019 Publisher: Boston : Walter de Gruyter Incorporated,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.


Book
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats
Authors: --- --- ---
Year: 2015 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.


Book
Understanding security issues
Authors: --- ---
ISBN: 9781501506505 1501506501 9781501506369 1501506366 9781501515231 1501515233 Year: 2018 Publisher: Berlin : De|G Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.


Book
Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats
Authors: --- --- ---
ISBN: 1484232585 1484232577 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You’ll Learn: Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade.


Book
Digital Disruption and Transformation : Case Studies, Approaches, and Tools
Authors: --- --- --- ---
ISBN: 3031478886 Year: 2024 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In an era marked by relentless digital disruption, where every interaction - whether it's a click, a tap, or a swipe - shapes the structure of our interconnected world, the need for transformative action becomes notably clear. This collection brings together a dynamic compilation of insights, carefully selected from leading experts in the field, ready to navigate the uncharted waters of this digital revolution. The collection comprises submissions from two ISPIM (International Society for Professional Innovation Management) events, along with additional contributions. It offers an extensive view that encompasses the various challenges and opportunities brought about by the tumultuous waves of digital disruption and transformation, spanning a wide range of aspects in contemporary business and society. The primary aim of this collection is to emphasize the idea that the emerging global digital economy urgently requires a comprehensive perspective on digitalization, making it central for all institutions. Contributions in this collection shed light on important subjects, including, but not limited to, The Evolution of Digital Transformation, Skills and Knowledge Requirements in the Era of Digital Transformations, and Data-Driven Foresight. Within the boundaries of this scholarly endeavor, a deep understanding of the intricate network of digitalization and its consequences is nurtured. As the relentless surge of digitalization continues, this collection serves as an invaluable guide for discerning scholars and practitioners alike, inviting them to navigate this transformative period with wisdom and expertise. .

Listing 1 - 10 of 10
Sort by