Narrow your search

Library

Odisee (171)

Thomas More Kempen (171)

Thomas More Mechelen (171)

UCLL (171)

VIVES (171)

KU Leuven (161)

ULiège (146)

ULB (133)

UGent (71)

LUCA School of Arts (48)

More...

Resource type

book (171)

digital (5)


Language

English (171)


Year
From To Submit

2023 (41)

2022 (4)

2021 (2)

2019 (1)

2018 (1)

More...
Listing 1 - 10 of 171 << page
of 18
>>
Sort by
Multicast and group security
Authors: ---
ISBN: 158053659X 9781580536592 1580533426 9781580533423 Year: 2003 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.

Security sage's guide to hardening the network infrastructure
Author:
ISBN: 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 9786611052621 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u


Book
Personnel Protection : Proven Practices
Authors: ---
ISBN: 1299631274 9781299631274 9780124169883 0124169880 9780124170032 012417003X Year: 2013 Publisher: Burlington : Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series

Network security : a practical guide
Author:
ISBN: 1136377077 1136377085 1281024295 9786611024291 0080512542 9780080512549 9781136377082 9781136377037 1136377034 9781136377075 9781138435261 1138435260 9780750650335 0750650338 0750650338 Year: 2003 Publisher: Oxford : Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the diff


Book
Proceedings of the 3rd European Conference on Computer Network Defense
Authors: ---
ISBN: 0387855548 9786613251305 0387855556 1283251302 Year: 2009 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.


Book
Once more unto the Breach : Managing information security in an uncertain world
Author:
ISBN: 1849287104 Year: 2015 Publisher: Ely : IT Governance Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.


Book
Document Security : Protecting Physical and Electronic Content
Author:
ISBN: 0398085358 9780398085353 Year: 2007 Publisher: Springfield : Charles C Thomas,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in


Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica, Calif. : Rand Corp.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

Policy-based network management : solutions for the next generation
Author:
ISBN: 1558608591 9786611007225 1281007226 008049210X 9780080492100 9781558608597 Year: 2004 Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities. Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes i


Book
Kali Linux Wireless Penetration Testing Essentials.
Author:
ISBN: 9781785284816 1785284819 9781785280856 1785280856 Year: 2015 Publisher: : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.

Listing 1 - 10 of 171 << page
of 18
>>
Sort by