Narrow your search

Library

KU Leuven (10)

UCLouvain (10)

VUB (6)

UGent (5)

ULiège (3)

UAntwerpen (2)

Hogeschool Gent (1)

KBR (1)

UHasselt (1)

ULB (1)

More...

Resource type

book (10)


Language

English (8)

French (1)

German (1)


Year
From To Submit

2009 (2)

2007 (2)

2000 (1)

1994 (1)

1992 (1)

More...
Listing 1 - 10 of 10
Sort by

Book
Schlüssel und Schloss : Schönheit, Form und Technik im Wandel der Zeiten
Authors: --- ---
ISBN: 3766702602 9783766702609 Year: 1973 Publisher: München Callwey

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Burglars on burglary : prevention and the offender
Authors: ---
ISBN: 0566007568 9780566007569 Year: 1984 Publisher: Aldershot Gower


Book
Technologies of insecurity : the surveillance of everyday life.
Authors: --- ---
ISBN: 9780415464550 9780203891582 9781134040315 9781134040353 9781134040360 9780415599795 0415599792 0415464552 Year: 2009 Publisher: London Routledge

Loading...
Export citation

Choose an application

Bookmark

Abstract

Technologies of InSecurity examines how general social and political concerns about terrorism, crime, migration and globalisation are translated into concrete practices of surveillance and securitisation of everyday life. The book is based on contributions from an international panel of leading criminologists, lawyers and surveillance scholars and provides new insights about how broader political issues are translated into concrete and local practices of social control and exclusion.

Civilizing security
Authors: ---
ISBN: 9780521691598 9780521871204 0521871204 0521691591 9780511611117 1107171903 9786610909759 0511285825 0511286546 0511322011 0511611110 1280909757 0511284241 051128506X Year: 2007 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security has become a defining feature of contemporary public discourse, permeating the so-called 'war on terror', problems of everyday crime and disorder, the reconstruction of 'weak' or 'failed' states and the dramatic renaissance of the private security industry. But what does it mean for individuals to be secure, and what is the relationship between security and the practices of the modern state? In this timely and important book, Ian Loader and Neil Walker outline and defend the view that security remains a valuable public good. They argue that the state is indispensable to the task of fostering and sustaining liveable political communities in the contemporary world and thus pivotal to the project of civilizing security. This is a major contribution by two leading scholars in the field and will be of interest to anyone wishing to deepen their understanding of one the most significant and pressing issues of our times.


Book
Security
Author:
ISBN: 9780415391764 9780415391757 9780203087237 9780203871133 9781135248963 9781135249007 9781135249014 0415391768 Year: 2009 Publisher: London : Routledge,

Imagining security.
Authors: ---
ISBN: 1843920743 9781843920748 1843920751 9781843920755 9781843926269 9781134016310 9781134016389 9781134016457 Year: 2007 Publisher: Cullompton Willan


Book
Gardiennage, surveillance et sécurité privée : commerce de la peur ou peur du commerce ?
Authors: ---
ISBN: 2907370243 9782907370240 Year: 1992 Volume: 56 Publisher: Paris : CESDIP,

Network security essentials : applications and standards
Author:
ISBN: 0130160938 9780130160935 Year: 2000 Publisher: Upper Saddle River Prentice Hall

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer networks --- Computer security --- Security measures --- -Computer security --- 681.3*C20 --- 681.3*D46 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security. --- 6813*C20 --- Computer networks. --- Security systems. --- Burglary protection --- Monograph --- Computer networks - Security measures

Firewalls and Internet security : repelling the wily hacker
Authors: ---
ISBN: 0201633574 9780201633573 Year: 1994 Publisher: Reading, Mass. Addison-Wesley

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer networks --- Internet (Computer networks) --- Security measures --- -681.3 *C2 --- 681.3*C20 --- 681.3*D46 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer communication networks: data communications OSI security and protection --- Computerwetenschap--?*C20 --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications OSI security and protection --- Firewalls (Computer security) --- Firewalls --- Beveiliging (ICT) --- Internettechnologie --- -005.8 --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Firewalls (Computer security). --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Coupe-feu (Sécurité informatique) --- 005.8 --- #TELE:SYST --- 681.3 *C2 --- Computer architecture. Operating systems --- 6813*C20 --- Internet --- Internet (Computer network) --- COMPUTER NETWORKS --- INTERNET --- Monograph --- Computer networks. --- Security systems. --- Internet. --- DARPA Internet --- Wide area networks (Computer networks) --- World Wide Web --- Burglary protection --- Computer networks - Security measures

Listing 1 - 10 of 10
Sort by