Narrow your search

Library

UGent (13)

KU Leuven (12)

LUCA School of Arts (10)

Odisee (10)

Thomas More Kempen (10)

Thomas More Mechelen (10)

UCLL (10)

VIVES (10)

ULiège (9)

Vlerick Business School (7)

More...

Resource type

book (13)


Language

English (13)


Year
From To Submit

2024 (1)

2023 (2)

2017 (2)

2016 (1)

2015 (1)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
New trends in technologies : control, management, computational intelligence and network systems
Author:
ISBN: 9535157310 953307213X Year: 2010 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

The grandest accomplishments of engineering took place in the twentieth century. The widespread development and distribution of electricity and clean water, automobiles and airplanes, radio and television, spacecraft and lasers, antibiotics and medical imaging, computers and the Internet are just some of the highlights from a century in which engineering revolutionized and improved virtually every aspect of human life. In this book, the authors provide a glimpse of the new trends of technologies pertaining to control, management, computational intelligence and network systems.


Book
Security technology convergence insights
Author:
ISBN: 0128028424 0128030011 Year: 2015 Publisher: Amsterdam, Netherlands : Elsevier : Security Executive Council,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security operations center guidebook : a practical guide for a successful SOC
Authors: ---
ISBN: 9780128036822 0128036826 0128036575 9780128036570 Year: 2017 Publisher: Oxford, England : Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Trafficking data : how China is winning the battle for digital sovereignty
Author:
ISBN: 9780197620502 0197620507 9780197620519 9780197620533 Year: 2023 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Trafficking Data argues that the movement of human data across borders for political and financial gain is disenfranchising consumers, eroding national autonomy, and destabilizing sovereignty. Focusing on the United States and China, it traces how US government leadership failures, Silicon Valley's disruption fetish, and Wall Street's addiction to growth have yielded an unprecedented opportunity for Chinese firms to gather data in the United States and quietly send it back to China, and by extension, the Chinese government. Such "data trafficking," as the book names this insidious phenomenon, is enabled by the competing governance models of the world's two largest economies: mass government data aggregation in China and impenetrable corporate data management policies in the United States. China is stepping up its data trafficking efforts through national regulations, soft power persuasion, and tech investment, extending the scope of state control over domestic and international data and tech infrastructure, and thereby expanding its global influence. The United States, by contrast, is retreating from participation in foreign alliances, international organizations, and the systemic regulation of the tech industry-practices with the potential to counter data trafficking. Confronting data trafficking as the defining international competition of the twenty-first century, this book ultimately advocates for an alternative future of data stabilization. To stem data trafficking and stabilize data flows, it shows, policymakers can synthesize tools from across the private sector, public sector, multi-national organizations, and consumers to protect users, secure national sovereignty, and establish valuable international standards"--


Book
Advanced persistent threat : understanding the danger and how to protect your organization
Author:
ISBN: 128381076X 1597499552 1597499498 9781597499491 9781283810760 9781597499552 Year: 2013 Publisher: Boston : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric


Book
UTM security with Fortinet : Mastering FortiOS
Author:
ISBN: 1283810794 1597499773 1597497479 9781597499774 9781597497473 9781283810791 Year: 2013 Publisher: Boston : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's For


Book
Seven deadliest network attacks
Authors: --- ---
ISBN: 1282738259 9786612738258 1597495506 1597495492 9781597495509 9781282738256 9781597495493 Year: 2010 Publisher: Amsterdam ; Boston : Elsevier : Burlington, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of ServiceWar DialingPenetration ""Test


Book
Data sovereignty : from the digital Silk Road to the return of the state
Authors: ---
ISBN: 0197582818 019758280X 0197582826 9780197582824 0197582796 Year: 2023 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

'Data Sovereignty' explores the attempts by governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoking ideas about the nature and scope of digital sovereignty.


Book
Cloud policy : a history of regulating pipelines, platforms, and data
Author:
ISBN: 026237868X 0262378698 0262548062 Year: 2024 Publisher: Cambridge, Massachusetts : The MIT Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This book is a history of U.S. regulations governing media and distribution infrastructures that support the cloud"--

Building DMZs for Enterprise networks
Author:
ISBN: 1281056146 9786611056148 0080476260 1931836884 1932266593 9781932266597 9781931836883 Year: 2003 Publisher: Rockland, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.-

Listing 1 - 10 of 13 << page
of 2
>>
Sort by