Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Projectmanagement wordt vaak in één woord genoemd met 'grote projecten' en ICT-projecten. Maar ons leven zit vol allerlei kleine en grote projecten, gaande van de verbouwing van je huis, over een huwelijksfeest tot de projecten waarmee je op je werk te maken krijgt. We realiseren ons vaak niet dat ook deze projecten een plan van aanpak verdienen, en gooien er ons enthousiast - maar vaak onwetend - in. An Gaublomme en Rudi Madalijns bieden een kader aan iedereen die een dergelijk project met meer kennis van zaken (en meer kans op succes!) wil aanpakken. Met praktijkgerichte voorbeelden en tips overlopen ze alle schakels in de cyclus van zowel grote als kleine projecten. Bovendien bekijken ze het project niet alleen vanuit het oogpunt van de projectleider, maar bieden ze een houvast aan alle deelnemers van het project.
Business management --- projectmanagement --- Project management --- Projectmanagement --- PXL-Business 2018 --- organisatiekunde --- 658.5 --- Management --- Teamwerk --- Managementvaardigheden --- 005.8
Choose an application
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs. The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications. Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
Computer security. --- Cryptography. --- computerbeveiliging --- 005.8 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Ciphers --- Security systems --- Hacking --- Computerbeveiliging --- Informatiesystemen --- beveiliging --- Computerbeveiliging. --- beveiliging. --- Beveiliging. --- cryptografie --- Computer science --- Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Informatiques -- cryptographie = informatics -- cryptography
Choose an application
Unix --- Computer architecture. Operating systems --- Computer security --- Internet --- Operating systems (Computers) --- Sécurité informatique --- Systèmes d'exploitation (Ordinateurs) --- Congresses --- Congrès --- UNIX (Computer file) --- Internet. --- #TELE:SYST --- 005.8 --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Operating systems --- Security measures --- UNIX (Computer operating system) --- Computer security. --- MET Methods & Techniques --- Internet ( computer network ) --- computer science --- methods & techniques --- Operating systems (Computers). --- Sécurité informatique --- Systèmes d'exploitation (Ordinateurs) --- Congrès --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author
Programming --- OS (operating system) --- computercriminaliteit --- computerbeveiliging --- Computer architecture. Operating systems --- Computer security. --- Computer viruses. --- Debugging in computer science. --- Malware (Computer software) --- Information Technology --- General and Others --- Malware (Computer software). --- Computer viruses --- Debugging in computer science --- Computer security --- Engineering & Applied Sciences --- Computer Science --- 005.8 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software viruses --- Viruses, Computer --- Computer crimes --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Security measures --- Cyber security --- Cybersecurity --- Computer programs --- Troubleshooting in computer science --- Debugging --- Protection of computer systems --- Protection
Choose an application
Computer networks --- Internet (Computer networks) --- Security measures --- -681.3 *C2 --- 681.3*C20 --- 681.3*D46 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer communication networks: data communications OSI security and protection --- Computerwetenschap--?*C20 --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications OSI security and protection --- Firewalls (Computer security) --- Firewalls --- Beveiliging (ICT) --- Internettechnologie --- -005.8 --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Firewalls (Computer security). --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Coupe-feu (Sécurité informatique) --- 005.8 --- #TELE:SYST --- 681.3 *C2 --- Computer architecture. Operating systems --- 6813*C20 --- Internet --- Internet (Computer network) --- COMPUTER NETWORKS --- INTERNET --- Monograph --- Computer networks. --- Security systems. --- Internet. --- DARPA Internet --- Wide area networks (Computer networks) --- World Wide Web --- Burglary protection --- Computer networks - Security measures
Listing 1 - 5 of 5 |
Sort by
|