Narrow your search
Listing 1 - 5 of 5
Sort by

Book
Projecten begrijpen en organiseren : de weg naar een geslaagd project
Authors: ---
ISBN: 9789038226606 Year: 2017 Publisher: Zaltbommel Van Haren Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Projectmanagement wordt vaak in één woord genoemd met 'grote projecten' en ICT-projecten. Maar ons leven zit vol allerlei kleine en grote projecten, gaande van de verbouwing van je huis, over een huwelijksfeest tot de projecten waarmee je op je werk te maken krijgt. We realiseren ons vaak niet dat ook deze projecten een plan van aanpak verdienen, en gooien er ons enthousiast - maar vaak onwetend - in. An Gaublomme en Rudi Madalijns bieden een kader aan iedereen die een dergelijk project met meer kennis van zaken (en meer kans op succes!) wil aanpakken. Met praktijkgerichte voorbeelden en tips overlopen ze alle schakels in de cyclus van zowel grote als kleine projecten. Bovendien bekijken ze het project niet alleen vanuit het oogpunt van de projectleider, maar bieden ze een houvast aan alle deelnemers van het project.

Introduction to modern cryptography
Authors: ---
ISBN: 9781584885511 1584885513 Year: 2008 Publisher: Boca Raton: Chapman & Hall/CRC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs. The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications. Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.


Book
Practical malware analysis : the hands-on guide to dissecting malicious software
Authors: ---
ISBN: 9781593272906 1593272901 1593274300 9781593274306 Year: 2012 Publisher: San Francisco : No Starch Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author

Firewalls and internet security : repelling the wily hacker.
Authors: ---
ISBN: 0201633574 9780201633573 Year: 1994 Publisher: Reading (Mass.) : Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer networks --- Internet (Computer networks) --- Security measures --- -681.3 *C2 --- 681.3*C20 --- 681.3*D46 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer communication networks: data communications OSI security and protection --- Computerwetenschap--?*C20 --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications OSI security and protection --- Firewalls (Computer security) --- Firewalls --- Beveiliging (ICT) --- Internettechnologie --- -005.8 --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Firewalls (Computer security). --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Coupe-feu (Sécurité informatique) --- 005.8 --- #TELE:SYST --- 681.3 *C2 --- Computer architecture. Operating systems --- 6813*C20 --- Internet --- Internet (Computer network) --- COMPUTER NETWORKS --- INTERNET --- Monograph --- Computer networks. --- Security systems. --- Internet. --- DARPA Internet --- Wide area networks (Computer networks) --- World Wide Web --- Burglary protection --- Computer networks - Security measures

Listing 1 - 5 of 5
Sort by