Narrow your search

Library

KU Leuven (28)

Odisee (28)

Thomas More Kempen (28)

Thomas More Mechelen (28)

ULB (28)

ULiège (28)

VIVES (28)

UCLL (25)

KBC (16)

UGent (6)

More...

Resource type

book (28)

digital (2)


Language

English (28)


Year
From To Submit

2025 (2)

2024 (3)

2023 (3)

2022 (4)

2021 (1)

More...
Listing 1 - 10 of 28 << page
of 3
>>
Sort by

Book
Information systems security and privacy : 6th international conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers
Author:
ISBN: 3030949001 3030948994 Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer Insecurity : Risking the System
Author:
ISBN: 1852339438 1846282705 Year: 2005 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincingly illustrated that the problem is increasing in both scale and cost. Computer Insecurity: Risking the System approaches its topic from the perspective of vulnerability – how can your system be attacked? Covering technical issues and human factors, the comprehensively researched text makes reference to numerous real-life security incidents, which help to provide persuasive practical evidence of the problems and the impacts that result. Key issues covered include: • the problem of computer insecurity • the need to raise security awareness • common failings that compromise protection • the attack and exploitation of systems • considerations in responding to the threats Presented in clear and lucid terms, the discussion is invaluable reading for all business and computing professionals who wish for an overview of the issues rather than a shopping list of the security measures available. ‘In today’s connected world no-one can afford to ignore computer security, this book tells you why, and what you should do about it, in simple non-technical language.’ Dr Jeremy Ward, Director of Service Development, Symantec (UK) Ltd ‘Computer Insecurity contains loads of practical advice supported by an abundance of real world examples and research. If you don’t understand what all the fuss concerning computer security is about then this book was written for you.’Jeff Crume, CISSP Executive IT Security Architect, IBM and author of ‘Inside Internet Security – What hackers don’t want you to know’ ‘I have long been looking for a book that would give answers to why rather than how we cater for Information and Communication Systems Security ... I recommend it wholeheartedly to anyone that wishes to extend their knowledge’ Professor Sokratis K. Katsikas, University of the Aegean, Greece.


Book
Security and Privacy in Social Networks and Big Data : 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Authors: ---
ISBN: 9811507589 9811507570 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.

Keywords

Online social networks. --- Data encryption --- Big data --- Security measures --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Data sets, Large --- Large data sets --- Data sets --- Computer networks --- Computer communication systems. --- Data encryption (Computer science). --- Computer security. --- Application software. --- Mobile and Network Security. --- Computer Communication Networks. --- Cryptology. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Distributed processing


Book
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings
Authors: ---
ISBN: 3030574040 3030574032 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Keywords

Computer networks --- Security measures --- Application software. --- Computer security. --- Data encryption (Computer science). --- Computer communication systems. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Cryptology. --- Mobile and Network Security. --- Computer Communication Networks. --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Protection --- Distributed processing --- Data protection. --- Cryptography. --- Computer networks. --- Computer and Information Systems Applications. --- Data and Information Security. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Human aspects of information security and assurance : 15th IFIP WG 11.12 international symposium, HAISA 2021, virtual event, July 7-9, 2021 : proceedings
Authors: ---
ISBN: 3030811115 3030811107 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Human Aspects of Information Security and Assurance : 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings
Authors: ---
ISBN: 3031121716 3031121724 Year: 2022 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.

Keywords

Computer networks --- Computer security. --- Security measures --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Application software. --- Data protection. --- User interfaces (Computer systems). --- Human-computer interaction. --- Information technology --- Computer networks. --- Computer and Information Systems Applications. --- Data and Information Security. --- User Interfaces and Human Computer Interaction. --- Legal Aspects of Computing. --- Computer Communication Networks. --- Law and legislation. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Technology and law --- Cyberspace --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing --- Law and legislation --- Xarxes d'ordinadors --- Seguretat informatica --- Seguretat informàtica.


Book
Human Aspects of Information Security and Assurance : 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings
Authors: ---
ISBN: 3031385306 3031385292 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.


Multi
Human Aspects of Information Security and Assurance : 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings
Authors: ---
ISBN: 9783031385308 9783031385292 9783031385315 9783031385322 3031385306 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.


Book
Trust, Privacy, and Security in Digital Business : 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings
Authors: --- ---
ISBN: 3642403425 3642403433 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Database management. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Database Management. --- Artificial Intelligence (incl. Robotics). --- Electronic commerce --- Security measures --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching


Book
Trust, Privacy and Security in Digital Business : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings
Authors: --- ---
ISBN: 3319443402 3319443410 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust.

Keywords

Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Computer security --- Cryptography --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Data protection --- Security systems --- Hacking --- Communication systems --- Distributed processing --- Information Systems. --- Cryptology. --- Business enterprises --- Computer networks --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 10 of 28 << page
of 3
>>
Sort by