Narrow your search

Library

ULB (15)

KU Leuven (14)

ULiège (13)

Odisee (12)

Thomas More Kempen (12)

Thomas More Mechelen (12)

UCLL (12)

VIVES (12)

UGent (4)

VUB (3)

More...

Resource type

book (15)


Language

English (15)


Year
From To Submit

2022 (2)

2021 (1)

2015 (4)

2013 (1)

2012 (2)

More...
Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Book
United States' defend forward cyber strategy: a comprehensive legal assessment
Author:
ISBN: 019760112X 0197601812 0197601820 9780197601792 9780197601129 9780197601815 9780197601808 0197601790 0197601804 Year: 2022 Publisher: Oxford University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the 2010s, America's adversaries conducted numerous damaging cyber operations inside the United States: the Office of Personnel Management breach, attacks on banks, persistent intellectual property theft by China, and the Russian intervention in the 2016 election. The US--possessor of the world's most powerful cyber arsenal--responded in 2018 by unveiling a new Defend Forward strategy. It is a large step in the direction of more aggressive action in cyberspace--albeit for defensive ends. The US has not attempted to hide this shift. To the contrary, it has telegraphed the change. But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defend Forward entails. While the US government has asserted that Defend Forward is consistent with domestic and international law, it has not explained how the new strategy overcomes the perceived legal constraints that previously tempered US responses to cyber intrusions andthreats. This volume, edited by Jack Goldsmith and featuring a cast of leading scholars in the field, provides an authoritative overview of the origins and operation of Defend Forward, and a comprehensive assessment of its legality. For anyone interested in the future of great power conflict and the cyber strategies that the US is deploying against its adversaries, The United States' Defend Forward Cyber Strategy is an essential read.


Book
The art of site reliability engineering (SRE) with Azure : building and deploying applications that endure
Author:
ISBN: 1484287037 1484287045 Year: 2022 Publisher: Berkeley, California : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Gain a foundational understanding of SRE and learn its basic concepts and architectural best practices for deploying Azure IaaS, PaaS, and microservices-based resilient architectures. The book starts with the base concepts of SRE operations and developer needs, followed by definitions and acronyms of Service Level Agreements in real-world scenarios. Moving forward, you will learn how to build resilient IaaS solutions, PaaS solutions, and microservices architecture in Azure. Here you will go through Azure reference architecture for high-available storage, networking and virtual machine computing, describing Availability Sets and Zones and Scale Sets as main scenarios. You will explore similar reference architectures for Platform Services such as App Services with Web Apps, and work with data solutions like Azure SQL and Azure Cosmos DB. Next, you will learn automation to enable SRE with Azure DevOps Pipelines and GitHub Actions. You'll also gain an understanding of how an open culture around post-mortems dramatically helps in optimizing SRE and the overall company culture around managing and running IT systems and application workloads. You'll be exposed to incent management and monitoring practices, by making use of Azure Monitor/Log Analytics/Grafana, which forms the foundation of monitoring Azure and Hybrid-running workloads. As an extra, the book covers two new testing solutions: Azure Chaos Studio and Azure Load Testing. These solutions will make it easier to test the resilience of your services. After reading this book, you will understand the underlying concepts of SRE and its implementation using Azure public cloud.


Book
Grid and Services Evolution
Authors: --- --- ---
ISBN: 0387859659 1441946780 9786612037870 1282037870 0387859667 Year: 2009 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain , June 5-6, 2008. Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments. Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science. .


Book
Propagation of Interval and Probabilistic Uncertainty in Cyberinfrastructure-related Data Processing and Data Fusion
Authors: ---
ISBN: 9783319126289 331912627X 9783319126272 3319126288 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

On various examples ranging from geosciences to environmental sciences, this book explains how to generate an adequate description of uncertainty, how to justify semiheuristic algorithms for processing uncertainty, and how to make these algorithms more computationally efficient. It explains in what sense the existing approach to uncertainty as a combination of random and systematic components is only an approximation, presents a more adequate three-component model with an additional periodic error component, and explains how uncertainty propagation techniques can be extended to this model. The book provides a justification for a practically efficient heuristic technique (based on fuzzy decision-making). It explains how the computational complexity of uncertainty processing can be reduced. The book also shows how to take into account that in real life, the information about uncertainty is often only partially known, and, on several practical examples, explains how to extract the missing information about uncertainty from the available data.


Book
e-Infrastructure and e-Services for Developing Countries : 4th International ICST Conference, AFRICOMM 2012, Yaounde, Cameroon, November 12-14, 2012, Revised Selected Papers
Authors: --- ---
ISBN: 3642411770 3642411789 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer networks --- Information technology --- Cyberinfrastructure --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Computer systems --- Distributed databases --- High performance computing --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Informatics --- Science --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization


Book
Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
Authors: --- ---
ISBN: 083309338X 0833089005 9780833093387 9780833089007 Year: 2015 Publisher: [Place of publication not identified] : Rand Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher.

Keywords

Computer networks --- Cyberinfrastructure --- Cyberspace --- Risk assessment --- Cyberterrorism --- National security --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Evaluation --- Prevention --- Computer security --- National security policy --- NSP (National security policy) --- Security policy, National --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Analysis, Risk --- Assessment, Risk --- Risk analysis --- Risk evaluation --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Government policy --- Economic policy --- International relations --- Military policy --- Computer crimes --- Terrorism --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Electronic terrorism (Cyberterrorism) --- United States. --- Rules and practice. --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force)


Book
Quantitative Security Risk Assessment of Enterprise Networks
Authors: ---
ISBN: 1461418593 1461418607 Year: 2011 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as “are we more secure than yesterday” or “how does the security of one network configuration compare with another one”. In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Keywords

Computer networks --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures. --- Risk assessment --- Methodology. --- Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Performance and Reliability. --- System Performance and Evaluation. --- Reusability. --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Computer security --- Distributed processing --- Operating systems (Computers). --- Computer system performance. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures --- Computer software—Reusability. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures


Book
Inaugural Section Special Issue : Key Topics and Future Perspectives in Natural Hazards Research
Author:
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book collects selected high-quality papers published in 2018–2020 to inaugurate the “Natural Hazards” Section of the Geosciences journal. The topics encompass: trends in publications at international level in the field of natural hazards research; the role of Big Data in natural disaster management; assessment of seismic risk through the understanding and quantification of its different components; climatic/hydro-meteorological hazards; and finally, the scientific analysis and disaster forensics of recent natural hazard events. The target audience includes not only specialists, but also graduate students who wish to approach the challenging, but also fascinating


Book
Big data, little data, no data : scholarship in the networked world
Author:
ISBN: 9780262028561 9780262327862 0262327864 0262529912 9780262529914 0262028565 9780262327879 0262327872 Year: 2015 Publisher: Cambridge, Massachusetts : The MIT Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

An examination of the uses of data within a changing knowledge infrastructure, offering analysis and case studies from the sciences, social sciences, and humanities. "'Big Data' is on the covers of Science, Nature, the Economist, and Wired magazines, on the front pages of the Wall Street Journal and the New York Times. But despite the media hyperbole, as Christine Borgman points out in this examination of data and scholarly research, having the right data is usually better than having more data; little data can be just as valuable as big data. In many cases, there are no data -- because relevant data don't exist, cannot be found, or are not available. Moreover, data sharing is difficult, incentives to do so are minimal, and data practices vary widely across disciplines. Borgman, an often-cited authority on scholarly communication, argues that data have no value or meaning in isolation; they exist within a knowledge infrastructure -- an ecology of people, practices, technologies, institutions, material objects, and relationships. After laying out the premises of her investigation -- six "provocations" meant to inspire discussion about the uses of data in scholarship -- Borgman offers case studies of data practices in the sciences, the social sciences, and the humanities, and then considers the implications of her findings for scholarly practice and research policy. To manage and exploit data over the long term, Borgman argues, requires massive investment in knowledge infrastructures; at stake is the future of scholarship."

Keywords

Information retrieval --- Information systems --- Communication in learning and scholarship --- Research --- Information technology. --- Information storage and retrieval systems. --- Cyberinfrastructure --- Communication savante --- Recherche --- Technologie de l'information --- Systèmes d'information --- Technological innovations. --- Methodology. --- Data processing. --- Innovations --- Méthodologie --- Informatique --- Cyberinfrastructure. --- Information technology --- Information storage and retrieval systems --- Technological innovations --- Methodology --- Data processing --- Systèmes d'information --- Méthodologie --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Electronic data processing in research --- Communication in scholarship --- Scholarly communication --- Learning and scholarship --- Distributed processing --- Store datamengder --- Informasjonsteknologi --- Datautvinning --- Forskningsmetoder --- Cyberspace --- INFORMATION SCIENCE/Technology & Policy --- INFORMATION SCIENCE/Internet Studies --- INFORMATION SCIENCE/General --- Data centers --- Communication in learning and scholarship - Technological innovations --- Research - Methodology --- Research - Data processing


Book
Critical Infrastructure Protection III : Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
Authors: --- --- ---
ISBN: 3642047971 364204798X Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Information networks -- Security measures -- Congresses. --- Computer networks --- Computer security --- Information networks --- Cyberinfrastructure --- Computer Science --- Telecommunications --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Computer science. --- Computer programming. --- Data structures (Computer science). --- Coding theory. --- User interfaces (Computer systems). --- Management information systems. --- Computer Science. --- Programming Techniques. --- Coding and Information Theory. --- User Interfaces and Human Computer Interaction. --- Data Structures, Cryptology and Information Theory. --- Management of Computing and Information Systems. --- Computer Science, general. --- Data structures (Computer scienc. --- Information Systems. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Informatics --- Science --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems --- Programming --- Cyber-based information systems --- Cyber-infrastructure --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Automated information networks --- Networks, Information --- Information services --- Information storage and retrieval systems --- Distributed processing --- Human-computer interaction. --- IT Operations. --- Management. --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems)

Listing 1 - 10 of 15 << page
of 2
>>
Sort by