Narrow your search

Library

VIVES (173)

Odisee (171)

Thomas More Kempen (171)

Thomas More Mechelen (171)

UCLL (171)

KU Leuven (161)

ULiège (145)

ULB (133)

UGent (71)

LUCA School of Arts (48)

More...

Resource type

book (173)

digital (5)


Language

English (173)


Year
From To Submit

2023 (41)

2022 (4)

2021 (2)

2019 (1)

2018 (1)

More...
Listing 1 - 10 of 173 << page
of 18
>>
Sort by
Multicast and group security
Authors: ---
ISBN: 158053659X 9781580536592 1580533426 9781580533423 Year: 2003 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.

Security sage's guide to hardening the network infrastructure
Author:
ISBN: 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 9786611052621 Year: 2004 Publisher: Rockland, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u


Book
Personnel protection
Authors: ---
ISBN: 1299631274 9781299631274 9780124169883 0124169880 9780124170032 012417003X Year: 2013 Publisher: Oxford Waltham, MA Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series


Book
Proceedings of the 3rd European Conference on Computer Network Defense
Authors: ---
ISBN: 0387855548 9786613251305 0387855556 1283251302 Year: 2009 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.


Book
Once more unto the Breach : Managing information security in an uncertain world
Author:
ISBN: 1849287104 Year: 2015 Publisher: Ely : IT Governance Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.


Book
Document Security
Author:
ISBN: 0398085358 9780398085353 Year: 2007 Publisher: Springfield Charles C Thomas Publisher, LTD

Loading...
Export citation

Choose an application

Bookmark

Abstract

This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in

Network security
Author:
ISBN: 1136377077 1136377085 1281024295 9786611024291 0080512542 9780080512549 9781136377082 9781136377037 1136377034 9781136377075 9781138435261 1138435260 9780750650335 0750650338 0750650338 Year: 2003 Publisher: Oxford Butterworth-Heinemann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the diff


Book
Cybersecurity and human rights in the age of cyberveillance.
Authors: ---
ISBN: 9781442260412 1442260416 Year: 2016 Publisher: Lanham Rowman & Littlefield

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights. By considering the latest political events and case law, including the NSA PRISM surveillance program controversy, the planned EU data protection amendments, and the latest European Court of Human Rights jurisprudence, it provides an analysis of the ongoing legal discourse on global cyberveillance. Using examples from contemporary state practice, including content filtering and Internet shutdowns during the Arab Spring as well as the PRISM controversy, the authors identify limits of state and third party interference with individual human rights of Internet users. Analysis is based on existing human rights standards, as enshrined within international law including the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights, European Convention on Human Rights and recommendations from the Human Rights Council. The definition of human rights, perceived as freedoms and liberties guaranteed to every human being by international legal consensus will be presented based on the rich body on international law. The book is designed to serve as a reference source for early 21st century information policies and on the future of Internet governance and will be useful to scholars in the information studies fields, including computer, information and library science. It is also aimed at scholars in the fields of international law, international relations, diplomacy studies and political science


Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica RAND Corp.

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

Policy-based network management
Author:
ISBN: 1558608591 9786611007225 1281007226 008049210X 9780080492100 9781558608597 Year: 2004 Publisher: Amsterdam Boston Morgan Kaufmann Publishers

Loading...
Export citation

Choose an application

Bookmark

Abstract

Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities. Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes i

Listing 1 - 10 of 173 << page
of 18
>>
Sort by