Narrow your search

Library

UCLouvain (6)

ULB (4)

KU Leuven (3)

ULiège (2)

UNamur (2)

KBR (1)

UGent (1)

UHasselt (1)


Resource type

book (7)


Language

English (6)

French (1)


Year
From To Submit

2001 (7)

Listing 1 - 7 of 7
Sort by
Secrets et mensonges : sécurité numérique dans un monde en réseau
Author:
ISBN: 2711786846 9782711786848 Year: 2001 Publisher: Paris : Vuibert Informatique,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bienvenu dans un univers numérique où l'information est immédiatement disponible et les acteurs irrémédiablement connectés. Notre monde est de plus en plus, sinon totalement, dépendant des télécommunications. L'Internet explose, l'usage du courrier électronique se banalise, la téléphonie mobile séduit le plus grand nombre. Mais cette passion dévorante pour la technique a un prix : vivre dans un environnement de plus en plus exposé aux menaces de sécurité. Ainsi, les entreprises du monde entier doivent prendre la mesure des risques liés au commerce électronique ; les individus la mesure de leur vulnérabilité aux atteintes à leur vie privée. Bruce Schneier, expert renommé en sécurité informatique, explique dans cet ouvrage ce que les entreprises et les personnes doivent absolument savoir, de manière à survivre ou rester libres à l'heure d'Internet. Car " Si vous pensez que la technologie peut résoudre vos problèmes de sécurité, alors vous n'avez rien compris ni aux problèmes ni à la technologie ". Il n'existe pas de panacée en matière de sécurité informatique, Les failles au sein des systèmes, les attaques et pirateries s'accroissant, il devient vital de bien gérer cet état de fait et de protéger ses données. Comprendre qui sont les agresseurs, ce qu'ils veulent, comment contrer les dangers qu'ils représentent, connaître les technologies de sécurité, leurs possibilités mais aussi leurs limitations, assurer une veille technologique, définir une gestion des risques, mettre en œuvre une politique de sécurité, voilà entre autres les thèmes abordés par cet ouvrage informé, pragmatique et plein d'humour.

Network intrusion detection : an analyst's handbook
Authors: --- ---
ISBN: 0735710082 9780735710085 Year: 2001 Publisher: Indianapolis, Ind.: New Riders,

Computer intrusion detection and network monitoring: a statistical veiwpoint
Author:
ISBN: 0387952810 1441929371 1475734581 9780387952819 Year: 2001 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.

Keywords

Mathematical statistics --- Computer security --- Computer networks --- Statistical methods. --- Security measures --- Statistical methods --- Monitoring --- Statistics . --- Probabilities. --- Data encryption (Computer science). --- Computer communication systems. --- Information storage and retrieval. --- Pattern recognition. --- Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences. --- Probability Theory and Stochastic Processes. --- Cryptology. --- Computer Communication Networks. --- Information Storage and Retrieval. --- Pattern Recognition. --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Probability --- Statistical inference --- Combinations --- Mathematics --- Chance --- Least squares --- Risk --- Statistical analysis --- Statistical data --- Statistical science --- Econometrics --- Distributed processing --- Computer security - Statistical methods --- Computer networks - Security measures - Statistical methods --- Computer networks - Monitoring

Foundations of Security Analysis and Design : Tutorial Lectures
Authors: ---
ISSN: 03029743 ISBN: 3540428968 3540456082 9783540428961 Year: 2001 Volume: 2171 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses --- Security measures --- Congresses. --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Security measures. --- Sécurité informatique --- Réseaux d'ordinateurs --- Congrès --- Sécurité --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Programming languages (Electronic computers). --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Computer Communication Networks. --- Computers and Society. --- Programming Languages, Compilers, Interpreters. --- Data protection --- Security systems --- Hacking --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Distributed processing --- Operating systems --- Cryptology. --- Computer networks - Security measures

E-Commerce Agents : Marketplace Solutions, Security Issues, and Supply and Demand
Authors: ---
ISBN: 3540419349 3540453709 9783540419341 Year: 2001 Volume: 2033 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Among the many changes brought by the Internet is the emergence of electronic commerce over the Web. E-commerce activities, such as the online exchange of information, services, and products, are opening up completely new opportunities for business, at new levels of productivity and profitability. In parallel with the emergence of e-commerce, intelligent software agents as entities capable of independent action in open, unpredictable environments have matured into a promising new technology. Quite naturally, e-commerce agents hold great promise for exploiting the Internet's full potential as an electronic marketplace. The 20 coherently written chapters in this book by leading researchers and professionals present the state of the art in agent-mediated e-commerce. Researchers, professionals, and advanced students interested in e-commerce or agent technology will find this book an indispensable source of information and reference.

Keywords

Electronic commerce --- Business enterprises --- Security measures --- Computer networks --- Marketing & Sales --- Commerce --- Business & Economics --- Security measures. --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Information storage and retrieval. --- Artificial intelligence. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Computer Communication Networks. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- IT in Business. --- Data processing. --- Information storage and retrieva. --- Information Systems. --- Artificial Intelligence. --- Information storage and retrieval systems. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Business—Data processing. --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing --- Electronic commerce - Security measures --- Business enterprises - Computer networks - Security measures

Listing 1 - 7 of 7
Sort by