Narrow your search

Library

KU Leuven (13)

Odisee (12)

Thomas More Kempen (12)

Thomas More Mechelen (12)

UCLL (12)

VIVES (12)

ULB (10)

ULiège (9)

UGent (5)

LUCA School of Arts (3)

More...

Resource type

book (13)


Language

English (13)


Year
From To Submit

2008 (13)

Listing 1 - 10 of 13 << page
of 2
>>
Sort by
Infosecurity 2008 threat analysis
Authors: --- ---
ISBN: 1281273317 9786611273316 0080558690 1597492248 9781597492249 9780080558691 9781281273314 661127331X Year: 2008 Publisher: Burlington, Mass. : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DS

Digital watermarking and steganography
Author:
ISBN: 9780123725851 9780080555805 0080555802 0123725852 1281096164 9781281096166 9786611096168 6611096167 Year: 2008 Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition


Book
Managing catastrophic loss of sensitive data
Author:
ISBN: 1281308706 9786611308704 0080558712 1597492396 9781597492393 9780080558714 9781281308702 Year: 2008 Publisher: Burlington, MA : Syngress, Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.*Addresses a very topical subject of great concern to security, general IT and business management*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data.*Gathers in a single place all information


Book
Virtual shadows : your privacy in the information society
Authors: ---
ISBN: 1906124566 1906124094 1306283957 Year: 2008 Publisher: London : British Computer Society,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Social networking, government databases, online shopping and loyalty cards have all generated vast amounts of personal data. This book reveals the impact this is having on our privacy and security, and provides practical information on how we can safeguard our identity and protect our children in the information society.

Proceedings of the IFIP TC 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy
Authors: --- --- --- ---
ISBN: 038709699X 0387096981 Year: 2008 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Computer security --- Data protection --- Oncology  . --- Computer science. --- Computer Communication Networks. --- Computer security. --- Computers --- Information Systems. --- Oncology. --- Computer Science, general. --- Systems and Data Security. --- Legal Aspects of Computing. --- Management of Computing and Information Systems. --- Law and legislation. --- Cyberspace --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Tumors --- Law and legislation --- Protection --- Security measures --- Computer communication systems. --- Computers. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing --- Preleukemia --- Preleucemia --- Anemia --- Leucopenia --- Precancerous conditions --- Thrombocytopenia --- Leukemia --- Myelodysplastic syndromes --- Computer networks. --- Data protection. --- Information technology --- Computer Science. --- Data and Information Security. --- IT Operations. --- Management. --- Technology and law --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 proceedings
Authors: --- --- ---
ISSN: 18650929 ISBN: 1281512729 9786611512729 354069403X 3540694021 Year: 2008 Volume: 12 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held in London, UK, in June 2008. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cybercrime and digital forensics investigation, voice and video over internet protocols security, computer security, security architecture and authorisations, and IT governance.

Keywords

Computer networks. --- Computer science. --- Data encryption (Computer science) --- Data protection. --- Information Technology --- Computer Science (Hardware & Networks) --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Information Systems. --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems --- Electronic data interchange --- Computer networks --- Business data interchange, Electronic --- EDI (Electronic data interchange) --- Electronic business data interchange --- Business --- Electronic commerce --- Data processing


Book
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Authors: ---
ISBN: 3540794999 3540794980 Year: 2008 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007. The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.

Keywords

Computer security --- Cryptography --- Computer security. --- Data encryption (Computer science). --- Information Systems. --- Computer science. --- Computer Communication Networks. --- Computer software. --- Systems and Data Security. --- Cryptology. --- Management of Computing and Information Systems. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Computer systems --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Management information systems. --- Computers and civilization. --- Computer communication systems. --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems --- Data protection. --- Cryptography. --- Electronic data processing—Management. --- Computer networks. --- Data and Information Security. --- IT Operations. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data

Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings
Authors: --- --- --- ---
ISBN: 9783540689133 3540689133 3540689141 Year: 2008 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.

Keywords

Telecommunication --- Data encryption (Computer science) --- Cryptography --- Télécommunications --- Chiffrement (Informatique) --- Cryptographie --- Security measures --- Congresses. --- Sécurité --- Mesures --- Congrès --- Computer Science --- Telecommunications --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Communication --- Information theory --- Telecommuting --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Cryptography. --- Data protection. --- Electronic data processing—Management. --- Data and Information Security. --- Computer and Information Systems Applications. --- IT Operations. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers

Privacy, security, and trust in KDD : first ACM SIGKDD international workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007 : revised selected papers
Authors: --- ---
ISBN: 9783540784777 3540784772 3540784780 Year: 2008 Publisher: Berlin, Germany : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2007, held in San Jose, CA, USA, in August 2007 in conjunction with the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2007. The 8 revised full papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers address all prevailing topics concerning privacy, security, and trust aspects of data mining and knowledge discovery. Special focus is put on applied domains such as healthcare, ubiquitous computing, and location-based services.

Keywords

Data protection --- Internet --- Data mining --- Privacy, Right of --- Protection de l'information (Informatique) --- Exploration de données (Informatique) --- Droit à la vie privée --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer science. --- Computer communication systems. --- Computer security. --- Data mining. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Data Mining and Knowledge Discovery. --- Computer Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Informatics --- Science --- Cyberspace --- Protection --- Law and legislation --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing

Information security theory and practices, smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings
Authors: --- ---
ISBN: 9783540799658 3540799656 3540799664 Year: 2008 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.

Keywords

Data protection --- Computer systems --- Smart cards --- Mobile computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- ADP systems (Computer systems) --- Computing systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Systems, Computer --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication

Listing 1 - 10 of 13 << page
of 2
>>
Sort by