Narrow your search

Library

Odisee (24)

Thomas More Kempen (24)

Thomas More Mechelen (24)

UCLL (24)

VIVES (24)

KU Leuven (22)

ULiège (20)

LUCA School of Arts (14)

ULB (13)

UGent (12)

More...

Resource type

book (27)


Language

English (26)

French (1)


Year
From To Submit

2015 (27)

Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
EuroSec 2015 : proceedings of the eighth European Workshop on System Security : April 21, 2015, Bordeaux, France
Author:
ISBN: 1450334792 Year: 2015 Publisher: New York, New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
La gestion du risque de sécurité numérique pour la prospérité économique et sociale : Recommandation de l'OCDE et document d'accompagnement
Author:
ISBN: 9264246088 9264246096 Year: 2015 Publisher: Paris : OECD Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Les menaces de sécurité numérique potentiellement lourdes de conséquences économiques sont récemment devenues plus nombreuses et sophistiquées, alors même que l’environnement numérique est devenu un maillon essentiel du fonctionnement de l’économie et un facteur important de croissance, de bien-être et d’inclusivité. Pour profiter pleinement des avantages liés à l’environnement numérique, les parties prenantes doivent absolument cesser d’aborder le risque de sécurité numérique sous un angle technique dissocié de considérations économiques et sociales plus larges. Il leur faut d’urgence intégrer la gestion de ce risque à leurs processus décisionnels en matière économique et sociale. Les responsables de l’action publique doivent également mesurer toute la complexité du risque de sécurité numérique dans ses multiples dimensions, de la prospérité économique et sociale aux activités de police (lutte contre la « cybercriminalité ») en passant par la défense, la sécurité nationale et la sécurité internationale. Cette Recommandation de l'OCDE et son document d'accompagnement offrent des orientations sur ces aspects.   


Book
Security technology convergence insights
Author:
ISBN: 0128028424 0128030011 Year: 2015 Publisher: Amsterdam, Netherlands : Elsevier : Security Executive Council,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Managing online risk : apps, mobile, and social media security
Authors: ---
ISBN: 0124200605 0124200559 1322158479 9780124200609 9780124200555 Year: 2015 Publisher: Amsterdam Butterworth-Heinemann

Loading...
Export citation

Choose an application

Bookmark

Abstract

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and stora


Book
Packet analysis with Wireshark
Author:
ISBN: 9781785885846 1785885847 1785887815 9781785887819 9781785887819 Year: 2015 Publisher: Birmingham, UK

Loading...
Export citation

Choose an application

Bookmark

Abstract

Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases Identify and overcome security flaws in your network to get a deeper insight into security analysis This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises Who This Book Is For If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking. What You Will Learn Utilize Wireshark's advanced features to analyze packet captures Locate the vulnerabilities in an application server Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark Capture network packets with tcpdump and snoop with examples Find out about security aspects such as OS-level ARP scanning Set up 802.11 WLAN captures and discover more about the WAN protocol Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams In Detail Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging. The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks. Style and approach This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios u...


Book
How to defeat advanced malware
Author:
ISBN: 0128027312 0128027533 1322480826 9780128027530 9780128027318 Year: 2015 Publisher: Waltham, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed fo


Book
PCI compliance : understand and implement effective PCI data security standard compliance
Authors: --- ---
ISBN: 0128016515 0128015799 1322286876 9780128016510 9780128015797 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi


Book
Learning iOS security
Authors: ---
ISBN: 9781783553952 1783553952 9781783551743 1783551747 Year: 2015 Publisher: Birmingham, UK

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.


Book
Python passive network mapping
Author:
ISBN: 0128027428 0128027215 9780128027424 9780128027219 9780128027219 Year: 2015 Publisher: Waltham, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important


Book
Computational network science
Author:
ISBN: 0128011564 0128008911 1322158517 9780128011560 9780128008911 9780128008911 Year: 2015 Publisher: Waltham, Massachusetts

Loading...
Export citation

Choose an application

Bookmark

Abstract

The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatible datasets, which has kept it from being a truly universal disciplin

Listing 1 - 10 of 27 << page
of 3
>>
Sort by