Narrow your search

Library

KU Leuven (149)

UCLL (133)

VIVES (133)

Odisee (132)

Thomas More Kempen (132)

Thomas More Mechelen (132)

ULiège (119)

ULB (109)

KBC (91)

UGent (20)

More...

Resource type

book (156)

dissertation (1)

periodical (1)


Language

English (155)

French (2)


Year
From To Submit

2021 (157)

Listing 1 - 10 of 157 << page
of 16
>>
Sort by

Book
Encyclopedia of Security and Emergency Management
Authors: ---
ISBN: 3319704885 Year: 2021 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Encyclopedia is a comprehensive reference work covering the interdisciplinary facets of security. The topics range from security threats (for example: cybercrime, terrorism, shoplifting and fraud), to applications on the job, to coordination between public and private sectors in handling security and emergency situations nationally and internationally. Special attention is given to security concepts, methods, functions, theories, organizations, and technology. It will also cover the history and current state of the discipline. As a resource, contributions cover best practices in security, weaknesses in current techniques, risk assessment and vulnerability in a range of businesses and critical infrastructure sectors (including heathcare, finance, energy, natural resources, government facilities, communications, and IT), and mechanisms for managing natural and human-made disasters. As an interdisciplinary tool, it will provide practical, authoritative information both for those involved in crime and security studies, as well as those from related disciplines who increasingly need to consider security as part of their work, such as police studies, counterterrorism, urban planning, public policy, and information technology. .


Book
We see it all : liberty and justice in the age of perpetual surveillance
Author:
ISBN: 1925938891 Year: 2021 Publisher: Melbourne, Australia ; London : Scribe,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security & crime : converging perspectives on a complex world
Author:
ISBN: 9781412931014 9781412931007 1412931010 Year: 2021 Publisher: London: Sage,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security and Crime is an authoritative and multidisciplinary analysis of the relationship between security and crime, addressing much of the confusion about its nature and meaning, clarifying its relevance to criminological analysis, and giving due attention to the interdisciplinary nature of the topic. Providing a historical and prospective look at issues within security the book will: trace the development of 'security' across disciplines situate this contested concept within criminological discourse and concerns explore the rising attention in politics and academic scholarship to 'security' issues as they relate to crime examine the nature and organisation of interventions to deliver security establish clearly the relationship between security, crime and criminology. International in scope, and broad in coverage, Security and Crime sets out the need to broaden the study of security in a clear, concise style that is easy for students to digest. With comprehensive pedagogical feature including chapter overviews, key terms, study questions, further reading and a glossary, this book is essential for students studying security in criminology, criminal justice, international relations, and related disciplines.


Book
A complete guide to Burp Suite : learn to detect application vulnerabilities
Author:
ISBN: 1484264029 1484264010 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an in-depth tour of its various components such as intruder, repeater, decoder, comparer, and sequencer. It also takes you through other useful features such as infiltrator, collaborator, scanner, and extender. And it teaches you how to use Burp Suite for API and mobile app security testing. You will: Understand various components of Burp Suite Configure the tool for the most efficient use Exploit real-world web vulnerabilities using Burp Suite Extend the tool with useful add-ons.


Book
Authentication and access control : practical cryptography methods and tools
Author:
ISBN: 148426570X 1484265696 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available to protect computer networks, systems, applications, and general digital technologies. Different methods of authentication are covered, including the most commonly used schemes in password protection: two-factor authentication and multi-factor authentication. You will learn how to securely store passwords to reduce the risk of compromise. Biometric authentication—a mechanism that has gained popularity over recent years—is covered, including its strengths and weaknesses. Authentication and Access Control explains the types of errors that lead to vulnerabilities in authentication mechanisms. To avoid these mistakes, the book explains the essential principles for designing and implementing authentication schemes you can use in real-world situations. Current and future trends in authentication technologies are reviewed. You will: Understand the basic principles of cryptography before digging into the details of authentication mechanisms Be familiar with the theories behind password generation and the different types of passwords, including graphical and grid-based passwords Be aware of the problems associated with the use of biometrics, especially with establishing a suitable level of biometric matching or the biometric threshold value Study examples of multi-factor authentication protocols and be clear on the principles Know how to establish authentication and how key establishment processes work together despite their differences Be well versed on the current standards for interoperability and compatibility Consider future authentication technologies to solve today's problems.


Book
Big breaches : cybersecurity lessons for everyone
Authors: ---
ISBN: 1484266552 1484266544 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more.


Book
Zero trust security : an enterprise guide
Authors: ---
ISBN: 1484267028 148426701X Year: 2021 Publisher: [Place of publication not identified] : Apress,


Book
Security in IoT social networks
Authors: ---
ISBN: 0128216034 0128215992 9780128216033 9780128215999 Year: 2021 Publisher: London, England : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.


Book
Information security and cryptology : 16th international conference, inscrypt 2020, guangzhou, china, december 11-14, 2020, revised selected papers
Authors: ---
ISBN: 3030718522 3030718514 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.


Book
Protective security : creating military-grade defenses for your digital business
Author:
ISBN: 148426908X 1484269071 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Listing 1 - 10 of 157 << page
of 16
>>
Sort by