Narrow your search

Library

KU Leuven (10)

UGent (5)

VDIC (5)

ULiège (4)

AP (3)

KDG (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

More...

Resource type

book (17)

digital (3)


Language

English (18)

Undetermined (1)


Year
From To Submit

2019 (1)

2017 (2)

2016 (1)

2015 (2)

2010 (4)

More...
Listing 1 - 10 of 19 << page
of 2
>>
Sort by
Computer security: art and science
Author:
ISBN: 9780201440997 0201440997 Year: 2003 Publisher: Boston Addison-Wesley

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: --- ---
ISBN: 9783319185002 3319184997 9783319184999 3319185004 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Educational Technology. --- Teaching and Teacher Education. --- Computer science. --- Data protection. --- Information Systems. --- Education. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Education --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Educational technology. --- Teaching. --- Didactics --- Instruction --- Pedagogy --- School teaching --- Schoolteaching --- Instructional systems --- Pedagogical content knowledge --- Training --- Instructional technology --- Technology in education --- Technology --- Educational innovations --- Teaching --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Aids and devices --- Communication systems --- Protection --- Security measures --- Distributed processing --- Computers and Education. --- Children --- Education, Primitive --- Education of children --- Human resource development --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Computer security --- Study and teaching --- Education—Data processing. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Teachers --- Data and Information Security. --- Computer and Information Systems Applications. --- IT Operations. --- Digital Education and Educational Technology. --- Data processing. --- Management. --- Training of. --- Teacher education --- Teacher training --- Teachers, Training of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education


Book
Information Security : 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings
Authors: ---
ISBN: 3319458701 331945871X Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals. .


Digital
Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: --- ---
ISBN: 9783319185002 9783319185019 9783319184999 9783319370033 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.


Book
Applying the take-grant protection model
Authors: --- ---
Year: 1988 Publisher: Hanover, NH : [Washington, D.C.]: Department of Mathematics and Computer Science, Dartmouth College ; [National Aeronautics and Space Administration],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
The sharing of rights and information in a capability-based protection system
Authors: --- ---
Year: 1988 Publisher: Hanover, NH : [Washington, D.C.]: Department of Mathematics and Computer Science, Dartmouth College ; [National Aeronautics and Space Administration],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
A model of security monitoring
Authors: --- ---
Year: 1989 Publisher: Hanover, NH : [Washington, D.C.]: Department of Mathematics and Computer Science, Dartmouth College ; [National Aeronautics and Space Administration],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Access control and privacy in large distributed systems
Authors: --- ---
Year: 1986 Publisher: Moffett Field, CA : The Research Institute for Advanced Computer Science, NASA Ames Research Center,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Theft of information in the take-grant protection model
Authors: --- ---
Year: 1988 Publisher: Hanover, NH : [Washington, D.C.]: Department of Mathematics and Computer Science, Dartmouth College ; [National Aeronautics and Space Administration],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Computer security : art and science
Authors: --- ---
ISBN: 9780321712332 Year: 2019 Publisher: Boston : Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 19 << page
of 2
>>
Sort by