Narrow your search

Library

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

VIVES (4)

VUB (4)

AP (3)

KBC (3)

KDG (3)

More...

Resource type

book (8)

digital (3)


Language

English (10)


Year
From To Submit

2023 (3)

2021 (2)

2010 (1)

2006 (2)

2005 (1)

More...
Listing 1 - 10 of 10
Sort by

Book
Eight annual scientific conference on web technology, new media, communications and telematics theory, methods, tools and applications
Authors: ---
Year: 2003 Publisher: Ghent : Eurosis,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Secure edge computing : applications, techniques and challenges.
Authors: ---
ISBN: 1003028632 1000427315 1003028632 1000427323 Year: 2021 Publisher: [S.l.] : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.


Multi
Cybersecurity Teaching in Higher Education
Authors: ---
ISBN: 9783031242168 9783031242151 9783031242175 9783031242182 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education. In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other disciplines. For example, step-by-step guides may not work for some of the students if the configuration of a computing environment is not identical or similar enough to the one the workshop material is based on, which can be a huge problem for blended and online delivery modes. Using nested virtualization in a cloud infrastructure might not be authentic for all kinds of exercises, because some of its characteristics can be vastly different from an enterprise network environment that would be the most important to demonstrate to students. The availability of cybersecurity datasets for training and educational purposes can be limited, and the publicly available datasets might not suit a large share of training materials, because they are often excessively documented, but not only by authoritative websites, which render these inappropriate for assignments and can be misleading for online students following training workshops and looking for online resources about datasets such as the Boss of the SOC (BOTS) datasets. The constant changes of Kali Linux make it necessary to regularly update training materials, because commands might not run the same way they did a couple of months ago. The many challenges of cybersecurity education are further complicated by the continuous evolution of networking and cloud computing, hardware and software, which shapes student expectations: what is acceptable and respected today might be obsolete or even laughable tomorrow.


Digital
Cybersecurity for Smart Cities : Practices and Challenges
Authors: ---
ISBN: 9783031249464 9783031249457 9783031249471 9783031249488 Year: 2023 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.


Book
E-mail Security
Authors: ---
ISBN: 128300643X 9786613006431 1849280975 9781849280976 1849280967 9781849280969 1849280967 9781849280969 9781283006439 Year: 2010 Publisher: Ely IT Governance Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.


Book
Secure edge computing : applications, techniques and challenges
Authors: ---
ISBN: 9781003028635 9780367464141 9781032056326 Year: 2021 Publisher: Boca Raton CRC Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.


Book
Cybersecurity for Smart Cities
Authors: --- ---
ISBN: 9783031249464 Year: 2023 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.


Digital
Security Management, Integrity, and Internal Control in Information Systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Authors: --- --- ---
ISBN: 9780387311678 Year: 2006 Publisher: Boston, MA International Federation for Information Processing

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security Management, Integrity, and Internal Control in Information Systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Authors: --- --- --- ---
ISBN: 9780387311678 Year: 2006 Publisher: Boston MA Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Security Management, Integrity, and Internal Control in Information Systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Authors: ---
ISBN: 0387298266 9786610609413 1280609419 038731167X Year: 2005 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Information technology --- IT (Information technology) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Management --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer system failures. --- Data encryption (Computer science). --- Computers. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Science, general. --- System Performance and Evaluation. --- Models and Principles. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Informatics --- Science --- Communication systems --- Failures --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Data protection --- Security systems --- Hacking --- Computer system performance. --- Information Systems. --- Cryptology. --- Cryptography. --- Electronic data processing --- Models of Computation. --- IT Operations. --- Evaluation. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)

Listing 1 - 10 of 10
Sort by