Narrow your search

Library

VIVES (30)

Odisee (29)

Thomas More Kempen (29)

Thomas More Mechelen (29)

KU Leuven (28)

ULiège (28)

UCLL (27)

VUB (27)

ULB (26)

AP (20)

More...

Resource type

book (59)

digital (20)


Language

English (70)


Year
From To Submit

2025 (2)

2024 (5)

2023 (4)

2022 (9)

2021 (6)

More...
Listing 1 - 10 of 70 << page
of 7
>>
Sort by
Cybercrime : vandalizing the information society
Author:
ISBN: 0201721597 Year: 2002 Publisher: Harlow : Pearson education,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Securing information and communications systems : principles, technologies, and applications
Author:
ISBN: 1596932295 9781596932296 1596932287 Year: 2008 Publisher: Boston ; London : Artech House,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.


Book
Information systems security and privacy : 6th international conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers
Author:
ISBN: 3030949001 3030948994 Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Computer Insecurity : Risking the System
Author:
ISBN: 9781846282706 Year: 2005 Publisher: London Springer-Verlag London Limited

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Mobile security
Author:
ISBN: 9786612274992 9781849281225 184928122X 9781282274990 1282274996 9781849280211 1849280215 Year: 2009 Publisher: Ely, U.K. : IT Governance Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems.


Book
Network performance and security : testing and analyzing using open source and low-cost tools
Authors: ---
ISBN: 012803601X 0128035846 9780128036013 9780128035849 9780128035849 Year: 2016 Publisher: Cambridge, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices. Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested Focuses on practical, real world implementation and testing Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration Provides analysis in addition to step by step methodologies

Computer Insecurity : Risking the System
Author:
ISBN: 1852339438 1846282705 Year: 2005 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincingly illustrated that the problem is increasing in both scale and cost. Computer Insecurity: Risking the System approaches its topic from the perspective of vulnerability – how can your system be attacked? Covering technical issues and human factors, the comprehensively researched text makes reference to numerous real-life security incidents, which help to provide persuasive practical evidence of the problems and the impacts that result. Key issues covered include: • the problem of computer insecurity • the need to raise security awareness • common failings that compromise protection • the attack and exploitation of systems • considerations in responding to the threats Presented in clear and lucid terms, the discussion is invaluable reading for all business and computing professionals who wish for an overview of the issues rather than a shopping list of the security measures available. ‘In today’s connected world no-one can afford to ignore computer security, this book tells you why, and what you should do about it, in simple non-technical language.’ Dr Jeremy Ward, Director of Service Development, Symantec (UK) Ltd ‘Computer Insecurity contains loads of practical advice supported by an abundance of real world examples and research. If you don’t understand what all the fuss concerning computer security is about then this book was written for you.’Jeff Crume, CISSP Executive IT Security Architect, IBM and author of ‘Inside Internet Security – What hackers don’t want you to know’ ‘I have long been looking for a book that would give answers to why rather than how we cater for Information and Communication Systems Security ... I recommend it wholeheartedly to anyone that wishes to extend their knowledge’ Professor Sokratis K. Katsikas, University of the Aegean, Greece.


Book
Security and Privacy in Social Networks and Big Data : 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Authors: ---
ISBN: 9811507589 9811507570 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.

Keywords

Online social networks. --- Data encryption --- Big data --- Security measures --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Data sets, Large --- Large data sets --- Data sets --- Computer networks --- Computer communication systems. --- Data encryption (Computer science). --- Computer security. --- Application software. --- Mobile and Network Security. --- Computer Communication Networks. --- Cryptology. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Distributed processing


Book
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings
Authors: ---
ISBN: 3030574040 3030574032 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Keywords

Computer networks --- Security measures --- Application software. --- Computer security. --- Data encryption (Computer science). --- Computer communication systems. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Cryptology. --- Mobile and Network Security. --- Computer Communication Networks. --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Protection --- Distributed processing --- Data protection. --- Cryptography. --- Computer networks. --- Computer and Information Systems Applications. --- Data and Information Security. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Human aspects of information security and assurance : 15th IFIP WG 11.12 international symposium, HAISA 2021, virtual event, July 7-9, 2021 : proceedings
Authors: ---
ISBN: 3030811115 3030811107 Year: 2021 Publisher: Cham, Switzerland : Springer,

Listing 1 - 10 of 70 << page
of 7
>>
Sort by