Narrow your search

Library

KU Leuven (17)

UCLL (14)

Odisee (13)

Thomas More Kempen (13)

Thomas More Mechelen (13)

VIVES (13)

ULB (12)

ULiège (11)

AP (7)

KDG (7)

More...

Resource type

book (24)

digital (7)

dissertation (2)

film (1)


Language

English (32)

Undetermined (1)


Year
From To Submit

2020 (4)

2018 (1)

2017 (1)

2016 (1)

2015 (2)

More...
Listing 1 - 10 of 33 << page
of 4
>>
Sort by

Book
Mindful living with Asperger's syndrome
Author:
ISBN: 9781849054348 0857008676 1849054347 9780857008671 Year: 2014 Publisher: London Philadelphia

Loading...
Export citation

Choose an application

Bookmark

Abstract

Whether due to anxiety or the comfort of routine, people with Asperger's Syndrome often find that they go through life on autopilot. This book provides advice and step-by-step exercises for adopting a mindful way of living to overcome difficulties and become more present in the moment. Exercises include breathing, yoga stretches and meditations.


Book
Mathematics of dependable systems
Author:
ISBN: 9780198534914 0198534914 Year: 1995 Publisher: Oxford: Clarendon,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cryptography and coding
Author:
ISBN: 0198533934 Year: 1992 Publisher: Oxford Clarendon

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Glass half empty, glass half full : how Asperger's syndrome has changed my life
Author:
ISBN: 1446228797 1446212661 1446264009 1283880334 Year: 2005 Publisher: London : Thousand Oaks, CA : Paul Chapman Publishing ; Sage Publications,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This story will be inspirational to all adults either facing Asperger's syndrome personally or interacting with someone who has been diagnosed. Chris Mitchell describes his life before and after diagnosis with Asperger's syndrome.


Book
Security and Trust Management : 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings
Authors: ---
ISBN: 3319680625 3319680633 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems.

Keywords

Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Computers. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Computer Communication Networks. --- Computing Milieux. --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer software engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Science --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data protection --- Security systems --- Hacking --- Engineering --- Distributed processing --- Computer security --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Security Standardisation Research : First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
Authors: ---
ISBN: 3319140531 331914054X Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Data Structures. --- Math Applications in Computer Science. --- Mathematics. --- Data structures (Computer scienc. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing


Digital
Security Standardisation Research : First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
Authors: ---
ISBN: 9783319140544 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.


Book
The behaviour management toolkit : avoiding exclusion at school
Author:
ISBN: 1446251268 1283881810 144626386X Year: 2012 Publisher: Los Angeles, Calif. : SAGE Publications,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Based on author Chris Parry-Mitchell's successful work across a range of schools, this book consists of 10 sessions that make up a program to help students who are at risk of exclusion. The young people learn how to think, communicate, behave and relate to each other and other people in more useful ways. Everything in this book has been tried and tested with young people who are at risk within their school settings, and for most of them it has been a turning point in their lives.


Book
Information Security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
Authors: ---
ISBN: 9783319233185 3319233173 9783319233178 3319233181 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security. .


Digital
Information Security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
Authors: ---
ISBN: 9783319233185 9783319233178 9783319233192 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security. .

Listing 1 - 10 of 33 << page
of 4
>>
Sort by