Narrow your search

Library

KU Leuven (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

ULB (7)

ULiège (7)

VIVES (7)

UGent (6)

AP (5)

More...

Resource type

book (11)

digital (5)


Language

English (15)


Year
From To Submit

2020 (3)

2019 (5)

2018 (2)

2017 (2)

2016 (1)

More...
Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Book
Information Security Education – Towards a Cybersecure Society : 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings
Authors: ---
ISBN: 3319997335 3319997343 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 11 revised papers presented were carefully reviewed and selected from 25 submissions. They focus on cybersecurity and are organized in the following topical sections: information security learning techniques; information security training and awareness; and information security courses and curricula.

Keywords

Education. --- Software engineering. --- Data structures (Computer scienc. --- Computer science. --- Computers and Education. --- Software Engineering/Programming and Operating Systems. --- Data Structures and Information Theory. --- Computer Applications. --- Information Systems Applications (incl. Internet). --- Informatics --- Science --- Computer software engineering --- Engineering --- Children --- Education, Primitive --- Education of children --- Human resource development --- Instruction --- Pedagogy --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Teaching --- Training --- Education --- Education—Data processing. --- Data structures (Computer science). --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Information theory. --- Software Engineering. --- Computer and Information Systems Applications. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education


Book
Information Security Education. Education in Proactive Information Security : 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings
Authors: ---
ISBN: 3030234517 3030234509 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 12, held in Lisbon, Portugal, in June 2019. The 12 revised full papers presented were carefully reviewed and selected from 26 submissions. The papers are organized in the following topical sections: innovation in curricula; training; applications and cryptography; and organizational aspects.

Keywords

Education. --- Computer network architectures. --- Data protection. --- Social sciences --- Computer science. --- Computers and Education. --- Computer Systems Organization and Communication Networks. --- Security. --- Computer Appl. in Social and Behavioral Sciences. --- User Interfaces and Human Computer Interaction. --- Data processing. --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Children --- Education, Primitive --- Education of children --- Human resource development --- Instruction --- Pedagogy --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Teaching --- Training --- Education --- Data protection --- Education—Data processing. --- Computer organization. --- Application software. --- User interfaces (Computer systems). --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Organization, Computer --- Electronic digital computers --- Computer engineering. --- Computer networks. --- Human-computer interaction. --- Computer Engineering and Networks. --- Data and Information Security. --- Computer Application in Social and Behavioral Sciences. --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computers --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Distributed processing --- Design and construction


Digital
Information Security Education – Towards a Cybersecure Society : 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings
Authors: ---
ISBN: 9783319997346 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 11 revised papers presented were carefully reviewed and selected from 25 submissions. They focus on cybersecurity and are organized in the following topical sections: information security learning techniques; information security training and awareness; and information security courses and curricula.


Book
Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: --- ---
ISBN: 9783319185002 3319184997 9783319184999 3319185004 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Educational Technology. --- Teaching and Teacher Education. --- Computer science. --- Data protection. --- Information Systems. --- Education. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Education --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Educational technology. --- Teaching. --- Didactics --- Instruction --- Pedagogy --- School teaching --- Schoolteaching --- Instructional systems --- Pedagogical content knowledge --- Training --- Instructional technology --- Technology in education --- Technology --- Educational innovations --- Teaching --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Aids and devices --- Communication systems --- Protection --- Security measures --- Distributed processing --- Computers and Education. --- Children --- Education, Primitive --- Education of children --- Human resource development --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Computer security --- Study and teaching --- Education—Data processing. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Teachers --- Data and Information Security. --- Computer and Information Systems Applications. --- IT Operations. --- Digital Education and Educational Technology. --- Data processing. --- Management. --- Training of. --- Teacher education --- Teacher training --- Teachers, Training of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education


Book
Critical Information Infrastructures Security : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers
Authors: --- ---
ISBN: 3319333305 3319333313 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised selected papers from the 10th International Conference on Critical Information Infrastructures Security, CRITIS 2015, held in Berlin, Germany, in October 2015. The 18 full and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in topical sections named: critical information infrastructure protection; critical infrastructure resilience assessment; emergency management: critical infrastructure preparedness; modelling, simulation and analysis approaches; electric grid protection and resilience; and CIPRNet young CRITIS award candidate papers.

Keywords

Computer science. --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer failures --- Computer malfunctions --- Failure of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Failures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Data protection --- Security systems --- Hacking --- System failures (Engineering) --- Fault-tolerant computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Distributed processing --- Computer system performance. --- Information Systems. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies
Authors: --- ---
ISBN: 3030000249 3030000230 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.

Keywords

Cyber intelligence (Computer security) --- Computer security. --- Data protection. --- Computer Communication Networks. --- Information systems. --- Computer crimes. --- Systems and Data Security. --- Security Science and Technology. --- Security. --- Computer Appl. in Administrative Data Processing. --- Cybercrime. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Security measures --- System safety. --- Computer communication systems. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Distributed processing --- Prevention


Book
Information Security Education. Information Security in Action : 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings
Authors: --- ---
ISBN: 303059291X 3030592901 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Keywords

Education—Data processing. --- Data protection. --- Computer organization. --- Application software. --- Computers and Education. --- Security. --- Computer Systems Organization and Communication Networks. --- Computer Appl. in Social and Behavioral Sciences. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer security --- Internet --- Study and teaching --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Education --- Computer engineering. --- Computer networks. --- Social sciences --- Data and Information Security. --- Computer Engineering and Networks. --- Computer Application in Social and Behavioral Sciences. --- Data processing. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Distributed processing --- Design and construction


Book
Information Security Education. Education in Proactive Information Security
Authors: --- ---
ISBN: 9783030234515 Year: 2019 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies
Authors: --- ---
ISBN: 9783030000240 Year: 2019 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.


Digital
Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: --- ---
ISBN: 9783319185002 9783319185019 9783319184999 9783319370033 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.

Listing 1 - 10 of 15 << page
of 2
>>
Sort by