Narrow your search

Library

VUB (5)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

VIVES (4)

KU Leuven (3)

ULB (3)

ULiège (3)

KBC (2)

More...

Resource type

book (8)

digital (1)


Language

English (9)


Year
From To Submit

2020 (2)

2019 (2)

2018 (1)

2017 (1)

2013 (2)

More...
Listing 1 - 9 of 9
Sort by
Security in e-learning
Author:
ISBN: 1280263377 9786610263370 038726065X 0387243410 1441937226 Year: 2005 Publisher: New York, NY : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.

Keywords

Information technology --- Computer security --- Computer-assisted instruction --- Management. --- Security measures. --- Computer science. --- Software engineering. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Programming Techniques. --- Software Engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Informatics --- Science --- Programming --- CAI (Computer-assisted instruction) --- Computer-aided instruction --- Computer-assisted learning --- Computer based instruction --- Computer-enhanced learning --- Electronic data processing in programmed instruction --- ILSs (Integrated learning systems) --- Integrated learning systems --- Microcomputer-aided instruction --- Microcomputer-assisted instruction --- Microcomputer-assisted learning --- Microcomputer-based instruction --- Teaching --- Education --- Educational technology --- Programmed instruction --- Telematics --- Data processing --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Empirical research for software security
Authors: --- ---
ISBN: 1351650882 1315154854 1498776426 9781315154855 9781498776424 9781498776417 1498776418 Year: 2018 Publisher: Boca Raton, FL

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher.


Book
Blocks and chains
Authors: --- --- ---
ISBN: 9781627057134 9781627057165 Year: 2017 Publisher: [San Rafael, California] Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Information and Communication Technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 3642368174 3642368182 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Systems and Data Security. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Computer Communication Networks. --- Computer networks --- Software engineering --- Security measures --- Information storage and retrieva. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Distributed processing


Book
Trust, Privacy and Security in Digital Business : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 3030278131 3030278123 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: privacy; and audit, compliance and threat intelligence. The chapter "A data utility-driven benchmark for de-identification methods" is open access under a CC BY 4.0 license at link.springer.com.


Book
Trust, Privacy and Security in Digital Business
Authors: --- --- --- --- --- et al.
ISBN: 9783030589868 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer


Book
Hardware malware
Authors: --- --- --- ---
ISBN: 9781627052528 9781627052511 Year: 2013 Publisher: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Trust, Privacy and Security in Digital Business : 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings
Authors: --- --- --- ---
ISBN: 9783030589868 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust.


Book
Trust, Privacy and Security in Digital Business
Authors: --- --- --- --- --- et al.
ISBN: 9783030278137 Year: 2019 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 9 of 9
Sort by