Narrow your search

Library

VUB (19)

KU Leuven (18)

Odisee (17)

Thomas More Kempen (17)

Thomas More Mechelen (17)

UCLL (17)

VIVES (17)

AP (15)

KDG (15)

ULB (15)

More...

Resource type

book (39)

digital (15)


Language

English (51)


Year
From To Submit

2023 (2)

2022 (3)

2021 (2)

2020 (6)

2019 (6)

More...
Listing 1 - 10 of 51 << page
of 6
>>
Sort by

Digital
Security in E-Learning
Author:
ISBN: 9780387260655 Year: 2005 Publisher: Boston, MA Springer Science+Business Media, Inc


Book
ROOTS : Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium
Author:
Year: 2020 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security in e-learning
Author:
ISBN: 1280263377 9786610263370 038726065X 0387243410 1441937226 Year: 2005 Publisher: New York, NY : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.

Keywords

Information technology --- Computer security --- Computer-assisted instruction --- Management. --- Security measures. --- Computer science. --- Software engineering. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Programming Techniques. --- Software Engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Informatics --- Science --- Programming --- CAI (Computer-assisted instruction) --- Computer-aided instruction --- Computer-assisted learning --- Computer based instruction --- Computer-enhanced learning --- Electronic data processing in programmed instruction --- ILSs (Integrated learning systems) --- Integrated learning systems --- Microcomputer-aided instruction --- Microcomputer-assisted instruction --- Microcomputer-assisted learning --- Microcomputer-based instruction --- Teaching --- Education --- Educational technology --- Programmed instruction --- Telematics --- Data processing --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Security in E-Learning
Authors: ---
ISBN: 9780387260655 Year: 2005 Publisher: Boston, MA Springer Science+Business Media, Inc.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.


Book
Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
Authors: --- ---
ISBN: 3319241761 331924177X Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.


Book
Information Systems Security and Privacy : First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers
Authors: --- --- ---
ISBN: 3319276670 3319276689 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers. .


Book
Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
Authors: --- ---
ISBN: 3319241737 3319241745 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.    .


Book
Machine Learning and Knowledge Extraction : First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017, Proceedings
Authors: --- --- ---
ISBN: 3319668080 3319668072 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2017, held in Reggio, Italy, in August/September 2017. The 24 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers deal with fundamental questions and theoretical aspects and cover a wide range of topics in the field of machine learning and knowledge extraction. They are organized in the following topical sections: MAKE topology; MAKE smart factory; MAKE privacy; MAKE VIS; MAKE AAL; and MAKE semantics.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Coding theory. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Coding and Information Theory. --- Computer Communication Networks. --- Systems and Data Security. --- Computers and Society. --- Civilization and computers --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Civilization --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Artificial Intelligence. --- Computer networks. --- Application software. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Machine Learning and Knowledge Extraction : Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27–30, 2018, Proceedings
Authors: --- --- ---
ISBN: 3319997394 3319997408 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2018, held in Hamburg, Germany, in September 2018. The 25 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are clustered under the following topical sections: MAKE-Main Track, MAKE-Text, MAKE-Smart Factory, MAKE-Topology, and MAKE Explainable AI. .


Book
Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
Authors: --- --- ---
ISBN: 331910974X 3319109758 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.

Listing 1 - 10 of 51 << page
of 6
>>
Sort by