Narrow your search

Library

KU Leuven (3603)

VIVES (3174)

Odisee (3169)

Thomas More Kempen (3161)

Thomas More Mechelen (3161)

UCLL (3108)

ULiège (2922)

ULB (2765)

UGent (1736)

KBC (979)

More...

Resource type

book (3999)

periodical (106)

digital (19)

dissertation (4)

article (1)

More...

Language

English (3894)

French (94)

German (52)

Dutch (46)

Undetermined (5)

More...

Year
From To Submit

2025 (2)

2024 (59)

2023 (78)

2022 (151)

2021 (157)

More...
Listing 1 - 10 of 4105 << page
of 411
>>
Sort by

Book
Proceedings 44th Annual 2010 International Carnahan Conference on Security Technology
Authors: ---
ISBN: 1424474027 1424474035 9781424474028 Year: 2010 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
IEEE Std 692-2013 (Revision of IEEE Std 692-2010) - Redline : IEEE Standard for Criteria for Security Systems for Nuclear Power Generating Stations - Redline
Author:
ISBN: 0738188085 Year: 2013 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Criteria for the design of an integrated security system for nuclear power generating stations are provided in this standard. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.


Multi
Discovering the total cost of security to the enterprise : proven practices
Author:
ISBN: 132209764X 9781322097640 9780128009215 0128009217 9780128020807 0128020806 Year: 2015 Publisher: Oxfordshire, [England] ; Waltham, Massachusetts : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary


Periodical
Security technology news.
Author:
Year: 1993 Publisher: Potomac, MD : Phillips Business Information

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
Proceedings of the 13th European workshop on Systems Security
Authors: ---
Year: 2020 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Each year, the workshop brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Over time, EuroSec has established itself as a forum for presenting and discussing novel ideas with the community, before they are further developed into full papers.

Keywords

Security systems


Book
Sicherheit
Author:
ISBN: 373700739X 3847007394 Year: 2017 Publisher: Göttingen, Germany : V&R unipress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
2004 38th Annual International Carnahan Conference on Security Technology
Author:
Year: 2004 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
We have root : even more advice from Schneier on security
Author:
ISBN: 1119643120 111965355X 1119643465 9781119643128 9781119653554 9781119643463 Year: 2019 Publisher: Indianapolis, Indiana : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments. Bruce’s writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic , the Wall Street Journal , CNN, the New York Times , the Washington Post, Wired ,  and many others. And now you can enjoy his essays in one place—at your own speed and convenience. • Timely security and privacy topics • The impact of security and privacy on our world • Perfect for fans of Bruce’s blog and newsletter • Lower price than his previous essay collections The essays are written for anyone who cares about the future and implications of security and privacy for society.


Book
Индекс на безбедност
Authors: ---
Year: 2018 Publisher: Skopje [North Macedonia] : Факултет за безбедност - Скопје,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Донбас у системі інформаційної безпеки держави : регіональні особливості, зовнішні виклики, інструменти боротьби з антиукраїнською пропа?
Author:
Year: 2015 Publisher: Ukraine : Інститут політичних і етнонаціональних досліджень ім. І. Ф. Кураса НАН України,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The analytical report was prepared by the results of the research work "Donbass in the information security system of the state: regional distinctions, external challenges, tools of struggle against anti-Ukrainian propaganda", which was performed at the I.F. Kuras Institute of Political and Ethnic Studies of the National Academy of Sciences of Ukraine in 2015. As a result of a project completion, the regional distinctions of Donbass, external challenges, tools of struggle against anti-Ukrainian propaganda in the information security system of the state were examined.

Listing 1 - 10 of 4105 << page
of 411
>>
Sort by