Narrow your search

Library

KU Leuven (207)

ULiège (177)

VIVES (173)

Odisee (172)

Thomas More Kempen (171)

Thomas More Mechelen (171)

UCLL (171)

ULB (159)

UGent (95)

UCLouvain (65)

More...

Resource type

book (275)

digital (5)

periodical (1)


Language

English (268)

French (8)


Year
From To Submit

2023 (47)

2022 (8)

2021 (5)

2020 (3)

2019 (1)

More...
Listing 1 - 10 of 276 << page
of 28
>>
Sort by

Book
Best Practices in Computer Network Defense : Incident Detection and Response
Authors: ---
ISBN: 9781614993711 Year: 2014 Publisher: Amsterdam : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
My Data My Privacy My Choice.
Author:
ISBN: 938984519X Year: 2020 Publisher: Delhi : BPB Publications,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network security in the 90's : issues and solutions for managers
Author:
ISBN: 0471547778 Year: 1992 Publisher: New York Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The cybersecurity dilemma : hacking, trust, and fear between nations
Author:
ISBN: 9781849047135 Year: 2016 Publisher: London Hurst & Company

Loading...
Export citation

Choose an application

Bookmark

Abstract

Why do nations break into one another's most important computer networks ? There is an obvious answer : to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential component of cyber operations.

Multicast and group security
Authors: ---
ISBN: 158053659X 9781580536592 1580533426 9781580533423 Year: 2003 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.

Security sage's guide to hardening the network infrastructure
Author:
ISBN: 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 9786611052621 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u

Security sage's guide to hardening the network infrastructure
Author:
ISBN: 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 9786611052621 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u

Cyber-security and threat politics
Author:
ISBN: 9780415429818 9780203937419 9781134086658 9781134086696 9781134086702 9780415569880 Year: 2008 Publisher: London Routledge

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyber Infrastructure Protection. Volume II
Authors: --- --- ---
ISBN: 1584875712 Year: 2013 Publisher: Carlisle, PA : US Army War College,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Personnel Protection : Proven Practices
Authors: ---
ISBN: 1299631274 9781299631274 9780124169883 0124169880 9780124170032 012417003X Year: 2013 Publisher: Burlington : Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series

Listing 1 - 10 of 276 << page
of 28
>>
Sort by