Narrow your search

Library

KU Leuven (6429)

ULiège (4812)

VIVES (4422)

Thomas More Mechelen (4410)

Odisee (4400)

Thomas More Kempen (4380)

UCLL (4305)

ULB (4121)

UGent (2327)

KBC (2248)

More...

Resource type

book (8570)

digital (170)

periodical (169)

undetermined (25)

film (8)

More...

Language

English (8413)

German (174)

French (132)

Dutch (20)

Undetermined (8)

More...

Year
From To Submit

2025 (48)

2024 (285)

2023 (428)

2022 (497)

2021 (507)

More...
Listing 1 - 10 of 8776 << page
of 878
>>
Sort by

Book
2015 8th International Conference on Security Technology (SecTech)
Author:
ISBN: 1467387231 1467387258 146738724X Year: 2015 Publisher: Los Alamitos, CA : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology.


Book
2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)
Author:
ISBN: 1479916382 1479916366 9781479916382 Year: 2013 Publisher: Piscataway : Institute of Electrical and Electronics Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2016 4th International Symposium on Digital Forensic and Security (ISDFS)
Author:
ISBN: 1467398667 1467398659 Year: 2016 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security After the several successful events, the fourth ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security.

Trust, complexity and control : confidence in a convergent world
Author:
ISBN: 9780470061305 0470061308 Year: 2007 Publisher: Chichester: Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cybersecurity in the current framework of the EU and Italian criminal justice systems : a focus on digital identity theft
Author:
ISBN: 1685076882 Year: 2022 Publisher: New York : Nova Science Publishers, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This book deals with the complex and often challenging topics of cybersecurity and cybercrimes. The expansion in the use of the internet and thus cyberspace has led to the exponential growth of threats, vulnerabilities and risks for users. Cyberspace has therefore become a sort of battlefield where, in addition to different interconnected computer systems, hardware and software devices are capable of rendering inefficient or destroying physical or virtual infrastructures. The complex reality of cyberspace, which is constantly evolving and expanding, requires the continuous adaptation of criminal law. The author emphasizes that the role of legislators remains essential for the need to update and/or develop legal rules aiming at regulating the activities that take place within cyberspace. This book provides useful insight for those interested in understanding the current issues related to cybercrimes and it clarifies the notion that cybersecurity is in its essence the activity of prevention, detection and finally intervention in the attacks that rotate within cyberspace, guaranteeing not only the protection of information but also of individuals"--


Book
2007 IEEE Intelligence and Security Informatics
Author:
Year: 2007 Publisher: Piscataway : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computer Security Foundations Workshop IV
Author:
Year: 1991 Publisher: [Place of publication not identified] IEEE Computer Society Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The papers presented at the June 1991 workshop held in Franconia, New Hampshire address topics in access control, covert channels, database security, integrity, secure information flow, and secure protocols. Three of the topics--secure protocols, integrity, and database security--are also addressed in panel discussions.


Book
Computer Security Foundations Workshop IX: CSFW 96
Author:
Year: 1996 Publisher: [Place of publication not identified] IEEE Computer Society Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Proceedings of the June 1996 workshop exploring computer security issues such as access control, cryptographic protocols, database security, information flow, and formal methods for security. Offers sessions and panels on areas such as protocol specification and analysis tools, E-commerce payment protocols, composition, a genealogy of noninterference, and new attacks on security protocols. Of interest to computer security researchers.


Book
Cybersecurity : background risk management and federal policies
Author:
ISBN: 1536159379 Year: 2019 Publisher: New York : Snova,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The past decade has seen a rapid increase in both the utility and risk from networked devices. The very tools Americans use to chat with loved ones and make purchases are the same tools which can be turned against them to deny access to services, steal their information, or compromise the digital system they trust. Chapter 1 provides an overview of cybersecurity for policymaking purposes, describes issues that cybersecurity affects, and discusses potential actions Congress could take. Chapter 2 describes DHS’s cybersecurity missions and how the Department interacts with others to accomplish its missions. Chapter 3 discusses the importance of risk management for cybersecurity, then introduces each of those topics: Information Sharing, Critical Infrastructure Protection and Cybersecurity, Cyber Supply Chain Risk Management, Federal Agency Oversight, and Data Protection and Privacy. The objective of chapter 4 was to determine the extent to which federal agencies have developed policies, procedures, and guidelines for the removal of personal information from cyber threat indicators and defensive measures, pursuant to CISA’s provisions. Chapter 5 highlights the work related to federal programs implemented by DHS that are intended to improve federal cybersecurity and cybersecurity over systems supporting critical infrastructure. Chapter 6 discusses the current state of electric grid cybersecurity, and the interconnected dependency of critical infrastructure with regard to electric sector reliability. The objectives of chapter 7 are to describe the roles of non-school partners and the types of PII shared with them and assess the extent to which FSA policies and procedures for overseeing the non-school partners’ protection of student aid data adhere to federal requirements, guidance, and best practices. Chapter 8 provides an update to the information security high-risk area and identifies the actions the federal government and other entities need to take to address cybersecurity challenges."


Book
Data-driven security : analysis, visualization and dashboards
Authors: ---
ISBN: 130637376X 9781306373760 9781118793664 1118793668 9781118793824 111879382X Year: 2014 Publisher: Indianapolis, Indiana : John Wiley & Sons,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security method

Listing 1 - 10 of 8776 << page
of 878
>>
Sort by