Narrow your search

Library

KU Leuven (2799)

VIVES (2686)

Thomas More Mechelen (2681)

Odisee (2679)

Thomas More Kempen (2676)

UCLL (2673)

ULiège (2550)

ULB (2443)

UGent (1639)

KBC (938)

More...

Resource type

book (3039)

periodical (61)

dissertation (5)


Language

English (3043)

German (20)

French (16)

Dutch (13)

Italian (2)

More...

Year
From To Submit

2024 (1)

2023 (43)

2022 (155)

2021 (158)

2020 (234)

More...
Listing 1 - 10 of 3101 << page
of 311
>>
Sort by

Book
Basiskennis informatiebeveiliging : op basis van ISO27001 en ISO27002
Authors: --- --- ---
ISBN: 9789401800136 Year: 2015 Publisher: Zaltbommel Van Haren

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
The journal of The British Blockchain Association The JBBA
Author:
ISSN: 25163949 25163957 Year: 2018 Publisher: London The British Blockchain Association

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
ICT Security : Praktische beveiliging van computersystemen, digitale media en netwerkverbindingen
Author:
ISBN: 9789057523748 9057523744 Year: 2018 Publisher: Amsterdam Brinkman Uitgeverij

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Harvard Data Science Review
ISSN: 26442353 Publisher: United States The MIT Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
Authors: --- ---
ISBN: 1638280614 1638280606 Year: 2022 Publisher: Norwell, MA : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians.Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles.CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.


Book
Building an effective security program.
Authors: --- ---
ISBN: 1501506528 1501506420 Year: 2020 Publisher: Boston, Massachusetts : DE GRUYTER,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.


Book
Securing the private sector : protecting US industry in pursuit of national security.
Author:
ISBN: 9781955055383 Year: 2022 Publisher: Boulder, CO : Lynne Rienner Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As a provider of vital infrastructure and technology, the private sector has become an essential contributor to US national security--and the target of hackers and terrorists. Darren Tromblay traces the evolution of an often fraught public-private partnership to explore how the complex web of intelligence agencies has struggled to protect critical economic and industrial interests.


Book
Cybersecurity : ambient technologies, IoT, and industry 4.0 implications
Authors: --- ---
ISBN: 1003145043 100044936X 1003145043 1000449378 Year: 2022 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This edited book discusses the evolution of IoT and Industry 4.0 and brings security and privacy related technological tools and techniques onto a single platform so that researchers, industry professionals, graduate, postgraduate students, and academicians can easily understand the security, privacy, challenges and opportunity concepts and make then ready to use for applications in IoT and Industry 4.0"--


Book
National Cybersecurity Protection Act of 2014.
Author:
Year: 2014 Publisher: [Washington, D.C.] : [U.S. Government Publishing Office],

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Striking back : the end of peace in cyberspace - and how to restore it
Author:
ISBN: 0300252536 Year: 2022 Publisher: New Haven ; London : Yale University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Faced with relentless technological aggression that imperils democracy, how can Western nations fight back? Before the cyber age, foreign interference in democratic politics played out in a comparatively narrow arena. The rapid expansion of cyberspace has radically altered this situation. The hacking activities of Russian military agents in the 2016 US presidential election and other major incidents demonstrate the sophisticated offensive strategies pursued by geopolitical adversaries. The West is winning the technology race – yet losing the larger contest over cybersecurity. Lucas Kello reveals the failures of present policy to prevent cyberattacks and other forms of technological aggression. Drawing upon case studies and interviews with decision-makers, he develops a bold new approach: a concentrated and coordinated response strategy that targets adversaries’ interests and so recaptures the initiative.Striking Back provides an original solution to national security challenges in our era of intense technological rivalry.

Listing 1 - 10 of 3101 << page
of 311
>>
Sort by