Narrow your search

Library

KBC (10)

Thomas More Kempen (6)

Thomas More Mechelen (6)

Odisee (5)

UCLL (5)

VIVES (5)

Vlaams Parlement (4)

FARO (3)

LUCA School of Arts (3)

ULiège (3)

More...

Resource type

book (10)

digital (1)


Language

English (10)


Year
From To Submit

2023 (3)

2022 (1)

2021 (1)

2020 (1)

2017 (1)

More...
Listing 1 - 10 of 10
Sort by

Book
Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits
Authors: ---
ISBN: 0833097784 9780833097781 9780833097613 083309761X Year: 2017 Publisher: Santa Monica, California : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and resulting liability of attacks and data breaches for U.S. consumers, companies, insurers, and for the civil justice system broadly. The authors provide insights about the zero-day vulnerability research and exploit development industry; give information on what proportion of zero-day vulnerabilities are alive (undisclosed), dead (known), or somewhere in between; and establish some baseline metrics regarding the average lifespan of zero-day vulnerabilities, the likelihood of another party discovering a vulnerability within a given time period, and the time and costs involved in developing an exploit for a zero-day vulnerability"--Publisher's description.


Book
Outsmart Computer Viruses.
Author:
ISBN: 1978535023 Year: 2023 Publisher: New York : Enslow Publishing, LLC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Most people know that viruses can make people very sick. But there are also certain kinds of viruses that can infect computers. In this book, readers will learn about computer programs called viruses, and how they can harm devices and even steal information. The book will explain how users can keep their computers and other technology safe and what to do if a virus happens to infect their device. The text includes fact boxes and full-color photographs to enhance STEM learning. Approachable language encourages independent reading and comprehension"--


Book
Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software
Authors: ---
ISBN: 1801075603 Year: 2021 Publisher: Birmingham : Packt Publishing, Limited,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Epidemic risk analysis and assessment in transport services : COVID-19 and other viruses
Author:
ISBN: 1003204732 1000455262 1003204732 1000455327 Year: 2022 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This methodology for assessing the hazards, and probability and risks of viral transmission on public and freight transport services, based on the SARS-CoV-2 pandemic, gives a matrix of hazard assessment in transportation, and tools for estimating the probability of virus transmission, prevention costs, epidemic risk, and forecasting"--


Book
Malware Science : A Comprehensive Guide to Detection, Analysis, and Compliance
Authors: ---
ISBN: 1804615706 Year: 2023 Publisher: Birmingham, England : Packt Publishing Ltd.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscape Key Features Get introduced to three primary AI tactics used in malware and detection Leverage data science tools to combat critical cyber threats Understand regulatory requirements for using AI in cyber threat management Purchase of the print or Kindle book includes a free PDF eBook Book Description In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use. Malware Science starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you'll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You'll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats. By the end of this book, you'll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats. What you will learn Understand the science behind malware data and its management lifecycle Explore anomaly detection with signature and heuristics-based methods Analyze data to uncover relationships between data points and create a network graph Discover methods for reverse engineering and analyzing malware Use ML, advanced analytics, and data mining in malware data analysis and detection Explore practical insights and the future state of AI's use for malware data science Understand how NLP AI employs algorithms to analyze text for malware detection Who this book is for This book is for cybersecurity experts keen on adopting data-driven defense methods. Data scientists will learn how to apply their skill set to address critical security issues, and compliance officers navigating global regulations like GDPR and CCPA will gain indispensable insights. Academic researchers exploring the intersection of data science and cybersecurity, IT decision-makers overseeing organizational strategy, and tech enthusiasts eager to understand modern cybersecurity will also find plenty of useful information in this guide. A basic understanding of cybersecurity and information technology is a prerequisite.


Book
AIDS at 30 : nations at the crossroads
Authors: --- --- --- ---
ISBN: 9789210550314 9210550315 9789291738953 9291738956 Year: 2011 Publisher: Geneva : UNAIDS,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report provides evidence of how much we have achieved and weighs that against our vision for the future: zero new HIV infections, zero discrimination and zero AIDS-related deaths. In these pages you will find scientific analysis, personal insights and the results of extensive national and regional consultations at the front lines of the AIDS response. While perspectives differ, one simple truth emerges: we cannot break the arc of this epidemic - where five people were newly infected for every three starting treatment in 2010 - if we adopt a 'business as usual' approach.

Keywords

E-books --- HIV Infections. --- Acquired Immunodeficiency Syndrome --- Acquired Immunodeficiency Syndrome. --- AIDS (Disease) --- HIV (Viruses) --- HIV infections --- Public Health --- Health & Biological Sciences --- Communicable Diseases --- HIV (Viruses) infections --- HTLV-III infections --- HTLV-III-LAV infections --- Human T-lymphotropic virus III infections --- Lentivirus infections --- Sexually transmitted diseases --- AIDS-associated retrovirus --- AIDS virus --- ARV (Viruses) --- HTLV-III (Viruses) --- HTLV-III-LAV (Viruses) --- Human immunodeficiency viruses --- Human T-cell leukemia virus III --- Human T-cell lymphotropic virus III --- Human T-lymphotropic virus III --- IDAV (Viruses) --- Immunodeficiency-associated virus --- LAV (Viruses) --- LAV-HTLV-III (Viruses) --- Lymphadenopathy-associated virus --- T-lymphotrophic virus III, Human --- HTLV (Viruses) --- Virus-induced immunosuppression --- Acquired immune deficiency syndrome --- Acquired immunodeficiency syndrome --- Acquired immunological deficiency syndrome --- Immunological deficiency syndromes --- Acquired Immune Deficiency Syndrome --- Acquired Immuno-Deficiency Syndrome --- AIDS --- Immunodeficiency Syndrome, Acquired --- Immunologic Deficiency Syndrome, Acquired --- Acquired Immuno Deficiency Syndrome --- Acquired Immuno-Deficiency Syndromes --- Acquired Immunodeficiency Syndromes --- Immuno-Deficiency Syndrome, Acquired --- Immuno-Deficiency Syndromes, Acquired --- Immunodeficiency Syndromes, Acquired --- Syndrome, Acquired Immuno-Deficiency --- Syndrome, Acquired Immunodeficiency --- Syndromes, Acquired Immuno-Deficiency --- Syndromes, Acquired Immunodeficiency --- CD4-Positive T-Lymphocytes --- HIV-1 --- AIDS Arteritis, Central Nervous System --- HIV Coinfection --- HTLV-III Infections --- HTLV-III-LAV Infections --- T-Lymphotropic Virus Type III Infections, Human --- Coinfection, HIV --- Coinfections, HIV --- HIV Coinfections --- HIV Infection --- HTLV III Infections --- HTLV III LAV Infections --- HTLV-III Infection --- HTLV-III-LAV Infection --- Infection, HIV --- Infection, HTLV-III --- Infection, HTLV-III-LAV --- Infections, HIV --- Infections, HTLV-III --- Infections, HTLV-III-LAV --- T Lymphotropic Virus Type III Infections, Human --- prevention & control. --- History --- Prevention --- Treatment --- Epidemiology


Multi
Viruses in All Dimensions : How an Information Code Controls Viruses, Software and Microorganisms
Author:
ISBN: 9783658388263 9783658388256 9783658388270 Year: 2023 Publisher: Wiesbaden, Germany : Springer Fachmedien Wiesbaden GmbH,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Microorganisms, viruses and computer programmes encode all the information they need to reproduce and spread themselves. The mechanisms in the living world, in viruses and even in the world of technical systems are amazingly similar. The book shows how great the parallels of these replication systems are and what they are based on. The excursus also leads into the fascinating world of genetics, to the question of what constitutes life, and to software that replicates itself independently. Content: · What is life? · Basic concepts of molecular genetics · Viruses and early genetics · Algorithms and self-replicating computer programs · What is information? · Coding of information in technology and biology · Coevolution of life and technology The author Rafael Ball holds a PHD in biology, is a historian of science and a librarian. He is director of the ETH Library Zurich and lecturer in library science and management. He works on questions of information theory, scholarly communication and the effects of digitisation He is the author of numerous relevant publications, editor of information science journals and speaker at meetings and conferences.


Book
Viruses, Hardware and Software Trojans : Attacks and Countermeasures
Authors: ---
ISBN: 3030472183 3030472175 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics.


Book
EU research fighting the three major deadly diseases : HIV/AIDS, Malaria and Tuberculosis. 1st edition EU projects 2007-2010.
Author:
ISBN: 9789279157073 Year: 2010 Publisher: Publications Office of the European Union

Loading...
Export citation

Choose an application

Bookmark

Abstract

The global emergency caused by HIV/AIDS, Malaria and Tuberculosis requires new approaches to confront the three major killing diseases around the world that are the origin and the consequence of serious poverty. In response to this emergency, The European Union provides a comprehensive approach in a wide range of policy areas, including trade, development and research. Research on HIV/AIDS, Malaria and Tuberculosis focuses on collaborative research at World level, developing new therapies, diagnostic and preventive tools. The Programme is sponsoring research on the entire spectrum, from basic molecular research through to preclinical tests and proof-of-principle studies. Research efforts confront the three diseases at the global level, but also address specific European aspects. Structures that were successfully built under the FP6 (2002-2006) are reinforced and complemented in the FP7. This catalogue shows the projects currently financed by the European Commission's Seventh Research Framework Programme (FP7) since 2007 up to 2010, aiming at combating these three major killer diseases: HIV/AIDS, Malaria and Tuberculosis."


Book
Securing our future : report of the Commission on HIV/AIDS and Governance in Africa
Authors: ---
ISBN: 9789211251050 9781435663138 1435663136 9211251052 Year: 2008 Publisher: [Place of publication not identified] Commission on HIV/AIDS and Governance in Africa

Listing 1 - 10 of 10
Sort by