Narrow your search

Library

Thomas More Kempen (1188)

VIVES (1150)

UCLL (1141)

Odisee (1134)

Thomas More Mechelen (1129)

KU Leuven (1100)

ULB (948)

ULiège (919)

AP (609)

KDG (606)

More...

Resource type

book (989)

digital (494)

periodical (201)

object (1)


Language

English (1095)

Dutch (72)

Spanish (7)

French (4)

German (4)

More...

Year
From To Submit

2024 (2)

2023 (232)

2022 (172)

2021 (50)

2020 (8)

More...
Listing 1 - 10 of 1188 << page
of 119
>>
Sort by

Multi
Infosec management fundamentals
Authors: ---
ISBN: 9780128041871 0128041870 0128041722 9780128041727 Year: 2015 Publisher: Amsterdam, [Netherlands] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities. Teaches ISO/IEC 27000 best practices on information security management Discusses risks and controls within the context of an overall information security management system (ISMS) Provides foundational information for experienced professionals as well as those new to the industry.


Multi
Computational frameworks : systems, models and applications
Author:
ISBN: 9780081023167 0081023162 9781785482564 1785482564 Year: 2017 Publisher: London, Oxford, England : ISTE Press : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computational Frameworks: Systems, Models and Applications provides an overview of advanced perspectives that bridges the gap between frontline research and practical efforts. It is unique in showing the interdisciplinary nature of this area and the way in which it interacts with emerging technologies and techniques. As computational systems are a dominating part of daily lives and a required support for most of the engineering sciences, this book explores their usage (e.g. big data, high performance clusters, databases and information systems, integrated and embedded hardware/software components, smart devices, mobile and pervasive networks, cyber physical systems, etc.).


Multi
Hardware security : a hands-on learning approach
Authors: ---
ISBN: 9780128124789 0128124784 0128124776 9780128124772 Year: 2019 Publisher: Cambridge, Massachusetts : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org.


Multi
Model engineering for simulation
Authors: --- ---
ISBN: 9780128135440 0128135441 0128135433 9780128135433 Year: 2019 Publisher: London, England : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Choose your InfoSec path : an interactive cybersecurity adventure for beginners
Author:
ISBN: 9781484270363 9781484270370 9781484270356 1484270363 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind. Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed. Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now.


Book
Internet studies : past, present and future directions
Author:
ISBN: 9781409446415 9781409446422 9781409473879 1409446425 1409446417 1409473872 1317113624 1317113616 1785390627 9781315589572 9781317113607 9781317113614 1315589575 9781317113621 9781785390623 Year: 2014 Publisher: Surrey, England ; Burlington, Vermont : Ashgate,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A comprehensive overview of the field, Internet Studies considers key issues of social importance that the study of the Internet draws upon. At the same time, it examines the role of the Internet in social research and the development of highly interdisciplinary and rapidly developing Internet research. Hence, this volume maps out areas of certainty and uncertainty in the study of the Internet and, as such, it will be of interest to scholars and students of media and communication, sociology and social research methods.


Multi
The information systems security officer's guide : establishing and managing an information protection program
Author:
ISBN: 9780128023792 0128023791 9780128021903 012802190X 1281006742 9786611006747 0080491537 Year: 2003 Publisher: Amsterdam ; Boston : Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

Geoscience after IT : a view of the present and future impact of information technology on geoscience
Author:
ISBN: 9780080436722 0080436722 1281045993 9781281045997 9786611045999 6611045996 0080532519 9780080532516 Year: 2000 Publisher: New York : Pergamon,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Most geoscientists are aware of recent IT developments, but cannot spend time on obscure technicalities. Few have considered their implications for the science as a whole. Yet the information industry is moving fast: electronic delivery of hyperlinked multimedia; standards to support interdisciplinary and geographic integration; new models to represent and visualize our concepts, and control and manage our activities; plummeting costs that force the pace. To stay on course, the scientist needs a broad appreciation of the complex and profound interactions of geoscience and IT, not previousl

InfoSec career hacking : sell your skillz, not your soul
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not

Listing 1 - 10 of 1188 << page
of 119
>>
Sort by