Narrow your search

Library

ULB (1606)

KU Leuven (1348)

ULiège (1138)

Odisee (988)

Thomas More Mechelen (961)

UCLL (956)

VIVES (956)

Thomas More Kempen (948)

UAntwerpen (645)

VUB (634)

More...

Resource type

book (1306)

digital (478)

periodical (303)

dissertation (1)


Language

English (1425)

French (115)

Dutch (32)

German (10)

Undetermined (10)

More...

Year
From To Submit

2024 (1)

2023 (232)

2022 (177)

2021 (48)

2020 (10)

More...
Listing 1 - 10 of 1606 << page
of 161
>>
Sort by

Periodical
CCF Transactions on High Performance Computing
Author:
ISSN: 25244922 25244930 Publisher: Hybrid

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Bulletin de l'Unisist. Programme général d'information
Authors: ---
ISSN: 03792226 Year: 1973

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Nibble
ISSN: 07343795 Year: 1980 Publisher: [Lincoln, Mass.] : [Micro-Sparc],

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Choose your InfoSec path : an interactive cybersecurity adventure for beginners
Author:
ISBN: 9781484270363 9781484270370 9781484270356 1484270363 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind. Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed. Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now.

Fire in the valley : making of the personal computer
Authors: ---
ISBN: 0881341215 Year: 1984 Publisher: Berkeley, Calif. : Osborne/McGraw-Hill,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Getting involved with your own computer : a guide for beginners
Authors: ---
ISBN: 089490003X 0894900048 Year: 1977 Publisher: Short Hills, N.J. : R. Enslow Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Understanding computers
Author:
ISBN: 0192177419 9780192177414 Year: 1986 Publisher: Oxford : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Les robots
Authors: ---
ISBN: 2130360130 9782130360131 Year: 1979 Volume: 1775 Publisher: Paris : Presses universitaires de France,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Security and privacy in new computing environments : 5th EAI International Conference, SPNCE 2022, Xi'an, China, December 30-31, 2022, proceedings
Authors: --- ---
ISBN: 9783031306235 9783031306228 9783031306242 Year: 2023 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.


Multi
Handbook of requirements and business analysis
Author:
ISBN: 9783031067396 9783031067389 9783031067402 Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Meyer's Handbook of Requirements and Business Analysis is a comprehensive treatise providing the reader with all the principles and techniques necessary to produce effective requirements. Even the best design, implementation and verification are worthless if they are the solution to the wrong problem. Defining the problem properly is the task of requirements, also known as business analysis. To be successful, a project must apply to requirements the same engineering standards as to other parts of system construction. The Handbook presents a holistic view of requirements including four elements or PEGS: Project, Environment, Goals and System. One of its principal contributions is the definition of a Standard Plan for requirements documents, consisting of the four corresponding books and replacing the structure of the obsolete IEEE 1998 standard. The text covers both classical requirements techniques and advanced topics. The successive chapters address: fundamental concepts and definitions; requirements principles; the Standard Plan for requirements; how to write good requirements; how to gather requirements; scenario techniques (use cases, user stories); object-oriented requirements; how to take advantage of formal methods; abstract data types; and the place of requirements in the software lifecycle. The Handbook is suitable both as a practical guide for industry and as a textbook, with over 50 exercises and supplementary material available from the book's site, including slides and links to video lectures (MOOCs). .

Listing 1 - 10 of 1606 << page
of 161
>>
Sort by