Narrow your search

Library

LUCA School of Arts (449)

UCLL (395)

Odisee (392)

Thomas More Mechelen (391)

VIVES (390)

Thomas More Kempen (389)

KU Leuven (372)

ULB (267)

ULiège (266)

UGent (245)

More...

Resource type

book (290)

periodical (159)

digital (41)

film (1)


Language

English (409)

Dutch (13)

Spanish (7)

French (6)

German (6)

More...

Year
From To Submit

2021 (1)

2020 (3)

2019 (14)

2018 (14)

2017 (15)

More...
Listing 1 - 10 of 449 << page
of 45
>>
Sort by

Multi
Infosec management fundamentals
Authors: ---
ISBN: 9780128041871 0128041870 0128041722 9780128041727 Year: 2015 Publisher: Amsterdam, [Netherlands] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities. Teaches ISO/IEC 27000 best practices on information security management Discusses risks and controls within the context of an overall information security management system (ISMS) Provides foundational information for experienced professionals as well as those new to the industry.


Multi
Computational frameworks
Author:
ISBN: 9780081023167 0081023162 9781785482564 1785482564 Year: 2017 Publisher: London

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computational Frameworks: Systems, Models and Applications provides an overview of advanced perspectives that bridges the gap between frontline research and practical efforts. It is unique in showing the interdisciplinary nature of this area and the way in which it interacts with emerging technologies and techniques. As computational systems are a dominating part of daily lives and a required support for most of the engineering sciences, this book explores their usage (e.g. big data, high performance clusters, databases and information systems, integrated and embedded hardware/software components, smart devices, mobile and pervasive networks, cyber physical systems, etc.).


Multi
Hardware security : a hands-on learning approach
Authors: ---
ISBN: 9780128124789 0128124784 0128124776 9780128124772 Year: 2019 Publisher: Cambridge, Massachusetts : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org.


Multi
Model engineering for simulation
Authors: --- ---
ISBN: 9780128135440 0128135441 0128135433 9780128135433 Year: 2019 Publisher: London, United Kingdom

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Internet studies : past, present and future directions
Author:
ISBN: 9781409446415 9781409446422 9781409473879 1409446425 1409446417 1409473872 1317113624 1317113616 1785390627 9781315589572 9781317113607 9781317113614 1315589575 9781317113621 9781785390623 Year: 2014 Publisher: Surrey, England ; Burlington, Vermont : Ashgate,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A comprehensive overview of the field, Internet Studies considers key issues of social importance that the study of the Internet draws upon. At the same time, it examines the role of the Internet in social research and the development of highly interdisciplinary and rapidly developing Internet research. Hence, this volume maps out areas of certainty and uncertainty in the study of the Internet and, as such, it will be of interest to scholars and students of media and communication, sociology and social research methods.

Geoscience after IT
Author:
ISBN: 9780080436722 0080436722 1281045993 9781281045997 9786611045999 6611045996 0080532519 9780080532516 Year: 2000 Publisher: New York Pergamon

Loading...
Export citation

Choose an application

Bookmark

Abstract

Most geoscientists are aware of recent IT developments, but cannot spend time on obscure technicalities. Few have considered their implications for the science as a whole. Yet the information industry is moving fast: electronic delivery of hyperlinked multimedia; standards to support interdisciplinary and geographic integration; new models to represent and visualize our concepts, and control and manage our activities; plummeting costs that force the pace. To stay on course, the scientist needs a broad appreciation of the complex and profound interactions of geoscience and IT, not previousl

InfoSec career hacking
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not


Book
Essential Mathcad for engineering, science, and math ISE
Author:
ISBN: 9780123747839 012374783X 1282168339 008091229X 9786612168338 6612168331 9781282168336 Year: 2009 Publisher: Amsterdam Burlington, MA Elsevier Academic Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Using the author's considerable experience of applying Mathcad to engineering problems, Essential Mathcad introduces the most powerful functions and features of the software and teaches how to apply these to create comprehensive calculations for any quantitative subject. The simple, step-by-step approach makes this book an ideal Mathcad text for professional engineers as well as engineering , science, and math students. Examples from a variety of fields demonstrate the power and utility of Mathcad's tools, while also demonstrating how other software, such as Excel spreadsheets, can be incorpor


Book
The basics of cyber safety
Authors: ---
ISBN: 9780124166394 0124166393 0124166504 9780124166509 Year: 2017 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online. Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe

Listing 1 - 10 of 449 << page
of 45
>>
Sort by