Narrow your search

Library

LUCA School of Arts (1228)

Odisee (1228)

Thomas More Kempen (1228)

Thomas More Mechelen (1228)

UCLL (1228)

VIVES (1228)

VUB (831)

KU Leuven (712)

Vlerick Business School (584)

UGent (533)

More...

Resource type

book (1178)

periodical (50)

digital (32)


Language

English (1205)

German (9)

Italian (3)

Indonesian (2)

Chinese (1)

More...

Year
From To Submit

2023 (7)

2022 (14)

2021 (21)

2020 (46)

2019 (39)

More...
Listing 1 - 10 of 1228 << page
of 123
>>
Sort by

Book
Industrial automation and control system security principles
Author:
ISBN: 1941546080 9781941546086 1937560635 Year: 2013 Publisher: Research Triangle Park, NC

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Handbook of loss prevention and crime prevention
Author:
ISBN: 0128172738 012816459X 9780128164594 9780128172735 Year: 2020 Publisher: Oxford, England ; Cambridge, Massachusetts : Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Hospital and healthcare security
Author:
ISBN: 1281014788 9786611014780 0080495281 9780080495286 0750698926 9781281014788 6611014780 Year: 2001 Publisher: Boston : Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hospital and Healthcare Security, Fourth edition, is a complete resource for healthcare protection planning and programming. The book offers thorough and fully updated coverage of the primary health and security issues hospitals and healthcare agencies face including infant protection and security, animal and research laboratory security, hospital watch programs, and the relationship between hospital security and law enforcement.Written primarily for use by the healthcare protection administrator, it also serves as a reference for any hospital security officer, supervisor or administra

Secure communicating systems : design, analysis, and implementation
Author:
ISBN: 1107124484 128041927X 9786610419272 1139164872 0511174837 0511041888 0511154917 0511303750 0511044429 9780511041884 9780521807319 052180731X 9781139164870 9780511044427 0511029136 9780511029134 9781107124486 6610419272 9780511174834 9780511154911 9780511303753 9780521001885 0521001889 Year: 2001 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.


Book
Cyber defence in Industry 4.0 systems and related logistics and IT infrastructures
Author:
ISBN: 1614998884 9781614998884 9781614998877 Year: 2018 Publisher: Amsterdam ; Berlin ; Washington, DC : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Building RESTful Web services with Go : learn how to build powerful RESTful APIs with Golang that scale gracefully
Author:
ISBN: 1788291085 9781788291088 Year: 2017 Publisher: Birmingham, England : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Explore the necessary concepts of REST API development by building few real world services from scratch. About This Book Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service Leverage the Buffalo Framework to quickly implement RESTful endpoints Learn to implement a client library for a RESTful web service using Go Who This Book Is For This book is intended for those who want to learn to build RESTful web services with a framework like Buffalo. To make best use of the code samples included in the book, you should have a basic knowledge of Go programming. What You Will Learn Create HTTP handler and introspect the Gorilla Mux router OAuth 2 implementation with Go Build RESTFul API with go-restful, Revel.Go and Buffalo Go Create REST API with MongoDB and Go Build a working client library and unit test for REST API Debug, test, and profile RESTful APIs with each of the frameworks Optimize and scale REST API using microservices In Detail REST is an architectural style that tackles the challenges of building scalable web services and in today's connected world, APIs have taken a central role on the web. APIs provide the fabric through which systems interact, and REST has become synonymous with APIs. The depth, breadth, and ease of use of Go, makes it a breeze for developers to work with it to build robust Web APIs. This book takes you through the design of RESTful web services and leverages a framework like Buffalo Go to implement these services. The book starts with a brief introduction to REST API development and how it transformed the modern web. You will learn how to handle routing and authentication of web services along with working with middleware for internal service. The book explains how to use Go frameworks to build RESTful web services and work with MongoDB to create REST API. You will learn how to integrate Postgres SQL and JSON with a Go web service and build a client library in Go for consuming REST API. You will learn how to scale APIs using the microservice architecture and deploy the REST APIs using Nginx as a proxy server. Finally you will learn how to metricize a REST API using an API Gateway. By the end of the book you will be proficient in building RESTful APIs in Go. Style and approach This book is a step-by-step, hands-on guide to designing and building RESTful web services. Explore the necessary concepts of REST API development by building few real world servic...


Multi
Practical airport operations, safety, and emergency management
Authors: ---
ISBN: 9780128006016 0128006013 0128005157 9780128005156 Year: 2016 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Practical Airport Operations, Safety, and Emergency Management: Protocols for Today and the Future focuses on the airport itself, not the aircraft, manufacturers, designers, or even the pilots. The book explores the safety of what's been called 'the most expensive piece of pavement in any city'- the facility that operates, maintains, and ensures the safety of millions of air passengers every year. The book is organized into three helpful sections, each focusing on one of the sectors described in the title. Section One: Airport Safety, explores the airport environment, then delves into safety management systems. Section Two: Airport Operations, continues the conversation on safety management systems before outlining airside and landside operations in depth, while Section Three: Airport Emergency Management, is a careful, detailed exploration of the topic, ending with a chapter on the operational challenges airport operations managers can expect to face in the future. Written by trusted experts in the field, users will find this book to be a vital resource that provides airport operations managers and students with the information, protocols, and strategies they need to meet the unique challenges associated with running an airport.


Multi
Are we safe enough? : measuring and assessing aviation security
Authors: ---
ISBN: 9780128114766 0128114762 0128114754 9780128114759 Year: 2018 Publisher: Amsterdam, Netherlands : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Are We Safe Enough? Measuring and Assessing Aviation Security explains how standard risk analytic and cost-benefit analysis can be applied to aviation security in systematic and easy-to-understand steps. The book evaluates and puts into sensible context the risks associated with air travel, the risk appetite of airlines and regulators and the notion of acceptable risk. It does so by describing the effectiveness, risk reduction and cost of each layer of aviation security, from policing and intelligence to checkpoint passenger screening to arming pilots on the flight deck--


Multi
Security in network functions virtualization
Authors: ---
ISBN: 9780081023716 0081023715 1785482572 9781785482571 Year: 2017 Publisher: London, England ; Oxford, England : ISTE Press : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services


Book
Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantage
Author:
ISBN: 1838825509 Year: 2020 Publisher: Birmingham, England ; Mumbai : Packt,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book Description It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learn Understand the risks associated with security breaches Implement strategies for building an effective penetration testing team Map out the homefield using knowledge graphs Hunt credentials using indexing and other practical techniques Gain blue team tooling insights to enhance your red team skills Communicate results and influence decision makers with appropriate data Who this book is for This is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of thi...

Listing 1 - 10 of 1228 << page
of 123
>>
Sort by