Narrow your search

Library

KU Leuven (2775)

VIVES (2673)

Thomas More Mechelen (2666)

Odisee (2665)

Thomas More Kempen (2663)

UCLL (2661)

ULiège (2555)

ULB (2429)

UGent (1626)

KBC (928)

More...

Resource type

book (3010)

periodical (56)

dissertation (4)


Language

English (3014)

German (19)

French (16)

Dutch (9)

Indonesian (2)

More...

Year
From To Submit

2023 (51)

2022 (147)

2021 (145)

2020 (234)

2019 (256)

More...
Listing 1 - 10 of 3067 << page
of 307
>>
Sort by

Book
AI IN THE AGE OF CYBER-DISORDER : Actors, Trends, and Prospects
Author:
Year: 2022 Publisher: Milano, Italy : Ledizioni-Ledipublishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The rise of Artificial Intelligence applications is accelerating the pace and magnitude of the political, securitarian, and ethical challenges we are now struggling to manage in cyberspace and beyond. So far, the relationship between Artificial Intelligence and cyberspace has been investigated mostly in terms of the effects that AI could have on the digital domain, and thus on our societies. What has been explored less is the opposite relationship, namely, how the cyberspace geopolitics can affect AI. Yet, AI applications have so far suffered from growing unrest, disorder, and lack of normative solutions in cyberspace. As such, from algorithm biases, to surveillance and offensive applications, AI could accelerate multiple growing threats and challenges in and through cyberspace. This report by ISPI and The Brookings Institution is an effort to shed light on this less studied, but extremely relevant, relationship.


Book
Routledge handbook of international cybersecurity
Authors: --- ---
ISBN: 1351038907 1351038885 Year: 2020 Publisher: Taylor & Francis

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.


Book
Central Bank Digital Currencies and the Global Financial System : Theory and Practice.
Authors: --- ---
ISBN: 3110982390 Year: 2023 Publisher: Berlin/Boston : Walter de Gruyter GmbH,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Central Bank Digital Currencies and Global Financial System: Theory and Practice is the perfect book for anyone interested in the impact of digital currencies on the global financial system, providing valuable insights and analysis on the topic. The topic of central bank digital currencies (CBDCs) is particularly relevant in 2023 because the use of digital currencies is rapidly growing around the world, and many central banks are exploring the idea of developing their own CBDCs. This book offers readers an opportunity to gain a better understanding of CBDCs, including their history, differences with cryptocurrencies, and the potential impact of CBDCs on the future of the financial system. The book’s didactic approach breaks down complex topics into easily digestible chapters, allowing readers to easily understand and follow the progression of digital currencies. For those interested in the future of digital currencies, the book offers a chapter on future research directions and concluding remarks. Central Bank Digital Currencies and Global Financial System: Theory and Practice is a must-read for anyone interested in the intersection of finance and technology. By exploring the evolution of digital currencies and their impact on the global financial system, this book provides valuable insights for policymakers, financial professionals, and anyone looking to understand the future of money.


Book
World Environmental and Water Resources Congress 2020 : Emerging and Innovative Technologies and International Perspectives
Authors: --- ---
ISBN: 1523133716 0784482942 Year: 2020 Publisher: Reston, Virginia : ASCE : Environmental & Water Resources Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Selected papers from the World Environmental and Water Resources Congress 2020, held in Henderson, Nevada, May 17–21, 2020. Sponsored by the Environmental and Water Resources Institute of ASCE.This collection contains8 peer-reviewed papers on emerging and innovative technologies in water and environmental engineering.Topics include: cybersecurity and urban water infrastructure; smart technologies and water, wastewater, and stormwater; and international issues in water management.This proceedings will be of interest to practitioners and researchers in all areas of water resources engineering.


Book
IT-Sicherheit : Eine Einführung
Author:
ISBN: 3110492083 311049485X Year: 2018 Publisher: Berlin ; Boston : De Gruyter Oldenbourg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Noch vor wenigen Jahren war die IT-Sicherheit eher ein Randgebiet, doch inzwischen ist sie in der Informatik, in Unternehmen und auch im Alltagsleben allgegenwärtig. Immer mehr Menschen wird bewusst, dass sie nicht nur gläsern geworden sind, sondern dass sie selbst oder ihr Unternehmen, in dem sie arbeiten, von Bedrohungen ganz konkret gefährdet sind. Schadsoftware verschlüsselt unerwartet alle erreichbaren Daten und erpresst Lösegeld. Firmen werden massiv geschädigt oder gar insolvent, weil ihre Geschäftsgeheimnisse von der Konkurrenz gestohlen werden. Sogar Menschenleben stehen auf dem Spiel, wenn Energieversorger oder Krankenhäuser wegen eines Hackerangriffs funktionsunfähig werden. Ob es sich um die Entwicklung von Software handelt, um die Konfiguration von Netzwerken, Servern und Clients oder mittlerweile auch um Embedded Systems in Fahrzeugen oder der Unterhaltungselektronik - überall sind Kenntnisse der IT-Sicherheit gefragt. Gleichzeitig ist die IT-Sicherheit keine einfache Disziplin: Es kommen in großem Umfang kryptografische Verfahren zum Einsatz, die auf fortgeschrittenen mathematischen Grundlagen beruhen. Ferner spielen außer technischen Belangen und ihren komplexen Zusammenhängen auch rechtliche und Management-Aspekte eine Rolle. Genauso unterschiedlich werden die Vorkenntnisse sein, die Leser mitbringen und die Erwartungen, die sie hegen. Dieses Werk soll Studierenden der Informatik und verwandter Disziplinen helfen, ein grundlegendes Verständnis für die IT-Sicherheit und deren Bedeutung zu entwickeln. Es werden möglichst wenige mathematisch-technische Vorkenntnisse vorausgesetzt, so dass auch Studierende im Informatik-Grundstudium sowie technisch interessierte Studierende der Wirtschaftsinformatik, des Wirtschaftsingenieurwesens oder auch der Betriebswirtschaft davon profitieren sollten. Zu den einzelnen Kapiteln werden Übungsaufgaben gestellt, deren Lösungen im Anhang zu finden sind. Diese machen das Werk besonders geeignet für das Selbststudium. Inhalt: - Grundlagen und Motivation - Kryptologie und ihre Anwendung: Verschlüsselung, Digitale Signatur, Steganographie - Verfügbarkeit - Internetsicherheit und Schadsoftware - Firewalls - Sicherheit im Internet der Dinge


Book
Protecting industrial control systems from electronic threats
Authors: ---
ISBN: 1283895919 Year: 2010 Publisher: [New York, N.Y.] (222 East 46th Street, New York, NY 10017) : Momentum Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

From manufacturing to chemical and petroleum processing to municipal utilities, you will find an industrial control system at the heart of these industries. Yet they were rarely designed to be secure from tampering or other threats. They were designed to be practical--to permit instant access by the operator to the control system. Learn about serious electronic threats and the all-too-common lack of security in industrial control systems. You will learn about the differences between enterprise IT security and industrial control security. And you will learn about functional security--a set of practices adapted from the world's industrial safety standards.


Dissertation
Stratégie digitale de commercialisation d'une nouvelle solution de cyber-sécurité sur le secteur industriel
Authors: --- --- --- ---
Year: 2017 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

This thesis has been written as a consultancy report for the company NRB. Based on a literature review and digital marketing concepts, this project-dissertation develops a digital strategy for one of the cyber-security solution of the company on the industrial sector. This strategy meets the business and marketing objectives of NRB. In the future, the strategy can be used as a roadmap to help the marketing department to support the buying process. Therefore, three distinct sections will be studied.&#13;The literature review starts with a discussion about the evolution of the business-to-business buying process through the digital revolution followed by the role of marketing in the buying process. Then, a study is conducted to analyze how the digital marketing and more specifically the social networks can support the marketing during the customer journey.&#13;The next section is composed of several chapters related to a pre-project study essential to the development of a relevant digital marketing strategy. First, a chapter is dedicated to an intern audit of the marketing department at NRB. Then, the portfolio cyber-security of NRB and its new solution called "Security Operation Center" is detailed. The third chapter is committed to the functioning of the industrial sector. Finally, an analyze of the pre-prospection process for the cyber-security solution and the results is conducted. &#13;In the last section, the digital marketing strategy is elaborated. It will begin by setting out the objectives and how the strategy will be formulated in terms of targets, messages and budgets. Then, the implementation of the strategy is detailed followed by the key indicators performance. The last chapter is a demonstration of how the management problem has been deal with a link to business ethics and sustainable development.&#13;The project-thesis is concluded with some personal recommendations and conclusions.


Periodical
Internet policy review.
Author:
ISSN: 21976775 Year: 2012 Publisher: Berlin : Alexander von Humboldt Institute for Internet and Society


Periodical
The journal of digital forensics, security and law : JDFSL.
Author:
ISSN: 15587215 15587223 Year: 2006 Publisher: Farmville, VA : Association of Digital Forensics, Security and Law,


Periodical
Journal of information security.
ISSN: 21531242 21531234 Year: 2010 Publisher: Irvine, Calif. : Scientific Research Pub.

Listing 1 - 10 of 3067 << page
of 307
>>
Sort by