Narrow your search

Library

KU Leuven (10)

ULiège (6)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

VIVES (5)

FARO (1)

KBR (1)

More...

Resource type

book (12)


Language

English (12)


Year
From To Submit

2022 (1)

2021 (4)

2020 (1)

2018 (1)

2016 (1)

More...
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
Cybersecurity
Author:
ISBN: 0262365448 9780262365444 9780262542548 0262542544 Year: 2021 Publisher: Cambridge, Massachusetts The MIT Press


Book
Viruses as Complex Adaptive Systems
Authors: ---
ISBN: 0691185115 Year: 2018 Publisher: Princeton, NJ : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

How complex systems theory sheds new light on the adaptive dynamics of viral populationsViruses are everywhere, infecting all sorts of living organisms, from the tiniest bacteria to the largest mammals. Many are harmful parasites, but viruses also play a major role as drivers of our evolution as a species and are essential regulators of the composition and complexity of ecosystems on a global scale. This concise book draws on complex systems theory to provide a fresh look at viral origins, populations, and evolution, and the coevolutionary dynamics of viruses and their hosts.New viruses continue to emerge that threaten people, crops, and farm animals. Viruses constantly evade our immune systems, and antiviral therapies and vaccination campaigns can be powerless against them. These unique characteristics of virus biology are a consequence of their tremendous evolutionary potential, which enables viruses to quickly adapt to any environmental challenge. Ricard Solé and Santiago Elena present a unified framework for understanding viruses as complex adaptive systems. They show how the application of complex systems theory to viral dynamics has provided new insights into the development of AIDS in patients infected with HIV-1, the emergence of new antigenic variants of the influenza A virus, and other cutting-edge advances.Essential reading for biologists, physicists, and mathematicians interested in complexity, Viruses as Complex Adaptive Systems also extends the analogy of viruses to the evolution of other replicators such as computer viruses, cancer, and languages.


Book
Security engineering : a guide to building dependable distributed systems
Author:
ISBN: 9781119642787 1119642787 Year: 2020 Publisher: Indianapolis, Indiana John Wiley & Sons, Inc.

Loading...
Export citation

Choose an application

Bookmark

Abstract

In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?


Book
Nonlinear Functional Analysis and Its Applications
Author:
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book consists of nine papers covering a number of basic ideas, concepts, and methods of nonlinear analysis, as well as some current research problems. Thus, the reader is introduced to the fascinating theory around Brouwer's fixed point theorem, to Granas' theory of topological transversality, and to some advanced techniques of critical point theory and fixed point theory. Other topics include discontinuous differential equations, new results of metric fixed point theory, robust tracker design problems for various classes of nonlinear systems, and periodic solutions in computer virus propagation models.


Book
Nonlinear Functional Analysis and Its Applications
Author:
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book consists of nine papers covering a number of basic ideas, concepts, and methods of nonlinear analysis, as well as some current research problems. Thus, the reader is introduced to the fascinating theory around Brouwer's fixed point theorem, to Granas' theory of topological transversality, and to some advanced techniques of critical point theory and fixed point theory. Other topics include discontinuous differential equations, new results of metric fixed point theory, robust tracker design problems for various classes of nonlinear systems, and periodic solutions in computer virus propagation models.


Book
Nonlinear Functional Analysis and Its Applications
Author:
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book consists of nine papers covering a number of basic ideas, concepts, and methods of nonlinear analysis, as well as some current research problems. Thus, the reader is introduced to the fascinating theory around Brouwer's fixed point theorem, to Granas' theory of topological transversality, and to some advanced techniques of critical point theory and fixed point theory. Other topics include discontinuous differential equations, new results of metric fixed point theory, robust tracker design problems for various classes of nonlinear systems, and periodic solutions in computer virus propagation models.


Book
Secure System Design and Trustable Computing
Authors: ---
ISBN: 3319149709 3319149717 9783319149707 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Keywords

Electrical Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Embedded computer systems --- Computer security. --- Data encryption (Computer science) --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Embedded systems (Computer systems) --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Electronics and Microelectronics, Instrumentation. --- Data protection --- Security systems --- Hacking --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Construction --- Industrial arts --- Technology --- Computer security --- Cryptography --- Architecture Analysis and Design Language --- Systems engineering. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer


Book
The internet is not what you think it is : a history, a philosophy, a warning
Author:
ISBN: 9780691229683 0691229686 Year: 2022 Publisher: Princeton, New Jersey : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it--and explains why they have died today. Many think of the internet as an unprecedented and overwhelmingly positive achievement of modern human technology. But is it? In The Internet Is Not What You Think It Is, Justin Smith offers an original deep history of the internet, from the ancient to the modern world--uncovering its surprising origins in nature and centuries-old dreams of radically improving human life by outsourcing thinking to machines and communicating across vast distances. Yet, despite the internet's continuing potential, Smith argues, the utopian hopes behind it have finally died today, killed by the harsh realities of social media, the global information economy, and the attention-destroying nature of networked technology. Ranging over centuries of the history and philosophy of science and technology, Smith shows how the "internet" has been with us much longer than we usually think. He draws fascinating connections between internet user experience, artificial intelligence, the invention of the printing press, communication between trees, and the origins of computing in the machine-driven looms of the silk industry. At the same time, he reveals how the internet's organic structure and development root it in the natural world in unexpected ways that challenge efforts to draw an easy line between technology and nature. Combining the sweep of intellectual history with the incisiveness of philosophy, The Internet Is Not What You Think It Is cuts through our daily digital lives to give a clear-sighted picture of what the internet is, where it came from, and where it might be taking us in the coming decades.

Keywords

Internet. --- Technology --- Technology and civilization. --- Civilization and machinery --- Civilization and technology --- Machinery and civilization --- Civilization --- Social history --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Social aspects. --- Philosophy --- Abstraction. --- Analogy. --- Analytical Engine. --- Anthropomorphism. --- Antithesis. --- Artificial general intelligence. --- Artificial intelligence. --- Artificial language. --- Artificial life. --- Artificial stupidity. --- Artificiality. --- Attention deficit hyperactivity disorder. --- Automaton. --- Binary code. --- Bullying. --- Caricature. --- Causality. --- Columnist. --- Computer science. --- Computer virus. --- Computer. --- Computing. --- Consciousness. --- Conspiracy theory. --- Controversy. --- Copyright. --- Counterfeit. --- Criticism. --- Curtailment. --- Cyberculture. --- Cybernetics. --- Declamation. --- Detriment (astrology). --- Dichotomy. --- Disputation. --- Distraction. --- Doubt. --- Dystopia. --- Evocation. --- Explanation. --- External storage. --- Fantasy literature. --- Fungus. --- Heresy. --- Hypothesis. --- Imposition. --- Indictment. --- Information overload. --- Information revolution. --- Instance (computer science). --- Intellectual property. --- Internet troll. --- Irony. --- Lie. --- LinkedIn. --- Materialism. --- Naked eye. --- Negation. --- Obesity. --- Ontology (information science). --- Opportunism. --- Outsourcing. --- Overlay network. --- Perception. --- Perversion. --- Pessimism. --- Philosophy. --- Police brutality in the United States. --- Police brutality. --- Printing. --- Processing (programming language). --- Protest. --- Punched card. --- Racism. --- Radicalization. --- Reason. --- Resentment. --- Robbery. --- Scarcity (social psychology). --- Sentience. --- Simulation hypothesis. --- Simulation. --- Slang. --- Slavery. --- Slime mold. --- State of nature. --- Subject (philosophy). --- Syllogism. --- Technology. --- Telecommunication. --- Terminology. --- Theory. --- Thought. --- Tinder (app). --- Twitter. --- Uncertainty. --- Understanding. --- Vandalism. --- Virtual world. --- Writing. --- Internet --- Artificial intelligence --- history. --- History. --- PHILOSOPHY / Ethics & Moral Philosophy. --- PHILOSOPHY / History & Surveys / Modern. --- PHILOSOPHY / Social. --- COMPUTERS / Internet / Online Safety & Privacy. --- COMPUTERS / Internet / Social Media.

Implementing secure heaalthcare telematics applications in Europe
Author:
ISSN: 09269630 ISBN: 9051994893 9789051994896 Year: 2001 Volume: 66 Publisher: Ohmsha Ios Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Medical telematics --- Data protection --- Telecommunication in medicine --- Computer Communication Networks. --- Computer Security. --- Telemedicine. --- Medical Records Systems, Computerized. --- -Medical telematics --- -Telecommunication in medicine --- -Telecare (Medicine) --- Telemedicine --- Medicine --- Clinical telematics --- Health telematics --- Telehealth --- Medical informatics --- Telematics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- Forms and Records Control --- Mobile Health --- eHealth --- mHealth --- Health, Mobile --- Telemetry --- Compromising of Data --- Computer Hackers --- Computer Worms --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Telecommunications --- Education, Distance --- Europe. --- Northern Europe --- Southern Europe --- Western Europe --- Cyber Security --- Cybersecurity --- Data Encryption --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Security, Cyber --- -Europe. --- Computer Communication Networks --- Computer Security --- Medical Records Systems, Computerized --- Telecare (Medicine) --- Europe --- Security measures --- Medical records --- Access control --- Tele-ICU --- Tele-Intensive Care --- Tele-Referral --- Virtual Medicine --- Medicine, Virtual --- Tele ICU --- Tele Intensive Care --- Tele Referral --- Tele-Referrals --- Medical telematics - Europe. --- Data protection - Europe. --- Telecommunication in medicine - Europe.


Book
Security and privacy for implantable medical devices
Authors: ---
ISBN: 1461416736 1461416744 9781461416739 Year: 2014 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

 This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs.   ·         Describes problems of security and privacy in implantable medical devices and proposes technological solutions; ·         Includes basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures;  ·         Provides state-of-the-art research of interest to a multidisciplinary audience in electrical, computer and bioengineering, computer networks and cryptography and medical and health sciences.                        .

Keywords

Engineering. --- Data encryption (Computer science) --- Systems engineering. --- Biomedical engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Clinical engineering --- Medical engineering --- Engineering systems --- System engineering --- Construction --- Design and construction --- Data encryption (Computer science). --- Electronic circuits. --- Circuits and Systems. --- Data Encryption. --- Biomedical Engineering. --- Engineering --- Industrial engineering --- System analysis --- Computer security --- Cryptography --- Bioengineering --- Biophysics --- Medicine --- Industrial arts --- Technology --- Cryptology. --- Biomedical Engineering and Bioengineering. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Implants, Artificial --- Biomedical engineering --- Confidential communications --- Prostheses and Implants --- Computer Security --- Confidentiality --- Privacy --- Biomedical Technology --- Biomedical Technologies --- Technology, Biomedical --- Technology, Health --- Technology, Health Care --- Health Care Technology --- Health Technology --- Biomedical Engineering --- Medical Informatics --- PL 93-579 --- PL93-579 --- Privacy Act --- Public Law 93-579 --- Act, Privacy --- Law 93-579, Public --- PL 93 579 --- PL93 579 --- Public Law 93 579 --- Confidential Information --- Secrecy --- Patient Data Privacy --- Privacy of Patient Data --- Privileged Communication --- Communication, Privileged --- Communications, Privileged --- Data Privacy, Patient --- Information, Confidential --- Privacy, Patient Data --- Privileged Communications --- Duty to Warn --- Disclosure --- Anonymous Testing --- Parental Notification --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Endoprostheses --- Endoprosthesis --- Prostheses --- Prosthetic Implants --- Prosthesis --- Artificial Implant --- Artificial Implants --- Implant, Artificial --- Implant, Prosthetic --- Implants and Prostheses --- Implants, Prosthetic --- Prosthetic Implant --- Prosthesis Retention --- Communications, Confidential --- Confidential relationships --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Privacy, Right of --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Artificial implants --- Implants, Surgical --- Surgical implants --- Biomedical materials --- Surgery --- Law and legislation --- Protection --- Security measures --- Implants, Artificial. --- Computer security.

Listing 1 - 10 of 12 << page
of 2
>>
Sort by