Categorieën
![]() Systèmes informatiques -- Mesures de sûreté |
Documents disponibles dans cette catégorie (13)
![Rangschikken op](./images/orderby_az.gif)
![]()
Books
L'hygiène informatique correspond aux gestes simples que tout un chacun doit mettre en oeuvre, chaque jour, pour vivre serein dans un monde numérique et pour maintenir en pleine santé son système informatique (ordinateur, téléphone, tablette, et[...]
ISBN/ISSN/EAN: 978-2-10-086118-7 Artikel op pagina: 271 p. Descriptors : 4.20 Problèmes sociaux > Criminalité > Sécurité informatique
Indexering: 620.86 Tags: Practical guides ; Information protection (IT) ; Computer systems--Security measures Talen: Frans ![]()
Books
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google Project Zero’s most renowned researcher! Learn core components of the system in greater depth[...]
ISBN/ISSN/EAN: 978-1-71850-198-0 Artikel op pagina: 572 p. Descriptors : 4.20 Problèmes sociaux > Criminalité > Sécurité informatique
5.45 Technologie de l'information (équipements) > Système informatique > Réseau informatique
Indexering: 005.8 Tags: Microsoft Windows (Computer file) ; Computer security ; Computer networks--Security measures Talen: Engels ![]()
Articles
Gao Xinchuchu, Auteur | 2022This research seeks to unpack the development of the EU as a security actor in cyberspace. Drawing on the theoretical approach of role theory, this article shows that the EU’s role in cyberspace should be understood in relationality to the other[...]
ISBN/ISSN/EAN: 10.1080/14702436.2022.2110485 Artikel op pagina: 21p. Descriptors : 6.20 Relations internationales > Sûreté de l'État > Sécurité nationale > Cyberdéfense
Talen: Engels Source du document : Defence Studies, 2022, 22:4, pp.689-708 ![]()
Books
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and[...]
ISBN/ISSN/EAN: 978-1-03-201005-2 Artikel op pagina: 325 p. Descriptors : 5.45 Technologie de l'information (équipements) > Ordinateur
Indexering: 005.8 Tags: Computer security ; Programming Software Development ; Computers Talen: Engels ![]()
Books
After large breaches at well-known organizations including Home Depot, Capital One, Equifax, Best Buy and many others, CISOs, Cybersecurity professionals and business leaders have spent countless hours and money upgrading their cybersecurity int[...]
ISBN/ISSN/EAN: 978-1-119-80955-5 Artikel op pagina: XXII, 458 p. Descriptors : Indexering: 005.8 Talen: Engels ![]()
Disks
Research & technology organisation | Bruxelles [Belgique] : North Atlantic Treaty Organization (NATO) | STO-TR HFM, num. 259 | 2020This report describes the efforts of the NATO STO HFM 259 RTG team to make sense of howhuman factors contribute to the enhancement of cyber security. In a systematic approach, aframework for the understanding of actors and factors involved in cy[...]
ISBN/ISSN/EAN: 978-92-837-2272-4 Descriptors : Talen: Engels ![]()
Disks
Research & technology organisation | Bruxelles [Belgique] : North Atlantic Treaty Organization (NATO) | STO-TR IST, num. 118 | 2020This report provides concrete recommendations, based on systematic testing and evaluation, for Tactical Level application of a subset of the Service Oriented Architecture (SOA) based HeadQuarter (HQ)-level core services from the NATO C3 Taxono[...]
ISBN/ISSN/EAN: 978-92-837-2232-5 Descriptors : Talen: Engels ![]()
Books
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of stati[...]
ISBN/ISSN/EAN: 978-0-12-804452-0 Artikel op pagina: XI, 188 p. Descriptors : Indexering: 005.820151 Tags: Computer security--Mathematics Talen: Engels ![]()
Books
"A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques[...]
ISBN/ISSN/EAN: 978-1-119-08529-4 Artikel op pagina: XV, 280 p. Descriptors : 6.20 Relations internationales > Sûreté de l'État > Sécurité nationale > Cyberdéfense
Indexering: 658.478 Tags: Cyberterrorism ; Cyberspace--Security measures ; Risk management Talen: Engels ![]()
Books
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world.[...]
ISBN/ISSN/EAN: 978-1-4822-3922-5 Artikel op pagina: XVI, 347 p. Descriptors : Indexering: 363.325 900 4 Talen: Engels ![]()
Books
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally[...]
ISBN/ISSN/EAN: 978-0-19-991809-6 Artikel op pagina: VIII, 306 p. Descriptors : Indexering: 363.325 900 4 Tags: Computer security ; Computer security--United States ; Computer networks--Security measures--United States ; Cyberspace--Security measures--United States ; Cyberterrorism--United States--Prevention ; Information warfare--United States--Prevention Talen: Engels ![]()
Books
Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the re[...]
ISBN/ISSN/EAN: 978-1-62356-803-0 Artikel op pagina: XXIII, 237 p. Descriptors : Indexering: 363.325 900 4 Talen: Engels ![]()
Electronic document
With the development of the internet as a global infrastructure for business and as a new tool for politics, espionage and military activities, cybersecurity has become central topic for national and international security. The states addressed [...]
Descriptors : 6.20 Relations internationales > Sûreté de l'État > Sécurité nationale > Cyberdéfense
Tags: Cybersecurity ; Cyberwarfare ; Cyberdefense Talen: Engels