<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<channel rdf:about="http://hdl.handle.net/123456789/600">
<title>Seguridad Informática y Criptografía</title>
<link>http://hdl.handle.net/123456789/600</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/16230"/>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/15544"/>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/15441"/>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/15440"/>
</rdf:Seq>
</items>
<dc:date>2026-04-04T01:56:47Z</dc:date>
</channel>
<item rdf:about="http://hdl.handle.net/123456789/16230">
<title>Security in an Interconnected World: A Strategic Vision for Defence Policy</title>
<link>http://hdl.handle.net/123456789/16230</link>
<description>Security in an Interconnected World: A Strategic Vision for Defence Policy
Hirsch Ballin, Ernst, ed.; Dijstelbloem, Huub, ed.; Goede, Peter de, ed.
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU is under pressure and the Dutch armed forces are gasping for breath. What is the task of Dutch security and the defence policy? There have been growing calls in the last few years to end the devastating cuts in the defence budget and to invest more in security. The acute threats and conflicts in which the Netherlands are involved have served as a wake-up call. The shooting down of Flight MH17 over Ukraine, the streams of refugees from Syria and other countries, the conflict with Da’esh in Syria and Iraq, and terrorist threats reveal how events in many of the world’s flash-points have a direct or indirect impact on the Netherlands. Conflicts in other countries have a spill-over effect in The Netherlands. This is illustrated by tensions between population groups and the clashes over the Gülen schools after the failed putsch in Turkey on 15 July 2016 and over the constitutional referendum in that country. How do we ensure that any additional funds are not divided amongst the branches of the armed forces without any sense of strategic direction? What should a future-proof security policy that plots the course of defence policy entail? What strategic analyses should lie behind the political choices that are made? This book answers these questions and offers a comprehensive framework addressing among other things human security, national security and flow security.
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/123456789/15544">
<title>The Ethics of Cybersecurity</title>
<link>http://hdl.handle.net/123456789/15544</link>
<description>The Ethics of Cybersecurity
Christen, Markus, ed.; Gordijn, Gordijn, coed.; Loi, Michele, coed. Michele (editor)
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/123456789/15441">
<title>Building the Infrastructure for Cloud Security: A Solutions View</title>
<link>http://hdl.handle.net/123456789/15441</link>
<description>Building the Infrastructure for Cloud Security: A Solutions View
YelurI, Raghuram; Castro Leon, Enrique, coaut.
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
</description>
<dc:date>2014-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/123456789/15440">
<title>Demystifying Internet of Things security : successful IoT device/edge and platform security deployment</title>
<link>http://hdl.handle.net/123456789/15440</link>
<description>Demystifying Internet of Things security : successful IoT device/edge and platform security deployment
Cheruvu, Sunil; Kumar, Anil, coaut.; Smith, Ned, coaut.; Wheeler, David M., coaut.
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
