|
|
|
|
| André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).
André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.
He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 75
reviews
|
|
|
|
|
|
|
|
Cyber Security: Power and Technology Lehto M., Neittaanmaki P., Springer, Switzerland, 2018. 288 pp. Type: Book (978-3-319753-06-5) The book is split into two parts: “Cyber Power” (110 pages) and “Cyber Security Technology” (160 pages). They are very different in nature, likely appealing to two separate audiences....
|
Feb 22 2022 |
|
|
|
|
|
|
The art of immutable architecture Perry M., Apress, New York, NY, 2020. 444 pp. Type: Book (978-1-484259-54-2)
Here is a crazy idea: imagine an information technology (IT) solution where the only persistent memory is write-once, read-many (WORM), or a database without update and delete commands. This book claims such immutable data stores form ...
|
Aug 19 2021 |
|
|
|
|
|
|
An army of me: sockpuppets in online discussion communities Kumar S., Cheng J., Leskovec J., Subrahmanian V. WWW 2017 (Proceedings of the 26th International World Wide Web Conference, Perth, Australia, Apr 3-7, 2017) 857-866, 2017. Type: Proceedings
Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on pla...
|
Jun 21 2021 |
|
|
|
|
|
|
Beginning Perl programming: from novice to professional Rothwell W., Apress, New York, NY, 2019. 224 pp. Type: Book (978-1-484250-54-9), Reviews: (1 of 2)
Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, i...
|
Oct 22 2020 |
|
|
|
|
|
|
Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)
A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state...
|
Jul 16 2020 |
|
|
|
|
|
|
Coming of age: a longitudinal study of TLS deployment Kotzias P., Razaghpanah A., Amann J., Paterson K., Vallina-Rodriguez N., Caballero J. IMC 2018 (Proceedings of the 2018 Internet Measurement Conference, Boston, MA, Oct 31-Nov 2, 2018) 415-428, 2018. Type: Proceedings
The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS parameters used for negotiations as we...
|
Jan 28 2019 |
|
|
|
|
|
|
Asset attack vectors: building effective vulnerability management strategies to protect organizations Haber M., Hibbert B., Apress, New York, NY, 2018. 371 pp. Type: Book (978-1-484236-26-0)
Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters....
|
Jan 22 2019 |
|
|
|
|
|
|
Smart cards, tokens, security and applications (2nd ed.) Mayes K., Markantonakis K., Springer International Publishing, New York, NY, 2017. 531 pp. Type: Book (978-3-319504-98-8)
This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application development, roll out, and life ...
|
Nov 21 2018 |
|
|
|
|
|
|
Systematically understanding the cyber attack business: a survey Huang K., Siegel M., Madnick S. ACM Computing Surveys 51(4): 1-36, 2018. Type: Article
Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to find the 24 key activities or p...
|
Oct 19 2018 |
|
|
|
|
|
|
Deception in the digital age: exploiting and defending human targets through computer-mediated communications Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (2 of 4)
The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...
|
Jul 12 2018 |
|
|
|
|
|
|
|
|
|
|
|