Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Marien, Andre
K.U.Leuven
Leuven, Belgium
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).

André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.

He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.

 
 
Options:
Date Reviewed  
 
1
- 10 of 75 reviews

   
  Cyber Security: Power and Technology
Lehto M., Neittaanmaki P., Springer, Switzerland, 2018. 288 pp.  Type: Book (978-3-319753-06-5)

The book is split into two parts: “Cyber Power” (110 pages) and “Cyber Security Technology” (160 pages). They are very different in nature, likely appealing to two separate audiences....

Feb 22 2022  
   The art of immutable architecture
Perry M., Apress, New York, NY, 2020. 444 pp.  Type: Book (978-1-484259-54-2)

Here is a crazy idea: imagine an information technology (IT) solution where the only persistent memory is write-once, read-many (WORM), or a database without update and delete commands. This book claims such immutable data stores form ...

Aug 19 2021  
   An army of me: sockpuppets in online discussion communities
Kumar S., Cheng J., Leskovec J., Subrahmanian V.  WWW 2017 (Proceedings of the 26th International World Wide Web Conference, Perth, Australia, Apr 3-7, 2017) 857-866, 2017.  Type: Proceedings

Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on pla...

Jun 21 2021  
  Beginning Perl programming: from novice to professional
Rothwell W., Apress, New York, NY, 2019. 224 pp.  Type: Book (978-1-484250-54-9), Reviews: (1 of 2)

Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, i...

Oct 22 2020  
   Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp.  Type: Book (978-3-658256-51-7)

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state...

Jul 16 2020  
  Coming of age: a longitudinal study of TLS deployment
Kotzias P., Razaghpanah A., Amann J., Paterson K., Vallina-Rodriguez N., Caballero J.  IMC 2018 (Proceedings of the 2018 Internet Measurement Conference, Boston, MA, Oct 31-Nov 2, 2018) 415-428, 2018.  Type: Proceedings

The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS parameters used for negotiations as we...

Jan 28 2019  
   Asset attack vectors: building effective vulnerability management strategies to protect organizations
Haber M., Hibbert B., Apress, New York, NY, 2018. 371 pp.  Type: Book (978-1-484236-26-0)

Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters....

Jan 22 2019  
   Smart cards, tokens, security and applications (2nd ed.)
Mayes K., Markantonakis K., Springer International Publishing, New York, NY, 2017. 531 pp.  Type: Book (978-3-319504-98-8)

This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application development, roll out, and life ...

Nov 21 2018  
   Systematically understanding the cyber attack business: a survey
Huang K., Siegel M., Madnick S. ACM Computing Surveys 51(4): 1-36, 2018.  Type: Article

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to find the 24 key activities or p...

Oct 19 2018  
   Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (2 of 4)

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...

Jul 12 2018  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy