|
|
|
|
| André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).
André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.
He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 37
reviews
|
|
|
|
|
|
|
|
Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)
A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state...
|
Jul 16 2020 |
|
|
|
|
|
|
Asset attack vectors: building effective vulnerability management strategies to protect organizations Haber M., Hibbert B., Apress, New York, NY, 2018. 371 pp. Type: Book (978-1-484236-26-0)
Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters....
|
Jan 22 2019 |
|
|
|
|
|
|
Smart cards, tokens, security and applications (2nd ed.) Mayes K., Markantonakis K., Springer International Publishing, New York, NY, 2017. 531 pp. Type: Book (978-3-319504-98-8)
This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application development, roll out, and life ...
|
Nov 21 2018 |
|
|
|
|
|
|
Systematically understanding the cyber attack business: a survey Huang K., Siegel M., Madnick S. ACM Computing Surveys 51(4): 1-36, 2018. Type: Article
Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to find the 24 key activities or p...
|
Oct 19 2018 |
|
|
|
|
|
|
Deception in the digital age: exploiting and defending human targets through computer-mediated communications Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (2 of 4)
The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...
|
Jul 12 2018 |
|
|
|
|
|
|
Cyber security engineering: a practical approach for systems and software assurance Mead N., Woody C., Addison Wesley Professional, Boston, MA, 2017. 384 pp. Type: Book (0134189809)
As the subtitle claims, this book offers a practical approach to cyber security engineering. It does not introduce yet another set of methodologies; instead, it attempts to give guidance on how to use all of the existing information in...
|
Aug 11 2017 |
|
|
|
|
|
|
Becoming a global chief security executive officer: a how to guide for next generation security leaders Cloutier R., Butterworth-Heinemann, Newton, MA, 2016. 392 pp. Type: Book
For many years, a recurring topic in security conference talks and articles has been how to sell security to businesses. There are parallels with the earlier business-IT alignment discussions. In both cases, I would argue that it is no...
|
Apr 25 2017 |
|
|
|
|
|
|
Penetration testing basics: a quick-start guide to breaking into systems Messier R., Apress, New York, NY, 2016. 114 pp. Type: Book (978-1-484218-56-3), Reviews: (1 of 2)
Penetration testing basics is a small book, about 110 pages, that intends to give readers a quick start with penetration testing, in seven chapters....
|
Jan 18 2017 |
|
|
|
|
|
|
Cybersecurity investments: decision support under economic aspects Beissel S., Springer International Publishing, New York, NY, 2016. 281 pp. Type: Book (978-3-319304-58-8)
After the introduction to the book in chapter 1 (five pages), chapter 2 (28 pages) looks at the foundations of cybersecurity in a broad but shallow way. Almost inevitably, this approach leads to imprecise statements, like mixing author...
|
Sep 12 2016 |
|
|
|
|
|
|
The cloud security ecosystem: technical, legal, business and management issues Ko R., Choo R., Syngress Publishing, Waltham, MA, 2015. 570 pp. Type: Book (978-0-128015-95-7), Reviews: (2 of 2)
This is a collection of 22 chapters related to the cloud. Chapter 1 is an introduction, and the others are divided in four parts in a plan-do-check-act framework. Every chapter is a self-contained paper. The parts are labeled, R...
|
Nov 30 2015 |
|
|
|
|
|
|
|
|
|
|
|