Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Marien, Andre
K.U.Leuven
Leuven, Belgium
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).

André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.

He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.

 
 
Options:
Date Reviewed  
 
1
- 10 of 37 reviews

   
   Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp.  Type: Book (978-3-658256-51-7)

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state...

Jul 16 2020  
   Asset attack vectors: building effective vulnerability management strategies to protect organizations
Haber M., Hibbert B., Apress, New York, NY, 2018. 371 pp.  Type: Book (978-1-484236-26-0)

Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters....

Jan 22 2019  
   Smart cards, tokens, security and applications (2nd ed.)
Mayes K., Markantonakis K., Springer International Publishing, New York, NY, 2017. 531 pp.  Type: Book (978-3-319504-98-8)

This edited book is divided into 18 chapters. Chapter 1 defines the concepts of smart cards, chips, and tamper resistance, and introduces issuer control and the main smart card applications, application development, roll out, and life ...

Nov 21 2018  
   Systematically understanding the cyber attack business: a survey
Huang K., Siegel M., Madnick S. ACM Computing Surveys 51(4): 1-36, 2018.  Type: Article

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to find the 24 key activities or p...

Oct 19 2018  
   Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (2 of 4)

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...

Jul 12 2018  
   Cyber security engineering: a practical approach for systems and software assurance
Mead N., Woody C., Addison Wesley Professional, Boston, MA, 2017. 384 pp.  Type: Book (0134189809)

As the subtitle claims, this book offers a practical approach to cyber security engineering. It does not introduce yet another set of methodologies; instead, it attempts to give guidance on how to use all of the existing information in...

Aug 11 2017  
   Becoming a global chief security executive officer: a how to guide for next generation security leaders
Cloutier R., Butterworth-Heinemann, Newton, MA, 2016. 392 pp.  Type: Book

For many years, a recurring topic in security conference talks and articles has been how to sell security to businesses. There are parallels with the earlier business-IT alignment discussions. In both cases, I would argue that it is no...

Apr 25 2017  
   Penetration testing basics: a quick-start guide to breaking into systems
Messier R., Apress, New York, NY, 2016. 114 pp.  Type: Book (978-1-484218-56-3), Reviews: (1 of 2)

Penetration testing basics is a small book, about 110 pages, that intends to give readers a quick start with penetration testing, in seven chapters....

Jan 18 2017  
   Cybersecurity investments: decision support under economic aspects
Beissel S., Springer International Publishing, New York, NY, 2016. 281 pp.  Type: Book (978-3-319304-58-8)

After the introduction to the book in chapter 1 (five pages), chapter 2 (28 pages) looks at the foundations of cybersecurity in a broad but shallow way. Almost inevitably, this approach leads to imprecise statements, like mixing author...

Sep 12 2016  
   The cloud security ecosystem: technical, legal, business and management issues
Ko R., Choo R., Syngress Publishing, Waltham, MA, 2015. 570 pp.  Type: Book (978-0-128015-95-7), Reviews: (2 of 2)

This is a collection of 22 chapters related to the cloud. Chapter 1 is an introduction, and the others are divided in four parts in a plan-do-check-act framework. Every chapter is a self-contained paper. The parts are labeled, R...

Nov 30 2015  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy