Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
Andre C. M. Marien
K.U.Leuven
Leuven, Belgium
 

André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).

André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.

He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.


     

 The art of immutable architecture
Perry M., Apress, New York, NY, 2020. 444 pp.  Type: Book (978-1-484259-54-2)

Here is a crazy idea: imagine an information technology (IT) solution where the only persistent memory is write-once, read-many (WORM), or a database without update and delete commands. This book claims such immutable data stores form ...

 

Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp.  Type: Book (978-3-658256-51-7)

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state...

 

Beginning Perl programming: from novice to professional
Rothwell W., Apress, New York, NY, 2019. 224 pp.  Type: Book (978-1-484250-54-9), Reviews: (1 of 2)

Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, i...

 

Systematically understanding the cyber attack business: a survey
Huang K., Siegel M., Madnick S. ACM Computing Surveys 51(4): 1-36, 2018.  Type: Article

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to find the 24 key activities or p...

 

Asset attack vectors: building effective vulnerability management strategies to protect organizations
Haber M., Hibbert B., Apress, New York, NY, 2018. 371 pp.  Type: Book (978-1-484236-26-0)

Haber and Hibbert give readers a grand tour of the vulnerability management landscape in 24 chapters....

 
  more...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy