Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Security measures 6
- Internet 3
- Telecommunication 3
- Computer Security 2
- Computer crimes 2
- Computer security 2
- Corrupt practices 2
- Data transmission systems 2
- Electronic commerce 2
- Forecasting 2
- Hacking 2
- Identity theft 2
- Moral and ethical aspects 2
- Penetration testing (Computer security) 2
- Phishing 2
- Spam (Electronic mail) 2
- Technological innovations 2
- Artificial intelligence 1
- Asynchronous transfer mode 1
- Cable television 1
- Client/server computing 1
- Computer Communication Networks 1
- Computer interfaces 1
- Computer network protocols 1
- Computer vision 1
- Cryptography 1
- Digital communications 1
- Digital techniques 1
- Education—Data processing 1
-
1
Phishing exposed / Lance James ; foreward by Joe Stewart.
Published 2005Subjects: Full text (Wentworth users only)
Electronic eBook -
2
Cya : securing exchange server 2003 & outlook web access.
Published 2004Subjects: Full text (Wentworth users only)
Electronic eBook -
3
Locating publics : forms of social order in an electronic music scene / Florian Grote.
Published 2014Table of Contents: “…1.4.1.The Notion of Distinction -- 1.4.2.A Calculus of the Social -- 1.4.3.Networks From Distinctions -- 1.4.4.Observing Observers -- 1.4.5.Analytical Strategy -- 1.5.Distinguishing Styles and Scenes -- 1.5.1.The Mechanism of Comparison -- 1.5.2.Differentiation -- 1.6.Economics or Art -- Lots of Music, Nearly no Sales -- 1.7.Berlin: The "Center of the Universe" for Electronic Music -- 1.7.1.Techno Music and the Berghain Mania -- 1.7.2.In the Shadow of Berghain -- 1.7.3.Music Technology Manufacturers -- 1.7.4.Hired Guns With Record Deals…”
Full text (Wentworth users only)
Electronic eBook -
4
Phishing exposed / Lance James ; foreward by Joe Stewart.
Published 2005Subjects: Full text (Wentworth users only)
Electronic eBook -
5
Data communications and networking Behrouz A. Forouzan with Sophia Chung Fegan.
Published 2007Subjects: Full text (Wentworth users only)
Electronic eBook -
6
Understanding data communications : from fundamentals to networking / Gilbert Held.
Published 2000Table of Contents: “…Value-added carriers and electronic mail --…”
Full text (Wentworth users only)
Electronic eBook -
7
The Internet Book : Everything You Need to Know about Computer Networking and How the Internet Works / by Douglas E. Comer.
Published 2018Table of Contents: Full text (WIT users only)
Electronic eBook -
8
Computer networks / Andrew S. Tanenbaum, David J. Wetherall.
Published 2011Table of Contents: “…Uses of computer networks -- network hardware -- Network software -- Reference models -- Example networks -- Network standardization -- Metric units -- The theoretical basis for data communication -- Guided transmission media -- wireless transmission -- Communication satellites -- Digital modulation and multiplexing -- The public switched telephone network -- The mobile telephone system -- Cable television -- Data link layer design issues -- Error detection and correction -- Elementary data link protocols -- Sliding window protocols -- Example data link protocols -- The channel allocation problem -- Multiple access protocols -- Ethernet -- Wireless lans -- Broadband wireless -- Bluetooth -- RFID -- Data link layer switching -- Network layer design issues -- Routing algorithms -- Congestion control algorithms -- Quality of service -- Internetworking -- The network layer in the internet -- The transport service -- Elements of transport protocols -- Congestion control -- The internet transport protocols: UDP -- The internet transport protocols: TCP -- Performance issues -- Delay-tolerant networking -- DNS-The domain name system -- Electronic mail -- The world wide web -- Streaming audio and video -- Content delivery -- Cryptography -- Symmetric-key algorithms -- Public-key algorithms -- Digital signatures -- Management of public keys -- Communication security -- Authentication protocols -- Email security -- Web security -- Social issues.…”
Full text (Wentworth users only)
Electronic eBook -
9
Music in the AI Era 15th International Symposium, CMMR 2021, Virtual Event, November 15–19, 2021, Revised Selected Papers / edited by Mitsuko Aramaki, Keiji Hirata, Tetsuro Kitahar...
Published 2023Table of Contents: “…Music technology in the IA era -- KANSEI Informatics and Music Technology in AI Era -- On Parallelism in Music and Language: A Perspective from Symbol Emergence Systems based on Probabilistic Generative Models -- WaVAEtable Synthesis -- Deep Learning-based Music Instrument Recognition: Exploring Learned Feature Representations -- Time-span Tree Leveled by Duration of Time-span -- Evaluating AI as an Assisting Tool to Create Electronic Dance Music -- Interactive systems for music -- Suiview: A Web-based Application that Enables Users to Practice Wind Instrument Performance -- Continuous Parameter Control Using an On/Off Sensor in the Augmented Handheld Triangle -- Networked and Collaborative Musical Play Amongst Humans and Virtual Biological Agents in Locus Diffuse -- Towards an Aesthetic of Hybrid Performance Practice -- Development of Audio Descriptors Inspired by Schaefferian Criteria: a Set of Tools for Interactive Exploration of Percussive Sounds -- A Polytemporal Model for Musical Scheduling -- Interaction Strategies in Composition for Karlax and Acoustic Instruments -- Music Information Retrieval and Modeling -- Modelling Moral Traits with Music Listening Preferences and Demographics -- Classification of 1950 to 1960 Electronic Music Using the VGGish Neural Network and Random Forest -- Knowledge Transfer from Neural Networks for Speech Music Classification -- Predominant Instrument Recognition in Polyphonic Music Using Convolutional Recurrent Neural Networks -- The Matrix Profile for Motif Discovery in Audio - An Example Application in Carnatic Music -- A Rule-based Method for Implementing Implication-Realization Model -- Music and Performance Analysis -- CROCUS: Dataset of Critique Documents of Musical Performance -- A Psychoacoustic-Based Methodology for Sound Mass Music Analysis -- Musical Structure Analysis and Generation through Abstraction Trees -- Analysis of Musical Dynamics in Vocal Performances -- With Love: Electroacoustic, Audiovisual, and Telematic Music.…”
Full text (Wentworth users only)
Electronic eBook -
10
-
11
Hands on hacking / Matthew Hickey with Jennifer Arcuri.
Published 2020Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
Full text (Wentworth users only)
Electronic eBook -
12
Hands on hacking / Matthew Hickey with Jennifer Arcuri.
Published 2020Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
Full text (Wentworth users only)
Electronic eBook -
13
Virtual World Looking Glass Pictures.
Published 2012Streaming video (Wentworth users only)
Electronic Video -
14
NGN architectures, protocols, and services / Toni Janevski.
Published 2014Table of Contents: “…2.3.3 Dynamic Host Configuration Protocol2.3.4 Domain Name System; 2.3.5 ENUM; 2.3.6 IPv6 Addressing Architecture; 2.4 Internet Routing; 2.4.1 Routing Algorithms; 2.5 Client-Server Networking; 2.6 Peer-to-Peer Networking; 2.7 Best-Effort Internet Services; 2.7.1 Electronic Mail; 2.7.2 File Transfer Protocol; 2.7.3 World Wide Web; 2.7.4 Peer-to-Peer Services; 2.8 Internet Governance; References; Chapter 3 NGN Standards and Architectures; 3.1 Main Drivers to Next Generation Networks; 3.1.1 Fixed Broadband Internet Access; 3.1.2 Mobile Broadband Internet Access.…”
Full text (Wentworth users only)
Electronic eBook -
15
NGN architectures, protocols, and services / Toni Janevski.
Published 2014Table of Contents: “…2.3.3 Dynamic Host Configuration Protocol2.3.4 Domain Name System; 2.3.5 ENUM; 2.3.6 IPv6 Addressing Architecture; 2.4 Internet Routing; 2.4.1 Routing Algorithms; 2.5 Client-Server Networking; 2.6 Peer-to-Peer Networking; 2.7 Best-Effort Internet Services; 2.7.1 Electronic Mail; 2.7.2 File Transfer Protocol; 2.7.3 World Wide Web; 2.7.4 Peer-to-Peer Services; 2.8 Internet Governance; References; Chapter 3 NGN Standards and Architectures; 3.1 Main Drivers to Next Generation Networks; 3.1.1 Fixed Broadband Internet Access; 3.1.2 Mobile Broadband Internet Access.…”
Full text (Wentworth users only)
Electronic eBook