Suggested Topics within your search.
Suggested Topics within your search.
- Management 7
- Computer networks 6
- Computer security 5
- Information technology 4
- Security measures 4
- Artificial intelligence 3
- Data protection 3
- Landscape architecture 3
- Technological innovations 3
- Application software 2
- Computer Security 2
- Computer science 2
- Crime prevention and architectural design 2
- Data encryption (Computer science) 2
- Data structures (Computer science) 2
- Industries 2
- Machine learning 2
- Optical data processing 2
- 6G mobile communication systems 1
- Artificial Intelligence 1
- Big data 1
- Building 1
- Business 1
- COVID-19 (Disease) 1
- Cartography 1
- Client/server computing 1
- Computer Communication Networks 1
- Computer organization 1
- Computer programs 1
- Computers 1
Search alternatives:
architecture general » architecture modern (Expand Search)
general information » general introduction (Expand Search)
information series » information services (Expand Search), innovation series (Expand Search), information sciences (Expand Search)
architecture general » architecture modern (Expand Search)
general information » general introduction (Expand Search)
information series » information services (Expand Search), innovation series (Expand Search), information sciences (Expand Search)
-
1
The landscape lighting book / Janet Lennox Moyer.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
2
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Full text (Wentworth users only)
Electronic eBook -
3
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Full text (Wentworth users only)
Electronic eBook -
4
Spon's external works and landscape price book, by Davis Langdon.
Published 2014Full text (WIT users only)
Electronic eBook -
5
-
6
ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...
Published 2015Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
Full text (Wentworth users only)
Electronic eBook -
7
Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.
Published 2019Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
Full text (Wentworth users only)
Electronic eBook -
8
Implementing Database Security and Auditing.
Published 2005Full text (Wentworth users only)
Electronic eBook -
9
Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.
Published 2019Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
Full text (Wentworth users only)
Electronic eBook -
10
Practical Insecurity : the layman's guide to digital security and digital self-defense / Lyndon Marshall.
Published 2023Full text (WIT users only)
Electronic eBook -
11
-
12
-
13
Security and privacy vision in 6G : a comprehensive guide / Pawani Porambage, Madhusanka Liyanage.
Published 2023Table of Contents: “…-- 9.2.1 Metaverse architecture -- 9.2.2 Key characteristics of metaverse -- 9.2.3 Role of 6G in Metaverse -- 9.3 Security Threats in metaverse -- 9.4 Countermeasures for metaverse security threats -- 9.5 New trends in metaverse security -- -- 10 Society 5.0 and Security -- 10.1 Industry and Society Evolution -- 10.1.1 Industry 4.0 -- 10.1.2 Society 5.0 -- 10.2 Technical Enablers and Challenges -- 10.2.1 Dependable Wireless Connectivity -- 10.2.2 Integrated Communication, Control, Computation, and Sensing -- 10.2.3 Intelligence Everywhere -- 10.2.4 Energy Harvesting and Transfer -- 10.3 Security in Society 5.0 -- -- 11 6G-enabled Internet of Vehicles -- 11.1 Overview of V2X Communication and IoV -- 11.2 IoV Use Cases -- 11.3 Connected Autonomous Vehicles (CAV) -- 11.4 Unmanned Aerial Vehicles in Future IoV -- 11.5 Security Landscape for IoV -- 11.5.1 Security Threats -- 11.5.2 Security Requirements -- -- 12 Smart Grid 2.0 Security -- 12.1 Introduction -- 12.2 Evolution of SG 2.0 -- 12.3 Smart Grid 2.0& -- 12.3.1 Comparison of Smart Grid 1.0 and 2.0 -- 12.4 Role of 6G in SG 2.0 -- 12.5 Security Challenges of SG 2.0 -- 12.5.1 Physical Attacks -- 12.5.2 Software Attacks -- 12.5.3 Network Attacks -- 12.5.4 Attacks to the Controller -- 12.5.5 Encryption related Attacks -- 12.5.6 AI and ML related Attacks -- 12.5.7 Stability and Reliability of power supply -- 12.5.8 Secure and transparent energy trading among pro-sumers and consumers -- 12.5.9 Efficient and reliable communication topology for information and control signal exchange -- 12.6 Privacy issues of SG2.0 -- 12.7 Trust Management -- 12.8 Security and Privacy Standardization on SG 2.0 -- -- 13 6G Privacy -- 13.1 Introduction -- 13.2 Privacy Taxonomy -- 13.3 Privacy in Actions on Data -- 13.3.1 Information Collection -- 13.3.2 Information Processing -- 13.3.3 Information Dissemination -- 13.3.4 Invasion -- 13.4 Privacy Types for 6G -- 13.4.1 Data -- 13.4.2 Actions and Personal Behaviour -- 13.4.3 Image and Video -- 13.4.4 Communication -- 13.4.5 Location -- 13.5 6G Privacy goals -- 13.5.1 Ensure of privacy-protected big data -- 13.5.2 Privacy guarantees for edge networks -- 13.5.3 Achieving balance between privacy and performance of services -- 13.5.4 Standardization of privacy in technologies, and applications -- 13.5.5 Balance the interests in privacy protection in global context -- 13.5.6 Achieving proper utilization of interoperability and data portability -- 13.5.7 Quantifying privacy and privacy violations -- 13.5.8 Getting explanations of AI actions for privacy requirements -- -- 14 6G Privacy Challenges and Possible Solution -- 14.1 Introduction -- 14.2 6G Privacy Challenges and Issues -- 14.2.1 Advanced 6G applications with new privacy requirements -- 14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer -- 14.2.3 Privacy attacks on AI models -- 14.2.4 Privacy requirements in cloud computing and storage environments -- 14.2.5 Privacy issues in edge computing and Edge AI -- 14.2.6 Cost on privacy enhancements -- 14.2.7 Limited availability of Explainable AI (XAI) techniques -- 14.2.8 Ambiguity in responsibility of data ownership -- 14.2.9 Data communication confidentiality issues -- 14.2.10 Private Data Access Limitations -- 14.2.11 Privacy differences based on location -- 14.2.12 Lack of understanding of privacy rights and threats in general public -- 14.2.13 Difficulty in defining levels and indicators for privacy -- 14.3 Privacy Solutions for 6G -- 14.3.1 Privacy-preserving decentralized AI -- 14.3.2 Edge AI -- 14.3.3 Intelligent management with privacy -- 14.3.4 XAI for privacy -- 14.3.5 Privacy measures for Personally Identifiable Information -- 14.3.6 Blockchain-based Solutions -- 14.3.7 Lightweight and quantum resistant encryption mechanisms -- 14.3.8 Homomorphic Encryption -- 14.3.9 Privacy-preserving data publishing techniques -- 14.3.10 Privacy by design and Privacy by default -- 14.3.11 Regulation of Government, Industry, and Consumer -- 14.3.12 Other solutions -- -- 15 Legal Aspects and Security Standardization -- 15.1 Legal -- 15.2 Security Standardization -- 15.2.1 ETSI -- 15.2.2 ITU-T -- 15.2.3 3GPP -- 15.2.4 NIST -- 15.2.5 IETF -- 15.2.6 5G PPP -- 15.2.7 NGMN -- 15.2.8 IEEE -- -- 16 Distributed Ledger Technologies (DLTs) and Blockchain -- 16.1 Introduction -- 16.2 What is DLT -- 16.3 What is Blockchain -- 16.3.1 Types of Blockchain -- 16.4 What is Smart Contracts -- 16.5 Salient Features of Blockchain -- 16.6 Key Security Challenges which Blockchain can Solve -- 16.6.1 Role of Blockchain -- 16.7 Key Privacy Challenges which Blockchain can Solve -- 16.7.1 Key Challenges -- 16.7.2 Role of Blockchain -- 16.8 Threat Landscape of Blockchain -- 16.9 Possible Solutions to secure 6G Blockchains -- -- 17 AI/ML for 6G Security -- 17.1 Overview of 6G intelligence -- 17.2 AI for 6G Security -- 17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues -- 17.4 AI to Mitigate Security Issues of 6G Architecture -- 17.5 AI to Mitigate Security Issues of 6G Technologies -- 17.6 Security Issues in AI -- 17.7 Using AI to Attack 6G -- -- 18 Role of Explainable AI in 6G Security -- 18.1 What is Explainable AI (XAI) -- 18.1.1 Terminologies of XAI -- 18.1.2 Taxonomy of XAI -- 18.1.3 XAI Methods -- 18.2 Use of XAI for 6G -- 18.3 XAI for 6G Security -- 18.3.1 XAI for 6G Devices and IoT Security -- 18.3.2 XAI for 6G RAN -- 18.3.3 XAI for 6G Edge -- 18.3.4 XAI for 6G Core and Backhual -- 18.3.5 XAI for 6G Network Automation -- 18.4 New Security issues of XAI -- 18.4.1 Increased vulnerability to adversarial ML attacks -- 18.4.2 Difficulty to design secure ML applications -- 18.4.3 New attack vector and target -- -- 19 Zero touch network and Service Management (ZSM) Security -- 19.1 Introduction -- 19.1.1 Need of Zero-Touch Network and Service Management -- 19.1.2 Importance of ZSM for 5G and Beyond -- 19.2 ZSM Reference Architecture -- 19.2.1 Components -- 19.3 Security Aspects -- 19.3.1 ML/AI-based Attacks -- 19.3.2 Open API Security Threats -- 19.3.3 Intent-based Security Threats -- 19.3.4 Automated Closed-Loop Network based Security Threats -- 19.3.5 Threats due to Programmable Network Technologies -- 19.3.6 Possible Threats on ZSM Framework Architecture -- -- 20 Physical Layer Security -- 20.1 Introduction -- 20.2 Physical layer security background -- 20.2.1 PLS fundamentals -- 20.2.2 PLS Approaches -- 20.3 The prospect of PLS in 6G -- 20.3.1 Application scenarios of PLS in 6G -- 20.3.2 6G technologies and PLS -- 20.3.3 Cell-free mMIMO -- 20.3.4 Visible Light Communication (VLC) -- 20.3.5 Terahertz Communication -- 20.3.6 Joint Communications and Sensing -- -- 21 Quantum Security and Post-Quantum Cryptography -- 21.1 Overview of 6G and Quantum Computing -- 21.2 Quantum Computing -- 21.3 Quantum Security -- 21.3.1 Quantum Key Distribution -- 21.3.2 Information-theoretic security -- 21.4 Post-Quantum Cryptography -- 21.4.1 Background -- 21.4.2 PQC methods -- 21.4.3 PQC standardisa ...…”
Full text (Wentworth users only)
Electronic eBook -
14
-
15
-
16
Crime prevention through environmental design / Timothy D. Crowe ; revised by Lawrence J. Fennelly.
Published 2013Full text (Wentworth users only)
Electronic eBook -
17
Crime prevention through environmental design / Timothy D. Crowe ; revised by Lawrence J. Fennelly.
Published 2013Full text (Wentworth users only)
Electronic eBook -
18
Stadia : the design and development guide / Geraint John, Rod Sheard and Ben Vickery.
Published 2013Table of Contents:Book -
19
Big Data
Published 2020Table of Contents: “…Front Cover -- Half Title -- Series Page -- RIVER PUBLISHERS SERIES IN INFORMATION SCIENCE AND TECHNOLOGY -- Title Page -- Copyright Page -- CONTENTS -- List of Figures -- List of Tables -- The Authors -- Acknowledgments -- Foreword -- Notation -- 1. …”
Full text (Wentworth users only)
Full text (Wentworth users only)
Electronic eBook -
20
Artificial Neural Networks and Machine Learning – ICANN 2020 29th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 15–18, 2020, Proceedings,...
Published 2020Table of Contents: “…Model Compression I -- Fine-grained Channel Pruning for Deep Residual Neural Networks -- A Lightweight Fully Convolutional Neural Network of High Accuracy Surface Defect Detection -- Detecting Uncertain BNN Outputs on FPGA Using Monte Carlo Dropout Sampling -- Neural network compression via learnable wavelet transforms -- Fast and Robust Compression of Deep Convolutional Neural Networks -- Model Compression II -- Pruning artificial neural networks: a way to find well-generalizing, high-entropy sharp minima -- Log-Nets: Logarithmic Feature-Product Layers Yield More Compact Networks -- Tuning Deep Neural Network's hyperparameters constrained to deployability on tiny systems -- Obstacles to Depth Compression of Neural Networks -- Multi-task and Multi-label Learning -- Multi-Label Quadruplet Dictionary Learning -- Pareto Multi-Task Deep Learning -- Convex Graph Laplacian Multi-Task Learning SVM -- Neural Network Theory and Information Theoretic Learning -- Prediction Stability as a Criterion in Active Learning -- Neural Spectrum Alignment: Empirical Study -- Nonlinear, Nonequilibrium Landscape Approach to Neural Network Dynamics -- Hopfield Networks for Vector Quantization -- Prototype-Based Online Learning on Homogeneously Labeled Streaming Data -- Normalization and Regularization Methods -- Neural Network Training with Safe Regularization in the Null Space of Batch Activations -- The Effect of Batch Normalization in the Symmetric Phase -- Regularized Pooling -- Reinforcement Learning I -- Deep Recurrent Deterministic Policy Gradient for Physical Control -- Exploration via Progress-Driven Intrinsic Rewards -- An improved reinforcement learning based heuristic dynamic programming algorithm for model-free optimal control -- PBCS: Efficient Exploration and Exploitation Using a Synergy between Reinforcement Learning and Motion Planning -- Understanding failures of deterministic actor-critic with continuous action spaces and sparse rewards -- Reinforcement Learning II -- GAN-based Planning Model in Deep Reinforcement Learning -- Guided Reinforcement Learning via Sequence Learning -- Neural Machine Translation based on Improved Actor-Critic Method -- Neural Machine Translation based on Prioritized Experience Replay -- Improving Multi-Agent Reinforcement Learning with Imperfect Human Knowledge -- Reinforcement Learning III -- Adaptive Skill Acquisition in Hierarchical Reinforcement Learning -- Social Navigation with Human Empowerment driven Deep Reinforcement Learning -- Curious Hierarchical Actor-Critic Reinforcement Learning -- Policy Entropy for Out-of-Distribution Classification -- Reservoir Computing -- Analysis of reservoir structure contributing to robustness against structural failure of Liquid State Machine -- Quantifying robustness and capacity of reservoir computers with consistency profiles -- Two-Step FORCE Learning Algorithm for Fast Convergence in Reservoir Computing -- Morphological Computation of Skin Focusing on Fingerprint Structure -- Time Series Clustering with Deep Reservoir Computing -- ReservoirPy: an Efficient and User-Friendly Library to Design Echo State Networks -- Robotics and Neural Models of Perception and Action -- Adaptive, Neural Robot Control – Path Planning on 3D Spiking Neural Networks -- CABIN: A Novel Cooperative Attention Based Location Prediction Network Using Internal-External Trajectory Dependencies -- Neuro-Genetic Visuomotor Architecture for Robotic Grasping -- From Geometries to Contact Graphs -- Sentiment Classification -- Structural Position Network for Aspect-based Sentiment Classification -- Cross-Domain Sentiment Classification using Topic Attention and Dual-Task Adversarial Training -- Data Augmentation for Sentiment Analysis in English – the Online Approach -- Spiking Neural Networks I -- Dendritic computation in a point neuron model. -- Benchmarking Deep Spiking Neural Networks on Neuromorphic Hardware -- Unsupervised Learning of Spatio-Temporal Receptive Fields from an Event-Based Vision Sensor -- Spike-Train Level Unsupervised Learning Algorithm for Deep Spiking Belief Networks -- Spiking Neural Networks II -- Modelling Neuromodulated Information Flow and Energetic Consumption at Thalamic Relay Synapses -- Learning Precise Spike Timings with Eligibility Traces -- Meta-STDP rule stabilizes synaptic weights under in vivo-like ongoing spontaneous activity in a computational model of CA1 pyramidal cell -- Adaptive Chemotaxis for improved Contour Tracking using Spiking Neural Networks -- Text Understanding I -- Mental Imagery-Driven Neural Network to Enhance Representation for Implicit Discourse Relation Recognition -- Adaptive Convolution Kernel for Text Classification via Multi-Channel Representations -- Text generation in discrete space -- Short text processing for analyzing user portraits: A dynamic combination -- Text Understanding II -- A Hierarchical Fine-Tuning Approach Based on Joint Embedding of Words and Parent Categories for Hierarchical Multi-label Text Classification -- Boosting Tricks for Word Mover’s Distance -- Embedding Compression with Right Triangle Similarity Transformations -- Neural Networks for Detecting Irrelevant Questions during Visual Question Answering -- F-Measure Optimisation and Label Regularisation for Energy-based Neural Dialogue State Tracking Models -- Unsupervised Learning -- Unsupervised Change Detection using Joint Autoencoders for Age-Related Macular Degeneration Progression -- A fast algorithm to find Best Matching Units in Self-Organizing Maps -- Tumor Characterization using Unsupervised Learning of Mathematical Relations within Breast Cancer Data -- Balanced SAM-kNN: Online Learning with Heterogeneous Drift and Imbalanced Data -- A Rigorous Link Between Self-Organizing Maps and Gaussian Mixture Models -- Collaborative Clustering through Optimal Transport.…”
Full text (Wentworth users only)
Electronic eBook