Showing 1 - 20 results of 28 for search '(( Landscape architecture general information series ; ) OR ( Landscape architecture general information security ; ))', query time: 0.42s Refine Results
  1. 1

    The landscape lighting book / Janet Lennox Moyer. by Moyer, Janet Lennox, 1954-

    Published 2013
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  2. 2

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
    Full text (Wentworth users only)
    Electronic eBook
  3. 3

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
    Full text (Wentworth users only)
    Electronic eBook
  4. 4

    Spon's external works and landscape price book, by Davis Langdon. by Langdon, Davis

    Published 2014
    Full text (WIT users only)
    Electronic eBook
  5. 5
  6. 6

    ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...

    Published 2015
    Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 7

    Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity. by Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
    Full text (Wentworth users only)
    Electronic eBook
  8. 8

    Implementing Database Security and Auditing. by Natan, Ron Ben

    Published 2005
    Full text (Wentworth users only)
    Electronic eBook
  9. 9

    Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity. by Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
    Full text (Wentworth users only)
    Electronic eBook
  10. 10
  11. 11
  12. 12
  13. 13

    Security and privacy vision in 6G : a comprehensive guide / Pawani Porambage, Madhusanka Liyanage. by Porambage, Pawani, Liyanage, Madhusanka

    Published 2023
    Table of Contents: “…-- 9.2.1 Metaverse architecture -- 9.2.2 Key characteristics of metaverse -- 9.2.3 Role of 6G in Metaverse -- 9.3 Security Threats in metaverse -- 9.4 Countermeasures for metaverse security threats -- 9.5 New trends in metaverse security -- -- 10 Society 5.0 and Security -- 10.1 Industry and Society Evolution -- 10.1.1 Industry 4.0 -- 10.1.2 Society 5.0 -- 10.2 Technical Enablers and Challenges -- 10.2.1 Dependable Wireless Connectivity -- 10.2.2 Integrated Communication, Control, Computation, and Sensing -- 10.2.3 Intelligence Everywhere -- 10.2.4 Energy Harvesting and Transfer -- 10.3 Security in Society 5.0 -- -- 11 6G-enabled Internet of Vehicles -- 11.1 Overview of V2X Communication and IoV -- 11.2 IoV Use Cases -- 11.3 Connected Autonomous Vehicles (CAV) -- 11.4 Unmanned Aerial Vehicles in Future IoV -- 11.5 Security Landscape for IoV -- 11.5.1 Security Threats -- 11.5.2 Security Requirements -- -- 12 Smart Grid 2.0 Security -- 12.1 Introduction -- 12.2 Evolution of SG 2.0 -- 12.3 Smart Grid 2.0& -- 12.3.1 Comparison of Smart Grid 1.0 and 2.0 -- 12.4 Role of 6G in SG 2.0 -- 12.5 Security Challenges of SG 2.0 -- 12.5.1 Physical Attacks -- 12.5.2 Software Attacks -- 12.5.3 Network Attacks -- 12.5.4 Attacks to the Controller -- 12.5.5 Encryption related Attacks -- 12.5.6 AI and ML related Attacks -- 12.5.7 Stability and Reliability of power supply -- 12.5.8 Secure and transparent energy trading among pro-sumers and consumers -- 12.5.9 Efficient and reliable communication topology for information and control signal exchange -- 12.6 Privacy issues of SG2.0 -- 12.7 Trust Management -- 12.8 Security and Privacy Standardization on SG 2.0 -- -- 13 6G Privacy -- 13.1 Introduction -- 13.2 Privacy Taxonomy -- 13.3 Privacy in Actions on Data -- 13.3.1 Information Collection -- 13.3.2 Information Processing -- 13.3.3 Information Dissemination -- 13.3.4 Invasion -- 13.4 Privacy Types for 6G -- 13.4.1 Data -- 13.4.2 Actions and Personal Behaviour -- 13.4.3 Image and Video -- 13.4.4 Communication -- 13.4.5 Location -- 13.5 6G Privacy goals -- 13.5.1 Ensure of privacy-protected big data -- 13.5.2 Privacy guarantees for edge networks -- 13.5.3 Achieving balance between privacy and performance of services -- 13.5.4 Standardization of privacy in technologies, and applications -- 13.5.5 Balance the interests in privacy protection in global context -- 13.5.6 Achieving proper utilization of interoperability and data portability -- 13.5.7 Quantifying privacy and privacy violations -- 13.5.8 Getting explanations of AI actions for privacy requirements -- -- 14 6G Privacy Challenges and Possible Solution -- 14.1 Introduction -- 14.2 6G Privacy Challenges and Issues -- 14.2.1 Advanced 6G applications with new privacy requirements -- 14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer -- 14.2.3 Privacy attacks on AI models -- 14.2.4 Privacy requirements in cloud computing and storage environments -- 14.2.5 Privacy issues in edge computing and Edge AI -- 14.2.6 Cost on privacy enhancements -- 14.2.7 Limited availability of Explainable AI (XAI) techniques -- 14.2.8 Ambiguity in responsibility of data ownership -- 14.2.9 Data communication confidentiality issues -- 14.2.10 Private Data Access Limitations -- 14.2.11 Privacy differences based on location -- 14.2.12 Lack of understanding of privacy rights and threats in general public -- 14.2.13 Difficulty in defining levels and indicators for privacy -- 14.3 Privacy Solutions for 6G -- 14.3.1 Privacy-preserving decentralized AI -- 14.3.2 Edge AI -- 14.3.3 Intelligent management with privacy -- 14.3.4 XAI for privacy -- 14.3.5 Privacy measures for Personally Identifiable Information -- 14.3.6 Blockchain-based Solutions -- 14.3.7 Lightweight and quantum resistant encryption mechanisms -- 14.3.8 Homomorphic Encryption -- 14.3.9 Privacy-preserving data publishing techniques -- 14.3.10 Privacy by design and Privacy by default -- 14.3.11 Regulation of Government, Industry, and Consumer -- 14.3.12 Other solutions -- -- 15 Legal Aspects and Security Standardization -- 15.1 Legal -- 15.2 Security Standardization -- 15.2.1 ETSI -- 15.2.2 ITU-T -- 15.2.3 3GPP -- 15.2.4 NIST -- 15.2.5 IETF -- 15.2.6 5G PPP -- 15.2.7 NGMN -- 15.2.8 IEEE -- -- 16 Distributed Ledger Technologies (DLTs) and Blockchain -- 16.1 Introduction -- 16.2 What is DLT -- 16.3 What is Blockchain -- 16.3.1 Types of Blockchain -- 16.4 What is Smart Contracts -- 16.5 Salient Features of Blockchain -- 16.6 Key Security Challenges which Blockchain can Solve -- 16.6.1 Role of Blockchain -- 16.7 Key Privacy Challenges which Blockchain can Solve -- 16.7.1 Key Challenges -- 16.7.2 Role of Blockchain -- 16.8 Threat Landscape of Blockchain -- 16.9 Possible Solutions to secure 6G Blockchains -- -- 17 AI/ML for 6G Security -- 17.1 Overview of 6G intelligence -- 17.2 AI for 6G Security -- 17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues -- 17.4 AI to Mitigate Security Issues of 6G Architecture -- 17.5 AI to Mitigate Security Issues of 6G Technologies -- 17.6 Security Issues in AI -- 17.7 Using AI to Attack 6G -- -- 18 Role of Explainable AI in 6G Security -- 18.1 What is Explainable AI (XAI) -- 18.1.1 Terminologies of XAI -- 18.1.2 Taxonomy of XAI -- 18.1.3 XAI Methods -- 18.2 Use of XAI for 6G -- 18.3 XAI for 6G Security -- 18.3.1 XAI for 6G Devices and IoT Security -- 18.3.2 XAI for 6G RAN -- 18.3.3 XAI for 6G Edge -- 18.3.4 XAI for 6G Core and Backhual -- 18.3.5 XAI for 6G Network Automation -- 18.4 New Security issues of XAI -- 18.4.1 Increased vulnerability to adversarial ML attacks -- 18.4.2 Difficulty to design secure ML applications -- 18.4.3 New attack vector and target -- -- 19 Zero touch network and Service Management (ZSM) Security -- 19.1 Introduction -- 19.1.1 Need of Zero-Touch Network and Service Management -- 19.1.2 Importance of ZSM for 5G and Beyond -- 19.2 ZSM Reference Architecture -- 19.2.1 Components -- 19.3 Security Aspects -- 19.3.1 ML/AI-based Attacks -- 19.3.2 Open API Security Threats -- 19.3.3 Intent-based Security Threats -- 19.3.4 Automated Closed-Loop Network based Security Threats -- 19.3.5 Threats due to Programmable Network Technologies -- 19.3.6 Possible Threats on ZSM Framework Architecture -- -- 20 Physical Layer Security -- 20.1 Introduction -- 20.2 Physical layer security background -- 20.2.1 PLS fundamentals -- 20.2.2 PLS Approaches -- 20.3 The prospect of PLS in 6G -- 20.3.1 Application scenarios of PLS in 6G -- 20.3.2 6G technologies and PLS -- 20.3.3 Cell-free mMIMO -- 20.3.4 Visible Light Communication (VLC) -- 20.3.5 Terahertz Communication -- 20.3.6 Joint Communications and Sensing -- -- 21 Quantum Security and Post-Quantum Cryptography -- 21.1 Overview of 6G and Quantum Computing -- 21.2 Quantum Computing -- 21.3 Quantum Security -- 21.3.1 Quantum Key Distribution -- 21.3.2 Information-theoretic security -- 21.4 Post-Quantum Cryptography -- 21.4.1 Background -- 21.4.2 PQC methods -- 21.4.3 PQC standardisa ...…”
    Full text (Wentworth users only)
    Electronic eBook
  14. 14
  15. 15

    Network Science and Cybersecurity by Pino, Robinson E.

    Published 2014
    Full text (Wentworth users only)
    Electronic eBook
  16. 16
  17. 17
  18. 18

    Stadia : the design and development guide / Geraint John, Rod Sheard and Ben Vickery. by John, Geraint

    Published 2013
    Table of Contents:
    Book
  19. 19

    Big Data by Santos, Maribel Yasmina

    Published 2020
    Table of Contents: “…Front Cover -- Half Title -- Series Page -- RIVER PUBLISHERS SERIES IN INFORMATION SCIENCE AND TECHNOLOGY -- Title Page -- Copyright Page -- CONTENTS -- List of Figures -- List of Tables -- The Authors -- Acknowledgments -- Foreword -- Notation -- 1. …”
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Electronic eBook
  20. 20

    Artificial Neural Networks and Machine Learning – ICANN 2020 29th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 15–18, 2020, Proceedings,...

    Published 2020
    Table of Contents: “…Model Compression I -- Fine-grained Channel Pruning for Deep Residual Neural Networks -- A Lightweight Fully Convolutional Neural Network of High Accuracy Surface Defect Detection -- Detecting Uncertain BNN Outputs on FPGA Using Monte Carlo Dropout Sampling -- Neural network compression via learnable wavelet transforms -- Fast and Robust Compression of Deep Convolutional Neural Networks -- Model Compression II -- Pruning artificial neural networks: a way to find well-generalizing, high-entropy sharp minima -- Log-Nets: Logarithmic Feature-Product Layers Yield More Compact Networks -- Tuning Deep Neural Network's hyperparameters constrained to deployability on tiny systems -- Obstacles to Depth Compression of Neural Networks -- Multi-task and Multi-label Learning -- Multi-Label Quadruplet Dictionary Learning -- Pareto Multi-Task Deep Learning -- Convex Graph Laplacian Multi-Task Learning SVM -- Neural Network Theory and Information Theoretic Learning -- Prediction Stability as a Criterion in Active Learning -- Neural Spectrum Alignment: Empirical Study -- Nonlinear, Nonequilibrium Landscape Approach to Neural Network Dynamics -- Hopfield Networks for Vector Quantization -- Prototype-Based Online Learning on Homogeneously Labeled Streaming Data -- Normalization and Regularization Methods -- Neural Network Training with Safe Regularization in the Null Space of Batch Activations -- The Effect of Batch Normalization in the Symmetric Phase -- Regularized Pooling -- Reinforcement Learning I -- Deep Recurrent Deterministic Policy Gradient for Physical Control -- Exploration via Progress-Driven Intrinsic Rewards -- An improved reinforcement learning based heuristic dynamic programming algorithm for model-free optimal control -- PBCS: Efficient Exploration and Exploitation Using a Synergy between Reinforcement Learning and Motion Planning -- Understanding failures of deterministic actor-critic with continuous action spaces and sparse rewards -- Reinforcement Learning II -- GAN-based Planning Model in Deep Reinforcement Learning -- Guided Reinforcement Learning via Sequence Learning -- Neural Machine Translation based on Improved Actor-Critic Method -- Neural Machine Translation based on Prioritized Experience Replay -- Improving Multi-Agent Reinforcement Learning with Imperfect Human Knowledge -- Reinforcement Learning III -- Adaptive Skill Acquisition in Hierarchical Reinforcement Learning -- Social Navigation with Human Empowerment driven Deep Reinforcement Learning -- Curious Hierarchical Actor-Critic Reinforcement Learning -- Policy Entropy for Out-of-Distribution Classification -- Reservoir Computing -- Analysis of reservoir structure contributing to robustness against structural failure of Liquid State Machine -- Quantifying robustness and capacity of reservoir computers with consistency profiles -- Two-Step FORCE Learning Algorithm for Fast Convergence in Reservoir Computing -- Morphological Computation of Skin Focusing on Fingerprint Structure -- Time Series Clustering with Deep Reservoir Computing -- ReservoirPy: an Efficient and User-Friendly Library to Design Echo State Networks -- Robotics and Neural Models of Perception and Action -- Adaptive, Neural Robot Control – Path Planning on 3D Spiking Neural Networks -- CABIN: A Novel Cooperative Attention Based Location Prediction Network Using Internal-External Trajectory Dependencies -- Neuro-Genetic Visuomotor Architecture for Robotic Grasping -- From Geometries to Contact Graphs -- Sentiment Classification -- Structural Position Network for Aspect-based Sentiment Classification -- Cross-Domain Sentiment Classification using Topic Attention and Dual-Task Adversarial Training -- Data Augmentation for Sentiment Analysis in English – the Online Approach -- Spiking Neural Networks I -- Dendritic computation in a point neuron model. -- Benchmarking Deep Spiking Neural Networks on Neuromorphic Hardware -- Unsupervised Learning of Spatio-Temporal Receptive Fields from an Event-Based Vision Sensor -- Spike-Train Level Unsupervised Learning Algorithm for Deep Spiking Belief Networks -- Spiking Neural Networks II -- Modelling Neuromodulated Information Flow and Energetic Consumption at Thalamic Relay Synapses -- Learning Precise Spike Timings with Eligibility Traces -- Meta-STDP rule stabilizes synaptic weights under in vivo-like ongoing spontaneous activity in a computational model of CA1 pyramidal cell -- Adaptive Chemotaxis for improved Contour Tracking using Spiking Neural Networks -- Text Understanding I -- Mental Imagery-Driven Neural Network to Enhance Representation for Implicit Discourse Relation Recognition -- Adaptive Convolution Kernel for Text Classification via Multi-Channel Representations -- Text generation in discrete space -- Short text processing for analyzing user portraits: A dynamic combination -- Text Understanding II -- A Hierarchical Fine-Tuning Approach Based on Joint Embedding of Words and Parent Categories for Hierarchical Multi-label Text Classification -- Boosting Tricks for Word Mover’s Distance -- Embedding Compression with Right Triangle Similarity Transformations -- Neural Networks for Detecting Irrelevant Questions during Visual Question Answering -- F-Measure Optimisation and Label Regularisation for Energy-based Neural Dialogue State Tracking Models -- Unsupervised Learning -- Unsupervised Change Detection using Joint Autoencoders for Age-Related Macular Degeneration Progression -- A fast algorithm to find Best Matching Units in Self-Organizing Maps -- Tumor Characterization using Unsupervised Learning of Mathematical Relations within Breast Cancer Data -- Balanced SAM-kNN: Online Learning with Heterogeneous Drift and Imbalanced Data -- A Rigorous Link Between Self-Organizing Maps and Gaussian Mixture Models -- Collaborative Clustering through Optimal Transport.…”
    Full text (Wentworth users only)
    Electronic eBook