Suggested Topics within your search.
Suggested Topics within your search.
- Architecture 10
- Computer networks 9
- Computer security 9
- Management 8
- Security measures 8
- Application software 6
- Information technology 6
- Artificial intelligence 5
- Landscape architecture 5
- Technological innovations 5
- Big data 4
- Data protection 4
- Computer Security 3
- Computer network architectures 3
- Data processing 3
- Geography 3
- History 3
- Machine learning 3
- Architecture, Modern 2
- Business 2
- City planning 2
- Civil engineering 2
- Cloud computing 2
- Computer architecture 2
- Computer organization 2
- Computer science 2
- Crime prevention and architectural design 2
- Data encryption (Computer science) 2
- Data structures (Computer science) 2
- Design 2
Search alternatives:
information series » information services (Expand Search), innovation series (Expand Search), information sciences (Expand Search)
information series » information services (Expand Search), innovation series (Expand Search), information sciences (Expand Search)
-
1
-
2
-
3
The landscape lighting book / Janet Lennox Moyer.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
4
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Full text (Wentworth users only)
Electronic eBook -
5
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Full text (Wentworth users only)
Electronic eBook -
6
-
7
Resilient and Responsible Smart Cities edited by Hugo Rodrigues, Tomohiro Fukuda, Simon Elias Bibri.
Published 2022Full text (Wentworth users only)
Electronic eBook -
8
Spon's external works and landscape price book, by Davis Langdon.
Published 2014Full text (WIT users only)
Electronic eBook -
9
-
10
Information Governance Principles and Practices for a Big Data Landscape Ballard, Chuck.
Published 2014Full text (Wentworth users only)
Electronic eBook -
11
-
12
-
13
-
14
Data management at scale : best practices for enterprise architecture / Piethein Strengholt.
Published 2020Full text (Wentworth users only)
Electronic eBook -
15
Cityscape in the Era of Information and Communication Technologies by Agata Bonenberg.
Published 2018Full text (Wentworth users only)
Electronic eBook -
16
-
17
Zero trust journey across the digital estate / Abbas Kudrati and Binil Pillai.
Published 2023Full text (WIT users only)
Electronic eBook -
18
-
19
ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...
Published 2015Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
Full text (Wentworth users only)
Electronic eBook -
20
Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.
Published 2019Table of Contents: Full text (Wentworth users only)
Electronic eBook