Search alternatives:
architecture general » architecture modern (Expand Search)
information sciences » information science (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
Showing 1 - 20 results of 63 for search '(( landscape architecture general ((information sciences) OR (information services)) ; ) OR ( landscape architecture general information security ; ))', query time: 0.44s Refine Results
  1. 1

    The landscape lighting book / Janet Lennox Moyer. by Moyer, Janet Lennox, 1954-

    Published 2013
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  2. 2

    Landscape as urbanism : a general theory / Charles Waldheim. by Waldheim, Charles

    Published 2016
    Book
  3. 3

    Landscape as urbanism : a general theory / Charles Waldheim. by Waldheim, Charles

    Published 2016
    Full text (Wentworth users only)
    Electronic eBook
  4. 4

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
    Full text (Wentworth users only)
    Electronic eBook
  5. 5

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
    Full text (Wentworth users only)
    Electronic eBook
  6. 6

    The professional practice of landscape architecture : a complete guide to starting and running your own firm / Walter Rogers. by Rogers, Walter

    Published 2011
    Table of Contents:
    Book
  7. 7

    ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...

    Published 2015
    Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
    Full text (Wentworth users only)
    Electronic eBook
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Network Science and Cybersecurity by Pino, Robinson E.

    Published 2014
    Full text (Wentworth users only)
    Electronic eBook
  13. 13
  14. 14

    Design Science Research for a Resilient Future 19th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2024, Trollhättan, Sweden, Ju...

    Published 2024
    Table of Contents: “…. -- Overcoming Rebound Effects: A Process Blueprint for Circular Systems Design. -- General Track. -- Conceptualizing Multi-Party AI Reliance for Design Research. -- Wasn’t Expecting That – Using Abnormality as a Key to Design a Novel User-Centric Explainable AI Method. -- Designing a Large Language Model-Based Coaching Intervention for Lifestyle Behavior Change. -- A design-principle-friendly conceptual model of observational crowdsourcing. -- Design principles for Machine Learning Based Clinical Decision Support Systems: A Design Science Study. -- Theory-driven Design of a Negotiation Canvas for Reaching Win-Win Agreements. -- DSR Methods and Education. -- A Typology of Knowledge Creation in Design Science Research Projects. -- Classifying Design Science Research in Terms of Types of Reasoning from an Epistemological Perspective. -- Visualizing Argumentation for Research Problem and Research Design. -- Toward a Method for Design Science Research Meta-Studies to Improve the Reusability of Design Principles. -- Dialectical Tensions in Design Theorizing: Exploring the Selection, Use, and Development of Kernel Theory. -- Design Science Research a a Guide for Innovative Higher Education Teaching: Towards an Application-Oriented Extension of the Proficiency Model. -- Let’s Chat to Negotiate: Designing a Conversational Agent for Learning Negotiation Skills. -- DSR in Practice. -- No Need to Cry over Spilt Milk: A Workflow for Regenerating Graph Data Using Robotic Process Automation. -- Towards a Smarter Tomorrow: A Design Science Perspective on Building a Smart Campus IoT Data Platform. -- Bridging Enterprise Knowledge Management and Natural Language Processing - Integration Framework and a Prototype. -- Generating Synthetic LiDAR Point Cloud Data for Object Detection Using the Unreal Game Engine. -- Exploring design principles promoting organizational knowledge creation via robo- advisory: the case of collaborative group decision-making in the after sales management. -- Designing For Banking Resilience: A DeFi E-Learning Solution. -- Emerging Topics in DSR. -- Design principles for collaborative generative AI systems in software development. -- Designing a Reference Architecture for Collaborative Condition Monitoring Data Spaces: Design Requirements and Views. -- Navigating Risks in the Crypto Landscape – A Taxonomy of Risk-related Aspects of Crypto Assets. -- Augmenting Frontline Service Employee Onboarding via Hybrid Intelligence: Examining the Effects of Different Degrees of Human-GenAI Interaction. -- Designing an LLM-based Open Data Assistant for Effective Use. -- Theorizing the Lean Startup Approach: Towards Well-Grounded Design Principles. -- Meta-requirements for LLM-based Knowledge Exploration Tools in Information Systems Research. -- Beyond E-Commerce: A Design Science Study into Crafting a Model for Customer-centric M-Commerce.…”
    Full text (Wentworth users only)
    Electronic eBook
  15. 15
  16. 16

    Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity. by Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
    Full text (Wentworth users only)
    Electronic eBook
  17. 17
  18. 18

    Implementing Database Security and Auditing. by Natan, Ron Ben

    Published 2005
    Full text (Wentworth users only)
    Electronic eBook
  19. 19
  20. 20