Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Management 7
- Artificial intelligence 6
- Computer security 5
- Computer science 4
- Geography 4
- Information technology 4
- Landscape architecture 4
- Machine learning 4
- Regional planning 4
- Security measures 4
- Architecture 3
- Data protection 3
- Geographic information systems 3
- Technological innovations 3
- User interfaces (Computer systems) 3
- Academic librarians 2
- Academic libraries 2
- Application software 2
- Architectural design 2
- Barrier-free design 2
- Behaviorism (Political science) 2
- Building laws 2
- Chaotic behavior in systems 2
- City planning 2
- Computational intelligence 2
- Computer Communication Networks 2
- Computer Security 2
- Computer organization 2
- Computers 2
Search alternatives:
architecture general » architecture modern (Expand Search)
information sciences » information science (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
architecture general » architecture modern (Expand Search)
information sciences » information science (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
-
1
The landscape lighting book / Janet Lennox Moyer.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
2
-
3
Landscape as urbanism : a general theory / Charles Waldheim.
Published 2016Full text (Wentworth users only)
Electronic eBook -
4
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
Full text (Wentworth users only)
Electronic eBook -
5
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
Full text (Wentworth users only)
Electronic eBook -
6
The professional practice of landscape architecture : a complete guide to starting and running your own firm / Walter Rogers.
Published 2011Table of Contents:Book -
7
ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...
Published 2015Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
Full text (Wentworth users only)
Electronic eBook -
8
-
9
-
10
-
11
-
12
-
13
-
14
Design Science Research for a Resilient Future 19th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2024, Trollhättan, Sweden, Ju...
Published 2024Table of Contents: “…. -- Overcoming Rebound Effects: A Process Blueprint for Circular Systems Design. -- General Track. -- Conceptualizing Multi-Party AI Reliance for Design Research. -- Wasn’t Expecting That – Using Abnormality as a Key to Design a Novel User-Centric Explainable AI Method. -- Designing a Large Language Model-Based Coaching Intervention for Lifestyle Behavior Change. -- A design-principle-friendly conceptual model of observational crowdsourcing. -- Design principles for Machine Learning Based Clinical Decision Support Systems: A Design Science Study. -- Theory-driven Design of a Negotiation Canvas for Reaching Win-Win Agreements. -- DSR Methods and Education. -- A Typology of Knowledge Creation in Design Science Research Projects. -- Classifying Design Science Research in Terms of Types of Reasoning from an Epistemological Perspective. -- Visualizing Argumentation for Research Problem and Research Design. -- Toward a Method for Design Science Research Meta-Studies to Improve the Reusability of Design Principles. -- Dialectical Tensions in Design Theorizing: Exploring the Selection, Use, and Development of Kernel Theory. -- Design Science Research a a Guide for Innovative Higher Education Teaching: Towards an Application-Oriented Extension of the Proficiency Model. -- Let’s Chat to Negotiate: Designing a Conversational Agent for Learning Negotiation Skills. -- DSR in Practice. -- No Need to Cry over Spilt Milk: A Workflow for Regenerating Graph Data Using Robotic Process Automation. -- Towards a Smarter Tomorrow: A Design Science Perspective on Building a Smart Campus IoT Data Platform. -- Bridging Enterprise Knowledge Management and Natural Language Processing - Integration Framework and a Prototype. -- Generating Synthetic LiDAR Point Cloud Data for Object Detection Using the Unreal Game Engine. -- Exploring design principles promoting organizational knowledge creation via robo- advisory: the case of collaborative group decision-making in the after sales management. -- Designing For Banking Resilience: A DeFi E-Learning Solution. -- Emerging Topics in DSR. -- Design principles for collaborative generative AI systems in software development. -- Designing a Reference Architecture for Collaborative Condition Monitoring Data Spaces: Design Requirements and Views. -- Navigating Risks in the Crypto Landscape – A Taxonomy of Risk-related Aspects of Crypto Assets. -- Augmenting Frontline Service Employee Onboarding via Hybrid Intelligence: Examining the Effects of Different Degrees of Human-GenAI Interaction. -- Designing an LLM-based Open Data Assistant for Effective Use. -- Theorizing the Lean Startup Approach: Towards Well-Grounded Design Principles. -- Meta-requirements for LLM-based Knowledge Exploration Tools in Information Systems Research. -- Beyond E-Commerce: A Design Science Study into Crafting a Model for Customer-centric M-Commerce.…”
Full text (Wentworth users only)
Electronic eBook -
15
-
16
Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.
Published 2019Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
Full text (Wentworth users only)
Electronic eBook -
17
-
18
Implementing Database Security and Auditing.
Published 2005Full text (Wentworth users only)
Electronic eBook -
19
-
20
Practical Insecurity : the layman's guide to digital security and digital self-defense / Lyndon Marshall.
Published 2023Full text (WIT users only)
Electronic eBook