Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 7
- Management 7
- Artificial intelligence 5
- Computer security 5
- Computer science 4
- Information technology 4
- Machine learning 4
- Security measures 4
- Data protection 3
- Regional planning 3
- Technological innovations 3
- Academic librarians 2
- Academic libraries 2
- Application software 2
- Architecture 2
- Behaviorism (Political science) 2
- Chaotic behavior in systems 2
- City planning 2
- Computer Security 2
- Computers 2
- Crime prevention and architectural design 2
- Data encryption (Computer science) 2
- Data structures (Computer science) 2
- Database Management Systems 2
- Database management 2
- Geography 2
- Human-computer interaction 2
- Industrial management 2
- Industries 2
- Information storage and retrieval systems 2
Search alternatives:
architecture general » architecture modern (Expand Search)
information sciences » information science (Expand Search), information services (Expand Search)
general information » general introduction (Expand Search)
architecture general » architecture modern (Expand Search)
information sciences » information science (Expand Search), information services (Expand Search)
general information » general introduction (Expand Search)
-
1
-
2
Landscape as urbanism : a general theory / Charles Waldheim.
Published 2016Full text (Wentworth users only)
Electronic eBook -
3
The landscape lighting book / Janet Lennox Moyer.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
4
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Full text (Wentworth users only)
Electronic eBook -
5
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Full text (Wentworth users only)
Electronic eBook -
6
ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...
Published 2015Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
Full text (Wentworth users only)
Electronic eBook -
7
-
8
-
9
-
10
Design Science Research for a Resilient Future 19th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2024, Trollhättan, Sweden, Ju...
Published 2024Table of Contents: “…. -- Overcoming Rebound Effects: A Process Blueprint for Circular Systems Design. -- General Track. -- Conceptualizing Multi-Party AI Reliance for Design Research. -- Wasn’t Expecting That – Using Abnormality as a Key to Design a Novel User-Centric Explainable AI Method. -- Designing a Large Language Model-Based Coaching Intervention for Lifestyle Behavior Change. -- A design-principle-friendly conceptual model of observational crowdsourcing. -- Design principles for Machine Learning Based Clinical Decision Support Systems: A Design Science Study. -- Theory-driven Design of a Negotiation Canvas for Reaching Win-Win Agreements. -- DSR Methods and Education. -- A Typology of Knowledge Creation in Design Science Research Projects. -- Classifying Design Science Research in Terms of Types of Reasoning from an Epistemological Perspective. -- Visualizing Argumentation for Research Problem and Research Design. -- Toward a Method for Design Science Research Meta-Studies to Improve the Reusability of Design Principles. -- Dialectical Tensions in Design Theorizing: Exploring the Selection, Use, and Development of Kernel Theory. -- Design Science Research a a Guide for Innovative Higher Education Teaching: Towards an Application-Oriented Extension of the Proficiency Model. -- Let’s Chat to Negotiate: Designing a Conversational Agent for Learning Negotiation Skills. -- DSR in Practice. -- No Need to Cry over Spilt Milk: A Workflow for Regenerating Graph Data Using Robotic Process Automation. -- Towards a Smarter Tomorrow: A Design Science Perspective on Building a Smart Campus IoT Data Platform. -- Bridging Enterprise Knowledge Management and Natural Language Processing - Integration Framework and a Prototype. -- Generating Synthetic LiDAR Point Cloud Data for Object Detection Using the Unreal Game Engine. -- Exploring design principles promoting organizational knowledge creation via robo- advisory: the case of collaborative group decision-making in the after sales management. -- Designing For Banking Resilience: A DeFi E-Learning Solution. -- Emerging Topics in DSR. -- Design principles for collaborative generative AI systems in software development. -- Designing a Reference Architecture for Collaborative Condition Monitoring Data Spaces: Design Requirements and Views. -- Navigating Risks in the Crypto Landscape – A Taxonomy of Risk-related Aspects of Crypto Assets. -- Augmenting Frontline Service Employee Onboarding via Hybrid Intelligence: Examining the Effects of Different Degrees of Human-GenAI Interaction. -- Designing an LLM-based Open Data Assistant for Effective Use. -- Theorizing the Lean Startup Approach: Towards Well-Grounded Design Principles. -- Meta-requirements for LLM-based Knowledge Exploration Tools in Information Systems Research. -- Beyond E-Commerce: A Design Science Study into Crafting a Model for Customer-centric M-Commerce.…”
Full text (Wentworth users only)
Electronic eBook -
11
Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.
Published 2019Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
Full text (Wentworth users only)
Electronic eBook -
12
Implementing Database Security and Auditing.
Published 2005Full text (Wentworth users only)
Electronic eBook -
13
Practical Insecurity : the layman's guide to digital security and digital self-defense / Lyndon Marshall.
Published 2023Full text (WIT users only)
Electronic eBook -
14
System of Open Spaces Concrete Project Strategies for Urban Territories / by Raquel Tardin.
Published 2013Full text (Wentworth users only).
Electronic eBook -
15
Designing Green Spaces for Health : Using Plants to Reduce the Spread of Airborne Viruses.
Published 2021Full text (WIT users only)
Electronic eBook -
16
Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.
Published 2019Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
Full text (Wentworth users only)
Electronic eBook -
17
-
18
-
19
-
20
Security and privacy vision in 6G : a comprehensive guide / Pawani Porambage, Madhusanka Liyanage.
Published 2023Table of Contents: “…-- 9.2.1 Metaverse architecture -- 9.2.2 Key characteristics of metaverse -- 9.2.3 Role of 6G in Metaverse -- 9.3 Security Threats in metaverse -- 9.4 Countermeasures for metaverse security threats -- 9.5 New trends in metaverse security -- -- 10 Society 5.0 and Security -- 10.1 Industry and Society Evolution -- 10.1.1 Industry 4.0 -- 10.1.2 Society 5.0 -- 10.2 Technical Enablers and Challenges -- 10.2.1 Dependable Wireless Connectivity -- 10.2.2 Integrated Communication, Control, Computation, and Sensing -- 10.2.3 Intelligence Everywhere -- 10.2.4 Energy Harvesting and Transfer -- 10.3 Security in Society 5.0 -- -- 11 6G-enabled Internet of Vehicles -- 11.1 Overview of V2X Communication and IoV -- 11.2 IoV Use Cases -- 11.3 Connected Autonomous Vehicles (CAV) -- 11.4 Unmanned Aerial Vehicles in Future IoV -- 11.5 Security Landscape for IoV -- 11.5.1 Security Threats -- 11.5.2 Security Requirements -- -- 12 Smart Grid 2.0 Security -- 12.1 Introduction -- 12.2 Evolution of SG 2.0 -- 12.3 Smart Grid 2.0& -- 12.3.1 Comparison of Smart Grid 1.0 and 2.0 -- 12.4 Role of 6G in SG 2.0 -- 12.5 Security Challenges of SG 2.0 -- 12.5.1 Physical Attacks -- 12.5.2 Software Attacks -- 12.5.3 Network Attacks -- 12.5.4 Attacks to the Controller -- 12.5.5 Encryption related Attacks -- 12.5.6 AI and ML related Attacks -- 12.5.7 Stability and Reliability of power supply -- 12.5.8 Secure and transparent energy trading among pro-sumers and consumers -- 12.5.9 Efficient and reliable communication topology for information and control signal exchange -- 12.6 Privacy issues of SG2.0 -- 12.7 Trust Management -- 12.8 Security and Privacy Standardization on SG 2.0 -- -- 13 6G Privacy -- 13.1 Introduction -- 13.2 Privacy Taxonomy -- 13.3 Privacy in Actions on Data -- 13.3.1 Information Collection -- 13.3.2 Information Processing -- 13.3.3 Information Dissemination -- 13.3.4 Invasion -- 13.4 Privacy Types for 6G -- 13.4.1 Data -- 13.4.2 Actions and Personal Behaviour -- 13.4.3 Image and Video -- 13.4.4 Communication -- 13.4.5 Location -- 13.5 6G Privacy goals -- 13.5.1 Ensure of privacy-protected big data -- 13.5.2 Privacy guarantees for edge networks -- 13.5.3 Achieving balance between privacy and performance of services -- 13.5.4 Standardization of privacy in technologies, and applications -- 13.5.5 Balance the interests in privacy protection in global context -- 13.5.6 Achieving proper utilization of interoperability and data portability -- 13.5.7 Quantifying privacy and privacy violations -- 13.5.8 Getting explanations of AI actions for privacy requirements -- -- 14 6G Privacy Challenges and Possible Solution -- 14.1 Introduction -- 14.2 6G Privacy Challenges and Issues -- 14.2.1 Advanced 6G applications with new privacy requirements -- 14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer -- 14.2.3 Privacy attacks on AI models -- 14.2.4 Privacy requirements in cloud computing and storage environments -- 14.2.5 Privacy issues in edge computing and Edge AI -- 14.2.6 Cost on privacy enhancements -- 14.2.7 Limited availability of Explainable AI (XAI) techniques -- 14.2.8 Ambiguity in responsibility of data ownership -- 14.2.9 Data communication confidentiality issues -- 14.2.10 Private Data Access Limitations -- 14.2.11 Privacy differences based on location -- 14.2.12 Lack of understanding of privacy rights and threats in general public -- 14.2.13 Difficulty in defining levels and indicators for privacy -- 14.3 Privacy Solutions for 6G -- 14.3.1 Privacy-preserving decentralized AI -- 14.3.2 Edge AI -- 14.3.3 Intelligent management with privacy -- 14.3.4 XAI for privacy -- 14.3.5 Privacy measures for Personally Identifiable Information -- 14.3.6 Blockchain-based Solutions -- 14.3.7 Lightweight and quantum resistant encryption mechanisms -- 14.3.8 Homomorphic Encryption -- 14.3.9 Privacy-preserving data publishing techniques -- 14.3.10 Privacy by design and Privacy by default -- 14.3.11 Regulation of Government, Industry, and Consumer -- 14.3.12 Other solutions -- -- 15 Legal Aspects and Security Standardization -- 15.1 Legal -- 15.2 Security Standardization -- 15.2.1 ETSI -- 15.2.2 ITU-T -- 15.2.3 3GPP -- 15.2.4 NIST -- 15.2.5 IETF -- 15.2.6 5G PPP -- 15.2.7 NGMN -- 15.2.8 IEEE -- -- 16 Distributed Ledger Technologies (DLTs) and Blockchain -- 16.1 Introduction -- 16.2 What is DLT -- 16.3 What is Blockchain -- 16.3.1 Types of Blockchain -- 16.4 What is Smart Contracts -- 16.5 Salient Features of Blockchain -- 16.6 Key Security Challenges which Blockchain can Solve -- 16.6.1 Role of Blockchain -- 16.7 Key Privacy Challenges which Blockchain can Solve -- 16.7.1 Key Challenges -- 16.7.2 Role of Blockchain -- 16.8 Threat Landscape of Blockchain -- 16.9 Possible Solutions to secure 6G Blockchains -- -- 17 AI/ML for 6G Security -- 17.1 Overview of 6G intelligence -- 17.2 AI for 6G Security -- 17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues -- 17.4 AI to Mitigate Security Issues of 6G Architecture -- 17.5 AI to Mitigate Security Issues of 6G Technologies -- 17.6 Security Issues in AI -- 17.7 Using AI to Attack 6G -- -- 18 Role of Explainable AI in 6G Security -- 18.1 What is Explainable AI (XAI) -- 18.1.1 Terminologies of XAI -- 18.1.2 Taxonomy of XAI -- 18.1.3 XAI Methods -- 18.2 Use of XAI for 6G -- 18.3 XAI for 6G Security -- 18.3.1 XAI for 6G Devices and IoT Security -- 18.3.2 XAI for 6G RAN -- 18.3.3 XAI for 6G Edge -- 18.3.4 XAI for 6G Core and Backhual -- 18.3.5 XAI for 6G Network Automation -- 18.4 New Security issues of XAI -- 18.4.1 Increased vulnerability to adversarial ML attacks -- 18.4.2 Difficulty to design secure ML applications -- 18.4.3 New attack vector and target -- -- 19 Zero touch network and Service Management (ZSM) Security -- 19.1 Introduction -- 19.1.1 Need of Zero-Touch Network and Service Management -- 19.1.2 Importance of ZSM for 5G and Beyond -- 19.2 ZSM Reference Architecture -- 19.2.1 Components -- 19.3 Security Aspects -- 19.3.1 ML/AI-based Attacks -- 19.3.2 Open API Security Threats -- 19.3.3 Intent-based Security Threats -- 19.3.4 Automated Closed-Loop Network based Security Threats -- 19.3.5 Threats due to Programmable Network Technologies -- 19.3.6 Possible Threats on ZSM Framework Architecture -- -- 20 Physical Layer Security -- 20.1 Introduction -- 20.2 Physical layer security background -- 20.2.1 PLS fundamentals -- 20.2.2 PLS Approaches -- 20.3 The prospect of PLS in 6G -- 20.3.1 Application scenarios of PLS in 6G -- 20.3.2 6G technologies and PLS -- 20.3.3 Cell-free mMIMO -- 20.3.4 Visible Light Communication (VLC) -- 20.3.5 Terahertz Communication -- 20.3.6 Joint Communications and Sensing -- -- 21 Quantum Security and Post-Quantum Cryptography -- 21.1 Overview of 6G and Quantum Computing -- 21.2 Quantum Computing -- 21.3 Quantum Security -- 21.3.1 Quantum Key Distribution -- 21.3.2 Information-theoretic security -- 21.4 Post-Quantum Cryptography -- 21.4.1 Background -- 21.4.2 PQC methods -- 21.4.3 PQC standardisa ...…”
Full text (Wentworth users only)
Electronic eBook