Search alternatives:
architecture general » architecture modern (Expand Search)
information sciences » information science (Expand Search), information services (Expand Search)
general information » general introduction (Expand Search)
Showing 1 - 20 results of 49 for search '(( landscape architecture general information sciences ; ) OR ( landscape architecture general information security ; ))', query time: 0.33s Refine Results
  1. 1

    Landscape as urbanism : a general theory / Charles Waldheim. by Waldheim, Charles

    Published 2016
    Book
  2. 2

    Landscape as urbanism : a general theory / Charles Waldheim. by Waldheim, Charles

    Published 2016
    Full text (Wentworth users only)
    Electronic eBook
  3. 3

    The landscape lighting book / Janet Lennox Moyer. by Moyer, Janet Lennox, 1954-

    Published 2013
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  4. 4

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
    Full text (Wentworth users only)
    Electronic eBook
  5. 5

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
    Full text (Wentworth users only)
    Electronic eBook
  6. 6

    ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Hannes Federrath, Dieter...

    Published 2015
    Table of Contents: “…O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 7

    Network Science and Cybersecurity by Pino, Robinson E.

    Published 2014
    Full text (Wentworth users only)
    Electronic eBook
  8. 8
  9. 9
  10. 10

    Design Science Research for a Resilient Future 19th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2024, Trollhättan, Sweden, Ju...

    Published 2024
    Table of Contents: “…. -- Overcoming Rebound Effects: A Process Blueprint for Circular Systems Design. -- General Track. -- Conceptualizing Multi-Party AI Reliance for Design Research. -- Wasn’t Expecting That – Using Abnormality as a Key to Design a Novel User-Centric Explainable AI Method. -- Designing a Large Language Model-Based Coaching Intervention for Lifestyle Behavior Change. -- A design-principle-friendly conceptual model of observational crowdsourcing. -- Design principles for Machine Learning Based Clinical Decision Support Systems: A Design Science Study. -- Theory-driven Design of a Negotiation Canvas for Reaching Win-Win Agreements. -- DSR Methods and Education. -- A Typology of Knowledge Creation in Design Science Research Projects. -- Classifying Design Science Research in Terms of Types of Reasoning from an Epistemological Perspective. -- Visualizing Argumentation for Research Problem and Research Design. -- Toward a Method for Design Science Research Meta-Studies to Improve the Reusability of Design Principles. -- Dialectical Tensions in Design Theorizing: Exploring the Selection, Use, and Development of Kernel Theory. -- Design Science Research a a Guide for Innovative Higher Education Teaching: Towards an Application-Oriented Extension of the Proficiency Model. -- Let’s Chat to Negotiate: Designing a Conversational Agent for Learning Negotiation Skills. -- DSR in Practice. -- No Need to Cry over Spilt Milk: A Workflow for Regenerating Graph Data Using Robotic Process Automation. -- Towards a Smarter Tomorrow: A Design Science Perspective on Building a Smart Campus IoT Data Platform. -- Bridging Enterprise Knowledge Management and Natural Language Processing - Integration Framework and a Prototype. -- Generating Synthetic LiDAR Point Cloud Data for Object Detection Using the Unreal Game Engine. -- Exploring design principles promoting organizational knowledge creation via robo- advisory: the case of collaborative group decision-making in the after sales management. -- Designing For Banking Resilience: A DeFi E-Learning Solution. -- Emerging Topics in DSR. -- Design principles for collaborative generative AI systems in software development. -- Designing a Reference Architecture for Collaborative Condition Monitoring Data Spaces: Design Requirements and Views. -- Navigating Risks in the Crypto Landscape – A Taxonomy of Risk-related Aspects of Crypto Assets. -- Augmenting Frontline Service Employee Onboarding via Hybrid Intelligence: Examining the Effects of Different Degrees of Human-GenAI Interaction. -- Designing an LLM-based Open Data Assistant for Effective Use. -- Theorizing the Lean Startup Approach: Towards Well-Grounded Design Principles. -- Meta-requirements for LLM-based Knowledge Exploration Tools in Information Systems Research. -- Beyond E-Commerce: A Design Science Study into Crafting a Model for Customer-centric M-Commerce.…”
    Full text (Wentworth users only)
    Electronic eBook
  11. 11

    Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity. by Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
    Full text (Wentworth users only)
    Electronic eBook
  12. 12

    Implementing Database Security and Auditing. by Natan, Ron Ben

    Published 2005
    Full text (Wentworth users only)
    Electronic eBook
  13. 13
  14. 14
  15. 15
  16. 16

    Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity. by Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts…”
    Full text (Wentworth users only)
    Electronic eBook
  17. 17
  18. 18
  19. 19
  20. 20

    Security and privacy vision in 6G : a comprehensive guide / Pawani Porambage, Madhusanka Liyanage. by Porambage, Pawani, Liyanage, Madhusanka

    Published 2023
    Table of Contents: “…-- 9.2.1 Metaverse architecture -- 9.2.2 Key characteristics of metaverse -- 9.2.3 Role of 6G in Metaverse -- 9.3 Security Threats in metaverse -- 9.4 Countermeasures for metaverse security threats -- 9.5 New trends in metaverse security -- -- 10 Society 5.0 and Security -- 10.1 Industry and Society Evolution -- 10.1.1 Industry 4.0 -- 10.1.2 Society 5.0 -- 10.2 Technical Enablers and Challenges -- 10.2.1 Dependable Wireless Connectivity -- 10.2.2 Integrated Communication, Control, Computation, and Sensing -- 10.2.3 Intelligence Everywhere -- 10.2.4 Energy Harvesting and Transfer -- 10.3 Security in Society 5.0 -- -- 11 6G-enabled Internet of Vehicles -- 11.1 Overview of V2X Communication and IoV -- 11.2 IoV Use Cases -- 11.3 Connected Autonomous Vehicles (CAV) -- 11.4 Unmanned Aerial Vehicles in Future IoV -- 11.5 Security Landscape for IoV -- 11.5.1 Security Threats -- 11.5.2 Security Requirements -- -- 12 Smart Grid 2.0 Security -- 12.1 Introduction -- 12.2 Evolution of SG 2.0 -- 12.3 Smart Grid 2.0& -- 12.3.1 Comparison of Smart Grid 1.0 and 2.0 -- 12.4 Role of 6G in SG 2.0 -- 12.5 Security Challenges of SG 2.0 -- 12.5.1 Physical Attacks -- 12.5.2 Software Attacks -- 12.5.3 Network Attacks -- 12.5.4 Attacks to the Controller -- 12.5.5 Encryption related Attacks -- 12.5.6 AI and ML related Attacks -- 12.5.7 Stability and Reliability of power supply -- 12.5.8 Secure and transparent energy trading among pro-sumers and consumers -- 12.5.9 Efficient and reliable communication topology for information and control signal exchange -- 12.6 Privacy issues of SG2.0 -- 12.7 Trust Management -- 12.8 Security and Privacy Standardization on SG 2.0 -- -- 13 6G Privacy -- 13.1 Introduction -- 13.2 Privacy Taxonomy -- 13.3 Privacy in Actions on Data -- 13.3.1 Information Collection -- 13.3.2 Information Processing -- 13.3.3 Information Dissemination -- 13.3.4 Invasion -- 13.4 Privacy Types for 6G -- 13.4.1 Data -- 13.4.2 Actions and Personal Behaviour -- 13.4.3 Image and Video -- 13.4.4 Communication -- 13.4.5 Location -- 13.5 6G Privacy goals -- 13.5.1 Ensure of privacy-protected big data -- 13.5.2 Privacy guarantees for edge networks -- 13.5.3 Achieving balance between privacy and performance of services -- 13.5.4 Standardization of privacy in technologies, and applications -- 13.5.5 Balance the interests in privacy protection in global context -- 13.5.6 Achieving proper utilization of interoperability and data portability -- 13.5.7 Quantifying privacy and privacy violations -- 13.5.8 Getting explanations of AI actions for privacy requirements -- -- 14 6G Privacy Challenges and Possible Solution -- 14.1 Introduction -- 14.2 6G Privacy Challenges and Issues -- 14.2.1 Advanced 6G applications with new privacy requirements -- 14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer -- 14.2.3 Privacy attacks on AI models -- 14.2.4 Privacy requirements in cloud computing and storage environments -- 14.2.5 Privacy issues in edge computing and Edge AI -- 14.2.6 Cost on privacy enhancements -- 14.2.7 Limited availability of Explainable AI (XAI) techniques -- 14.2.8 Ambiguity in responsibility of data ownership -- 14.2.9 Data communication confidentiality issues -- 14.2.10 Private Data Access Limitations -- 14.2.11 Privacy differences based on location -- 14.2.12 Lack of understanding of privacy rights and threats in general public -- 14.2.13 Difficulty in defining levels and indicators for privacy -- 14.3 Privacy Solutions for 6G -- 14.3.1 Privacy-preserving decentralized AI -- 14.3.2 Edge AI -- 14.3.3 Intelligent management with privacy -- 14.3.4 XAI for privacy -- 14.3.5 Privacy measures for Personally Identifiable Information -- 14.3.6 Blockchain-based Solutions -- 14.3.7 Lightweight and quantum resistant encryption mechanisms -- 14.3.8 Homomorphic Encryption -- 14.3.9 Privacy-preserving data publishing techniques -- 14.3.10 Privacy by design and Privacy by default -- 14.3.11 Regulation of Government, Industry, and Consumer -- 14.3.12 Other solutions -- -- 15 Legal Aspects and Security Standardization -- 15.1 Legal -- 15.2 Security Standardization -- 15.2.1 ETSI -- 15.2.2 ITU-T -- 15.2.3 3GPP -- 15.2.4 NIST -- 15.2.5 IETF -- 15.2.6 5G PPP -- 15.2.7 NGMN -- 15.2.8 IEEE -- -- 16 Distributed Ledger Technologies (DLTs) and Blockchain -- 16.1 Introduction -- 16.2 What is DLT -- 16.3 What is Blockchain -- 16.3.1 Types of Blockchain -- 16.4 What is Smart Contracts -- 16.5 Salient Features of Blockchain -- 16.6 Key Security Challenges which Blockchain can Solve -- 16.6.1 Role of Blockchain -- 16.7 Key Privacy Challenges which Blockchain can Solve -- 16.7.1 Key Challenges -- 16.7.2 Role of Blockchain -- 16.8 Threat Landscape of Blockchain -- 16.9 Possible Solutions to secure 6G Blockchains -- -- 17 AI/ML for 6G Security -- 17.1 Overview of 6G intelligence -- 17.2 AI for 6G Security -- 17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues -- 17.4 AI to Mitigate Security Issues of 6G Architecture -- 17.5 AI to Mitigate Security Issues of 6G Technologies -- 17.6 Security Issues in AI -- 17.7 Using AI to Attack 6G -- -- 18 Role of Explainable AI in 6G Security -- 18.1 What is Explainable AI (XAI) -- 18.1.1 Terminologies of XAI -- 18.1.2 Taxonomy of XAI -- 18.1.3 XAI Methods -- 18.2 Use of XAI for 6G -- 18.3 XAI for 6G Security -- 18.3.1 XAI for 6G Devices and IoT Security -- 18.3.2 XAI for 6G RAN -- 18.3.3 XAI for 6G Edge -- 18.3.4 XAI for 6G Core and Backhual -- 18.3.5 XAI for 6G Network Automation -- 18.4 New Security issues of XAI -- 18.4.1 Increased vulnerability to adversarial ML attacks -- 18.4.2 Difficulty to design secure ML applications -- 18.4.3 New attack vector and target -- -- 19 Zero touch network and Service Management (ZSM) Security -- 19.1 Introduction -- 19.1.1 Need of Zero-Touch Network and Service Management -- 19.1.2 Importance of ZSM for 5G and Beyond -- 19.2 ZSM Reference Architecture -- 19.2.1 Components -- 19.3 Security Aspects -- 19.3.1 ML/AI-based Attacks -- 19.3.2 Open API Security Threats -- 19.3.3 Intent-based Security Threats -- 19.3.4 Automated Closed-Loop Network based Security Threats -- 19.3.5 Threats due to Programmable Network Technologies -- 19.3.6 Possible Threats on ZSM Framework Architecture -- -- 20 Physical Layer Security -- 20.1 Introduction -- 20.2 Physical layer security background -- 20.2.1 PLS fundamentals -- 20.2.2 PLS Approaches -- 20.3 The prospect of PLS in 6G -- 20.3.1 Application scenarios of PLS in 6G -- 20.3.2 6G technologies and PLS -- 20.3.3 Cell-free mMIMO -- 20.3.4 Visible Light Communication (VLC) -- 20.3.5 Terahertz Communication -- 20.3.6 Joint Communications and Sensing -- -- 21 Quantum Security and Post-Quantum Cryptography -- 21.1 Overview of 6G and Quantum Computing -- 21.2 Quantum Computing -- 21.3 Quantum Security -- 21.3.1 Quantum Key Distribution -- 21.3.2 Information-theoretic security -- 21.4 Post-Quantum Cryptography -- 21.4.1 Background -- 21.4.2 PQC methods -- 21.4.3 PQC standardisa ...…”
    Full text (Wentworth users only)
    Electronic eBook