Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 13
- Geography 11
- Artificial intelligence 10
- Management 9
- Architecture 8
- Landscape architecture 8
- Regional planning 8
- History 7
- Security measures 7
- Application software 6
- Cloud computing 6
- Development 5
- Computer science 4
- Geographic information systems 4
- Human geography 4
- Information technology 4
- Software engineering 4
- Architectural design 3
- Architecture and society 3
- Big data 3
- Business 3
- Data protection 3
- Education 3
- Environmental management 3
- Machine learning 3
- Social change 3
- Social sciences 3
- Technological innovations 3
- Academic librarians 2
- Academic libraries 2
Search alternatives:
introduction services » introduction overview (Expand Search), introduction review (Expand Search), introduction stages (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
modern introduction » general introduction (Expand Search)
introduction services » introduction overview (Expand Search), introduction review (Expand Search), introduction stages (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
modern introduction » general introduction (Expand Search)
-
1
The professional practice of landscape architecture : a complete guide to starting and running your own firm / Walter Rogers.
Published 2011Table of Contents:Book -
2
The landscape lighting book / Janet Lennox Moyer.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
3
-
4
-
5
-
6
-
7
Designing for the Third Age : architecture redefined for a generation of 'active agers' / guest-edited by Lorraine Farrelly.
Published 2014Table of Contents: “…Title Page; Contents; Copyright Page; EDITORIAL; ABOUT THE GUEST-EDITOR; INTRODUCTION: Redefining, Reinventing and Realigning Design for Demographic Change; New Communities, New Contexts; Reinventing the City; Notes; 'Remember Who You Are Designing For': An Interview with Baroness Sally Greengross OBE; Campaigning for Change; Age-Friendly Living; Designing for the Whole Population; Innovation as a Tool; Notes; 'New Aging': Designing Architecture for All Ages; DEVELOPING THE NEW AGING MODEL; Kick-Starting Social Engines; Access to Goods and Services; Security for All.…”
Full text (Wentworth users only)
Electronic eBook -
8
Building modern Turkey : state, space, and ideology in the early republic / Zeynep Kezer.
Published 2015Full text (Wentworth users only)
Electronic eBook -
9
Geländemodellierung für Landschaftsarchitekten und Architekten : landscapingSMART3D-Machine Control SystemsStormwater Management.
Published 2014Table of Contents: “…Foreword by Peter Walker; Introduction; History of Site Grading; Developments in Plan Representation; Selected Projects; The Pueblo Grande Ball Court; The Pyramids of the Branitz Landscape Park; The "Poet's Garden" at the G 59 in Zurich; The Olympiapark in Munich; Irchel Park Zurich; Landform at the Scottish National Gallery of Modern Art in Edinburgh; Landform; The Basics of Site Grading; Small and Large Scale; Slope; Slope Calculations in Percent; Ratio; Angle of Incline; Gradient Formations; Interpolation; Spot Elevations; Contour Lines; Embankments; Profile.…”
Full text (Wentworth users only)
Electronic eBook -
10
Garden Plants Taxonomy Volume 1: Ferns, Gymnosperms, and Angiosperms (Monocots) / by Bijan Dehgan.
Published 2022Full text (Wentworth users only)
Electronic eBook -
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
Full text (Wentworth users only)
Electronic eBook -
19
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
Full text (Wentworth users only)
Electronic eBook -
20