Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Management 7
- Artificial intelligence 6
- Geography 4
- Information technology 4
- Landscape architecture 4
- Regional planning 4
- Security measures 4
- Architecture 3
- Computer science 3
- Geographic information systems 3
- Technological innovations 3
- Academic librarians 2
- Academic libraries 2
- Application software 2
- Architectural design 2
- Barrier-free design 2
- Building laws 2
- Chaotic behavior in systems 2
- Computational intelligence 2
- Computer Communication Networks 2
- Computer organization 2
- Computer security 2
- Computers 2
- Data encryption (Computer science) 2
- Data protection 2
- Data structures (Computer science) 2
- Industrial management 2
- Industries 2
- Information storage and retrieval systems 2
Search alternatives:
architecture general » architecture modern (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
architecture general » architecture modern (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
-
1
The professional practice of landscape architecture : a complete guide to starting and running your own firm / Walter Rogers.
Published 2011Table of Contents:Book -
2
The landscape lighting book / Janet Lennox Moyer.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
3
-
4
-
5
-
6
-
7
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
Full text (Wentworth users only)
Electronic eBook -
8
Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework.
Published 2017Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
Full text (Wentworth users only)
Electronic eBook -
9
-
10
-
11
Geospatial Analysis and Modelling of Urban Structure and Dynamics edited by Bin Jiang, Xiaobai Yao.
Published 2010Full text (Wentworth users only).
Electronic eBook -
12
Dependability problems of complex information systems / Wojciech Zamojski, Jarosław Sugier, editors.
Published 2014Full text (Wentworth users only)
Electronic eBook -
13
Systems Thinking : Managing Chaos and Complexity: A Platform for Designing Business Architecture.
Published 2011Full text (Wentworth users only)
Electronic eBook -
14
Systems Thinking : Managing Chaos and Complexity: A Platform for Designing Business Architecture.
Published 2011Full text (Wentworth users only)
Electronic eBook -
15
-
16
-
17
-
18
-
19
System of Open Spaces Concrete Project Strategies for Urban Territories / by Raquel Tardin.
Published 2013Full text (Wentworth users only).
Electronic eBook -
20
Geo-Spatial Technologies in Urban Environments by Ryan R. Jensen, Jay D. Gatrell, Daniel D. McLean.
Published 2005Full text (Wentworth users only).
Electronic eBook