Search alternatives:
architecture general » architecture modern (Expand Search)
information services » information science (Expand Search)
general information » general introduction (Expand Search)
Showing 1 - 20 results of 45 for search 'Landscape architecture general information services ;', query time: 0.26s Refine Results
  1. 1

    The professional practice of landscape architecture : a complete guide to starting and running your own firm / Walter Rogers. by Rogers, Walter

    Published 2011
    Table of Contents:
    Book
  2. 2

    The landscape lighting book / Janet Lennox Moyer. by Moyer, Janet Lennox, 1954-

    Published 2013
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
    Full text (Wentworth users only)
    Electronic eBook
  8. 8

    Information Security Handbook : Develop a threat model and incident response strategy to build a strong information security framework. by Darren Death

    Published 2017
    Table of Contents: “…Incident response plan testing -- Summary -- Chapter 9: Developing a Security Operations Center -- Responsibilities of the SOC -- Management of security operations center tools -- Security operation center toolset design -- Using already implemented toolsets -- Security operations center roles -- Log or information aggregation -- Log or information analysis -- Processes and procedures -- Identification -- detection and analysis -- Events versus alerts versus incidents -- False positive versus false negative/true positive versus true negative -- Remediation -- containment/eradication/recovery -- Security operations center tools -- Security operations center advantages -- MSSP advantages -- Summary -- Chapter 10: Developing an Information Security Architecture Program -- Information security architecture and SDLC/SELC -- Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Compliance standards -- Documenting key information system and project roles -- Project roles -- Information system roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment -- Inputs to the BIA -- Conducting an information categorization -- Developing a security architecture advisement program -- Partnering with your business stakeholders -- Information security architecture process -- Example information security architecture process -- Summary -- Chapter 11: Cloud Security Consideration -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service -- IaaS -- Platform as a Service -- PaaS -- Software as a Service -- SaaS -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20