NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Shehroze Farooqi – ProQuest LLC, 2021
Popular platforms such as Facebook and Twitter integrate third-party apps from developers to enhance the experience of their users. While third-party apps are widely used to provide legitimate functionality, the abuse of third-party apps by attackers is also becoming prevalent. Attackers are abusing third-party apps to orchestrate their malicious…
Descriptors: Social Media, Computer Security, Crime Prevention, Information Security
Im, Piljae – ProQuest LLC, 2009
A methodology to develop an easy-to-use toolkit for the preliminary design of high performance schools in hot and humid climates was presented. The toolkit proposed in this research will allow decision makers without simulation knowledge easily to evaluate accurately energy efficient measures for K-5 schools, which would contribute to the…
Descriptors: Energy Conservation, Radiation, Heat, Program Effectiveness
Goosen, Richard F. – ProQuest LLC, 2009
This study provides information for higher education leaders that have or are considering conducting Computer Aided Design (CAD) instruction using student owned notebook computers. Survey data were collected during the first 8 years of a pilot program requiring engineering technology students at a four year public university to acquire a notebook…
Descriptors: Laptop Computers, Pilot Projects, Computer Assisted Instruction, Program Effectiveness