NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Bagnall, Peter – Physics Education, 1998
Discusses the Internet and how it works, beginning with its origins in the U.S. military and covering such issues as clients and servers, upload and download, and the World Wide Web. (Author/PVD)
Descriptors: Computer Interfaces, Computer Mediated Communication, Computer Networks, Computer Software