NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Bagnall, Peter – Physics Education, 1998
Discusses the Internet and how it works, beginning with its origins in the U.S. military and covering such issues as clients and servers, upload and download, and the World Wide Web. (Author/PVD)
Descriptors: Computer Interfaces, Computer Mediated Communication, Computer Networks, Computer Software
PDF pending restoration PDF pending restoration
Darby, Christine – 1992
This guide is designed for people who are new to the world of electronic/telecommunication access. It is an easy-to-read, self-instructional tool designed for beginning Internet users. Through a step-by-step process, the guide introduces searching online catalogs in libraries. A discussion of library search strategies is followed by seven steps…
Descriptors: Academic Libraries, Autoinstructional Aids, Computer Networks, Electronic Mail
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Sillince, J. A. A. – Journal of Government Information, 1994
Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…
Descriptors: Computer Networks, Criticism, Electronic Mail, Foreign Countries
Holsclaw, Mick – 1993
In 1987, the Chancellor's Office of the California Community Colleges (CCC) began implementation of the Management Information System (MIS) to improve its data collection and analysis capabilities by utilizing electronic mail communications systemwide. Specifically, the project seeks to replace paper copies of data generated for reporting…
Descriptors: Community Colleges, Computer Networks, Computer Uses in Education, Data Analysis
Miami-Dade Community Coll., FL. – 1992
This book contains 37 papers on computer use in higher education originally presented at a May, 1992, conference of college and university computer users. Most of the papers describe programs or systems implemented at particular institutions and cover the following: systems for career planning, automating purchasing and financial commitments,…
Descriptors: Access to Information, Career Information Systems, Computer Networks, Computer Oriented Programs