Descriptor
Computer Networks | 1 |
Computer Security | 1 |
Computer Software | 1 |
Computers | 1 |
Electronic Mail | 1 |
Source
Electronic Library | 1 |
Author
Falk, Howard | 1 |
Publication Type
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers