NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Electronic Library1
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing one result Save | Export
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers