Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Author
Conlon, Michael P. | 1 |
Enyeart, Mike | 1 |
Hong, Pei-lin | 1 |
Keating, Joseph, Comp. | 1 |
Li, Jin-sheng | 1 |
Massie, Malcom | 1 |
Mullins, Paul | 1 |
Neray, Phil | 1 |
Ponder, Tim, Comp. | 1 |
Ropog, Marty, Comp. | 1 |
Staman, E. Michael | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Australia | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
Descriptors: Computer Networks, Computer Security, Computer Software, Corporations
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives

Massie, Malcom – Orana, 1996
Scotch College (Adelaide, Australia) has networked 90% of its classrooms. This article describes the campus computer network and its hardware and configuration; World Wide Web problems and solution; a "mini Internet" of curriculum-specific materials gathered from the Web; student and faculty use; student and staff training; security;…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology