Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 2 |
| Computer Security | 2 |
| Synchronous Communication | 2 |
| Administrators | 1 |
| College Students | 1 |
| Computer Software | 1 |
| Computer System Design | 1 |
| Computer Uses in Education | 1 |
| Computers | 1 |
| Handheld Devices | 1 |
| Higher Education | 1 |
| More ▼ | |
Source
| Campus Technology | 1 |
| ProQuest LLC | 1 |
Publication Type
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
| Indiana | 1 |
| Massachusetts | 1 |
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security

Direct link
