Descriptor
Computer Networks | 2 |
Computer Software | 2 |
Comparative Analysis | 1 |
Computer Security | 1 |
Computer System Design | 1 |
Computers | 1 |
Costs | 1 |
Electronic Mail | 1 |
Information Networks | 1 |
Information Technology | 1 |
Source
Electronic Library | 2 |
Author
Falk, Howard | 2 |
Publication Type
Journal Articles | 2 |
Book/Product Reviews | 1 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers

Falk, Howard – Electronic Library, 1999
Describes interconnection methods, speed, and comparative equipment costs of networking starter kits. These kits supply network-connection devices that plug into or connect to each computer that is part of a network; they may also provide interconnection cables and installation software needed to set up a network. Reviews 20 kits that use a…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Computer System Design