Descriptor
| Computer Networks | 2 |
| Computer Software | 2 |
| Comparative Analysis | 1 |
| Computer Security | 1 |
| Computer System Design | 1 |
| Computers | 1 |
| Costs | 1 |
| Electronic Mail | 1 |
| Information Networks | 1 |
| Information Technology | 1 |
Source
| Electronic Library | 2 |
Author
| Falk, Howard | 2 |
Publication Type
| Journal Articles | 2 |
| Book/Product Reviews | 1 |
| Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedFalk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewedFalk, Howard – Electronic Library, 1999
Describes interconnection methods, speed, and comparative equipment costs of networking starter kits. These kits supply network-connection devices that plug into or connect to each computer that is part of a network; they may also provide interconnection cables and installation software needed to set up a network. Reviews 20 kits that use a…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Computer System Design


