NotesFAQContact Us
Collection
Advanced
Search Tips
Author
Falk, Howard2
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Describes interconnection methods, speed, and comparative equipment costs of networking starter kits. These kits supply network-connection devices that plug into or connect to each computer that is part of a network; they may also provide interconnection cables and installation software needed to set up a network. Reviews 20 kits that use a…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Computer System Design