NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Xie, Jing – ProQuest LLC, 2012
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Descriptors: Computer Software, Computer Security, Programming, Interaction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pollard, Andrew – English Teaching Forum, 2015
For many people, mobile phones are a part of modern life. Although the purpose of this technology revolves around language and communication, its application to language learning still appears to be underutilized. This is changing, as the widespread use of this handheld technology offers numerous opportunities to use functions that are ideal for…
Descriptors: Telecommunications, Computer Oriented Programs, Handheld Devices, Computer Mediated Communication