Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Networks | 8 |
Computer Software Evaluation | 8 |
Computer System Design | 8 |
Information Technology | 4 |
Computer Security | 3 |
Access to Information | 2 |
Computer Interfaces | 2 |
Computer Managed Instruction | 2 |
Computer Science | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
American Annals of the Deaf | 1 |
Computers & Education | 1 |
IEEE Transactions on Education | 1 |
Author
Publication Type
Reports - Descriptive | 4 |
Speeches/Meeting Papers | 4 |
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Location
Spain | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Clymer, E. William; Parrish, Rhonda – American Annals of the Deaf, 1994
This paper focuses on the applications of computer technology to enhancing personal and organizational productivity in schools. One school's experience selecting, implementing and adapting organizational computer systems is described, from schoolwide networks to manage electronic mail and grading data to teacher-centered applications and access to…
Descriptors: Computer Managed Instruction, Computer Networks, Computer Software Evaluation, Computer System Design
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation

Demetriadis, Stavros; Karoulis, Athanasios; Pombortsis, Andreas – Computers & Education, 1999
Describes the use of "Graphical" Jogthrough method for evaluating the user-interface design of the Network Simulator, an educational simulation program that enables users to virtually build a computer network, install hardware and software components, make necessary settings, and test the functionality of the network. Presents evaluation results…
Descriptors: Computer Graphics, Computer Interfaces, Computer Networks, Computer Oriented Programs
Anandam, Kamala – 1994
In January 1990, project SYNERGY was launched by 19 two-year colleges and 3 four-year colleges coordinated by Miami-Dade Community College, in Florida, with support from IBM and Title III funds. The project was designed to review and compile lists of useful instructional software for basic skill remediation and develop an integrated, adaptive,…
Descriptors: Community Colleges, Computer Managed Instruction, Computer Networks, Computer Software Development
Ezekiel, Aaron B. – 1995
At the University of New Mexico, stakeholders from the Computer and Information Resources and Technology (CIRT) department, Financial Systems, the Health Sciences Center, and the General Libraries, were involved in deciding on the goals of a project to replace Telnet with a suite of network middleware and productivity software on campus computer…
Descriptors: Automation, Computer Centers, Computer Interfaces, Computer Networks