Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 7 |
Computer Software Evaluation | 7 |
Computer System Design | 7 |
Information Technology | 4 |
Computer Networks | 3 |
Computer Science Education | 3 |
Computer Software | 3 |
Programming | 3 |
Access to Information | 2 |
Coding | 2 |
Users (Information) | 2 |
More ▼ |
Author
Alverez, Omar | 1 |
Amin, Rohan Mahesh | 1 |
Bettati, Riccardo | 1 |
Cifuentes, Laurent | 1 |
Drasutis, Sigitas | 1 |
Kirsch, Jonathan | 1 |
Mercer, Rene | 1 |
Motekaityte, Vida | 1 |
Noreika, Algirdas | 1 |
Senn, Gary J. | 1 |
Smyth, Thomas J. C. | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Journal Articles | 2 |
Speeches/Meeting Papers | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Drasutis, Sigitas; Motekaityte, Vida; Noreika, Algirdas – Informatics in Education, 2010
The Internet has recently encouraged the society to convert almost all its needs to electronic resources such as e-libraries, e-cultures, e-entertainment as well as e-learning, which has become a radical idea to increase the effectiveness of learning services in most schools, colleges and universities. E-learning can not be completely featured and…
Descriptors: Computer Science Education, Computer System Design, Computer Software Evaluation, Programming
Cifuentes, Laurent; Mercer, Rene; Alverez, Omar; Bettati, Riccardo – TechTrends: Linking Research and Practice to Improve Learning, 2010
We report on the design, development, implementation, and evaluation of a case-based instructional environment designed for learning network engineering skills for cybersecurity. We describe the societal problem addressed, the theory-based solution, and the preliminary testing and evaluation of that solution. We identify an architecture for…
Descriptors: Case Method (Teaching Technique), Problem Solving, Scaffolding (Teaching Technique), Instructional Design
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation