NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Guerard, Genie; Chandler, Robin L. – Journal of Archival Organization, 2006
This article highlights the California Cultures Project as a case study examining the architecture and framework required to support the deployment of digital objects as virtual collections at the California Digital Library. Chronologically arranged, it describes the Online Archive of California (OAC) Working Group's functional requirements for…
Descriptors: Library Materials, Selection, Preservation, Electronic Publishing