Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Oriented Programs | 2 |
| Computer Security | 2 |
| Computers | 2 |
| Administration | 1 |
| Artificial Intelligence | 1 |
| Change Strategies | 1 |
| Computer Networks | 1 |
| Data | 1 |
| Information Management | 1 |
| Information Security | 1 |
| Information Technology | 1 |
| More ▼ | |
Author
| Akins, M. L. | 1 |
| Bui Thanh Hung | 1 |
| Gayatri Parasa | 1 |
| Griffin, J. R. | 1 |
| Prasun Chakrabarti | 1 |
| S. Siva Shankar | 1 |
| Tulika Chakrabarti | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security

Peer reviewed
Direct link
