NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Negroponte, Nicholas P. – Scientific American, 1991
Creative applications of computer networks are discussed. Products and services of the future that come from imaginative applications of both channel and computing capacity are described. The topics of entertainment, transactions, and electronic personal surrogates are included. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Blake, Cecil – 1991
This paper discusses current information technologies and their applications, both real and potential, in the field of public relations. It is argued that public relations are more important than ever in view of global events that challenge the world's ability to handle problems related to public trust and confidence, and the telecommunications…
Descriptors: Computer Networks, Computer Science, Databases, Developing Nations
Sproull, Lee; Kiesler, Sara – Scientific American, 1991
Discussed are how computer networks can affect the nature of work and the relationships between managers and employees. The differences between face-to-face exchanges and electronic interactions are described. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Beckham, Bonnie – Technological Horizons in Education, 1989
Assesses BRUNET, a campuswide network that links more than 100 academic and administrative buildings and 40 dormitories. Notes a key element is hierarchical network management and support. Discusses the deployment, security, and use of four networking spheres in the system. (MVL)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Walker, Ellen; Rodger, Susan – 1996
The PipeLINK program seeks to attract and retain women and girls in computer science careers. Aimed at girls and women from the high school through the Ph.D. levels, the program suggests activities to aid participants at each level, connect students with role models and mentors, and provides an introduction to a wide variety of computer science…
Descriptors: Career Choice, Computer Networks, Computer Science, Computer Science Education