Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Computer System Design | 2 |
| Higher Education | 2 |
| Identification | 2 |
| Information Technology | 2 |
| Campuses | 1 |
| Computer Interfaces | 1 |
| Computer Networks | 1 |
| Computer Software | 1 |
| Cost Effectiveness | 1 |
| Educational Trends | 1 |
| More ▼ | |
Source
| Campus Technology | 2 |
Author
| Grush, Mary | 1 |
| Zeltser, Lenny | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces

Direct link
