NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Patel, Praj – Information Management & Technology, 1997
Because they bring a large gain in productivity for a small investment in software, training, and overhead, organizations are embracing intranets: private World Wide Web sites that limit access to select groups by placing the Web behind a "firewall" or using the server's ability to provide security. Discusses intranets, document…
Descriptors: Access to Information, Computer Security, Cooperative Programs, Cost Effectiveness