NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Peer reviewed Peer reviewed
Gregory, Bob; Lonabocker, Louise – College and University, 1986
Alternative methods of storing and handling the registrar's records are described, and their relative advantages and disadvantages are noted. The methods include paper files, micrographics (computer output microfilm and source document microfilm), and electronic image systems. (MSE)
Descriptors: College Administration, Comparative Analysis, Computer Storage Devices, Costs