JM Shaikh - Managerial Auditing Journal, 2005 - emerald.com
Purpose–We expect an explosive application of these technologies to take place when they become mature and may further assist auditors in improving the quality of their work. How to …
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of …
C Lynch - Museums in a digital age, 2013 - api.taylorfrancis.com
We have detected little or no evidence of technophobia among visitors. Indeed the usage of computers among visitors–at work, home or school–is very high at around 80-90 per cent …
A Barmouta, R Buyya - Proceedings International Parallel and …, 2003 - ieeexplore.ieee.org
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of …
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …
Cultural history enthusiasts have asserted the urgent need to protect digital information from imminent loss. Without action, much of what has been created in digital form is likely to …
As today's most complex computing environment, the Internet confronts IT researchers, system designers, and application developers with completely new challenges and, as a …
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information …
R Gilchrist, R Fogel, J Alsop - US Patent 7,613,923, 2009 - Google Patents
US7613923B2 - Method and apparatus for controlling unsolicited messaging in real time messaging networks - Google Patents US7613923B2 - Method and apparatus for controlling …