You are not logged in
GEM Subject is
Vocational Education -- Technology
821 - 825
Cyber Security Education Consortium (CSEC)
The Cyber Security Education Consortium (CSEC) is "is a National Science Foundation ATE Regional Center of Excellence dedicated to building an information security workforce who will play a critical role in implementing...
Created by Frank B. Brokken of the Computing Center at the University of Groningen, this document is intended for ?knowledgeable users of C (or any other language using a C-like grammar, like Perl or Java) who would l...
Inside Dynamic HTML (DHTML)
Inside Dynamic HTML is provided by Scott Isaacs, a Program Manager at Microsoft Corporation and author of
Inside Dynamic HTML.
It is intended to be a resource for web developers which emphasizes the use of HTML, CSS,...
Chaffing and Winnowing: Confidentiality without Encryption
This paper, provided by Ronald L. Rivest, professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, proposes a new method of computer message security. The method is called...
Journal of Information, Law, and Technology
JILT, an "electronic law journal covering a range of topics relating to IT law and applications," publishes a combination of peer and non-peer reviewed articles, as well as reviews, commentaries, and related news.
Date Of Record Creation
Date Record Checked
Date Last Modified
Date Of Record Release
Full Record Views
Resource URL Clicks
This search is also available as an
forget your password?
Manage your resources
Save, organize, and share resources that you find.
Subscribe to bulletins
Automatically be notified about new resources that match your interests.
It's easy, fast, and FREE!
get your own login
Copyright 2014 Internet Scout