You are not logged in
Key Concept is
Computer science -- Security and privacy
31 - 35
Model Program: Cyberwatch A.S. Information Assurance Degree
This page includes details on the model Information Assurance Degree created by the CyberWatch Center. The center assists colleges in mapping their own curriculum. This resource is meant to be a launching off point for...
Private Circuits: Securing Hardware against Probing Attacks
A paper presented at the 2003 International Cryptology Conference considers the vulnerability of embedded cryptosystems to side channel attacks, which are different from normal security violations because they involve...
Quantum Cryptography in Norway
This page describes a research project in quantum cryptography from the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology. In addition to information about the...
Gordon and Mike's ICT Podcast: The Jester and DoS, Preventing Attacks, Seizure of Domain Names and Other Topics
Gordon and Mike's ICT Podcast offers perspectives on the information and communication technologies (ICT) industries from Gordon Snyder and Mike Qaissaunee. In this podcast, the hosts discuss a variety of topics...
Firewall: Network Address Translation/Port Address Translation
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Douglas Tabbutt, provides a basic lesson on firewalls. This learning...
Date Of Record Creation
Date Record Checked
Date Last Modified
Date Of Record Release
Full Record Views
Resource URL Clicks
Too many (or not the right) results?
Refine your search!
forget your password?
Manage your resources
Save, organize, and share resources that you find.
Subscribe to bulletins
Automatically be notified about new resources that match your interests.
It's easy, fast, and FREE!
get your own login
Copyright 2014 Internet Scout