|Searched for: Key Concept is Computer science -- Security and privacy
|Results 41 - 45 of 71
Companies often monitor employee computer and email activity. A law professor from Bentley College writes about workplace privacy in an essay from 2003. Citing a number of hypothetical examples, the author weighs the...
In this technical paper published in August 2002, researchers show that optical emanations from telecommunications devices can be monitored remotely. Light emitting diodes, often used as indicators in modems and other...
CyberWatch has been funded as an Advanced Technological Education (ATE) Regional Center of Excellence since 2005 (NSF Award Nos. 0501828 and 0902747) and has expanded its membership to 94 colleges in 29 states. With...
Security is on the minds of many in higher education, and the Center for Systems Security and Information Assurance (CSSIA) is very interested in playing a major role in this area of training and scholarship. With funds...
Many common questions about cryptography are answered in this May 2000 handbook by RSA Security, Inc. The contents include a basic introduction to cryptography, tools, applications, problems, cryptoanalysis, techniques...
|Search time: 0.126 seconds
Manage your resources
Save, organize, and share resources that you find.
Subscribe to bulletins
Automatically be notified about new resources that match your interests.
It's easy, fast, and FREE!