login
You are not logged in.
search:
AMSER logo
Search Results
|< << < > >|
Searched for: Key Concept is Computer science -- Security and privacy
Results 41 - 45 of 71
Companies often monitor employee computer and email activity. A law professor from Bentley College writes about workplace privacy in an essay from 2003. Citing a number of hypothetical examples, the author weighs the...
In this technical paper published in August 2002, researchers show that optical emanations from telecommunications devices can be monitored remotely. Light emitting diodes, often used as indicators in modems and other...
CyberWatch has been funded as an Advanced Technological Education (ATE) Regional Center of Excellence since 2005 (NSF Award Nos. 0501828 and 0902747) and has expanded its membership to 94 colleges in 29 states. With...
Security is on the minds of many in higher education, and the Center for Systems Security and Information Assurance (CSSIA) is very interested in playing a major role in this area of training and scholarship. With funds...
Many common questions about cryptography are answered in this May 2000 handbook by RSA Security, Inc. The contents include a basic introduction to cryptography, tools, applications, problems, cryptoanalysis, techniques...
Search time: 0.059 seconds
Sort by:
Hi
Lo
Order:
|< << < Too many (or not the right) results?  Refine your search! > >|
user login
Username:
Password:
why log in?
Manage your resources
Save, organize, and share resources that you find.

Subscribe to bulletins
Automatically be notified about new resources that match your interests.

It's easy, fast, and FREE!
Have a favorite applied math or science site you want others to know about?

SUGGEST a
NEW RESOURCE
to add to AMSER

Copyright 2015 Internet Scout Resource Metadata
Copyright 2015 Internet Scout
NSF NSDL University of Wisconsin Internet Scout
Leave Feedback
http://amser.org/