Search
Now showing items 31-34 of 34
Data in Depth: Web 3-D Technologies Provide New Approaches to the Presentation of Course Content
(2010)
For nearly two decades, the Web has provided the
classroom with vast, ever-expanding volumes of browseraccessible
information. As the web has evolved so too has
our desire to become more involved with the process ...
Small Business Information Security
(East Carolina University, 2012)
Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ...
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...
Data Breach Impacts on Companies and Their Consumers.
(2019-04-04)
This paper will describe a data breach and how they impact the company and consumers involved. Statistics will be provided on the financial impact of a data breach to a company. Three recent data breach examples will be ...