|
|
|
|
Campbell, Marlene
Murray State University
Murray, Kentucky
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 9 of 9
reviews
|
|
|
|
|
|
|
|
Spam! Cranor L., LaMacchia B. Communications of the ACM 41(8): 74-83, 1998. Type: Article
The authors provide a brief background of the growth of unsolicited email (known as spam), list factors contributing to it, and discuss various mechanisms available for reducing such traffic. These mechanisms include filtering, counter...
|
Sep 1 1998 |
|
|
|
|
|
|
Privacy, information technology, and health care Rindfleisch T. Communications of the ACM 40(9): 92-100, 1997. Type: Article
The author presents a clear discussion of the advantages, disadvantages, and hazards of a move to electronic patient records (EPRs). He takes a systems view of privacy and information security in health care, putting “the mos...
|
Nov 1 1997 |
|
|
|
|
|
|
Is big brother hanging by his bootstraps? Greenberg L., Goodman S. Communications of the ACM 39(7): 11-16, 1996. Type: Article
A nice introductory paragraph points out that government interest in and reliance on information technologies (IT) is not new. The concluding sentence of that paragraph--“But just as governments affect the developmen...
|
Jul 1 1997 |
|
|
|
|
|
|
Delphi in depth Jensen C., Anderson L., Fung J., Lynnworth A., Ostroff M., Rudy M., Vivrette R., Osborne/McGraw-Hill, Berkeley, CA, 1996. Type: Book (9780078822117)
According to the introduction, This book covers Delphi--both 1.0 and 2.0 (and no doubt, will be applicable in many instances to future versions as well).…This book is for every Delphi developer. This book...
|
Jun 1 1997 |
|
|
|
|
|
|
Profiling computer science master’s programs Eerkes G. Communications of the ACM 34(1): 100-109, 1991. Type: Article
The August 1989 survey described in this well-written, comprehensive report covered 150 US and Canadian computer science master’s programs. The report, which includes a general description of the respondees as well as their r...
|
Jul 1 1992 |
|
|
|
|
|
|
Transaction security system Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
IBM’s relatively new Transaction Security System implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems with IBM components...
|
Mar 1 1992 |
|
|
|
|
|
|
Toward an ideal competency-based computer science teacher certification program: the Delphi approach Chen J. ACM SIGCSE Bulletin 21(1): 257-261, 1989. Type: Article
This paper reports on the results of a series of opinion surveys relating to certification for secondary- and junior high-school computer science teachers. Although it is well-written and concise, I feel that its content is borderline ...
|
Dec 1 1989 |
|
|
|
|
|
|
A course in number theory and cryptography Koblitz N. (ed), Springer-Verlag New York, Inc., New York, NY, 1987. Type: Book (9789780387965765)
Koblitz begins by immediately discussing bit operations and big-O notation and its relation to algorithm complexity. Basic number theory topics are introduced rather systematically. Material is well presented in reasonable-sized...
|
Apr 1 1988 |
|
|
|
|
|
|
Crypto management made manageable--demands on crypto equipment design Fåk V. Computers and Security 6(1): 36-40, 1987. Type: Article
Increased security consciousness in most large organizations has brought on an increase in the use of encryption; and crypto management is, indeed, possible in a normal computer environment. In some instances, such as protecting files ...
|
Feb 1 1988 |
|
|
|
|
|
|
|
|
|
|
|