Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Campbell, Marlene
Murray State University
Murray, Kentucky
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 9 of 9 reviews

   
  Spam!
Cranor L., LaMacchia B. Communications of the ACM 41(8): 74-83, 1998.  Type: Article

The authors provide a brief background of the growth of unsolicited email (known as spam), list factors contributing to it, and discuss various mechanisms available for reducing such traffic. These mechanisms include filtering, counter...

Sep 1 1998  
  Privacy, information technology, and health care
Rindfleisch T. Communications of the ACM 40(9): 92-100, 1997.  Type: Article

The author presents a clear discussion of the advantages, disadvantages, and hazards of a move to electronic patient records (EPRs). He takes a systems view of privacy and information security in health care, putting “the mos...

Nov 1 1997  
  Is big brother hanging by his bootstraps?
Greenberg L., Goodman S. Communications of the ACM 39(7): 11-16, 1996.  Type: Article

A nice introductory paragraph points out that government interest in and reliance on information technologies (IT) is not new. The concluding sentence of that paragraph--“But just as governments affect the developmen...

Jul 1 1997  
  Delphi in depth
Jensen C., Anderson L., Fung J., Lynnworth A., Ostroff M., Rudy M., Vivrette R., Osborne/McGraw-Hill, Berkeley, CA, 1996.  Type: Book (9780078822117)

According to the introduction,
This book covers Delphi--both 1.0 and 2.0 (and no doubt, will be applicable in many instances to future versions as well).…This book is for every Delphi developer. This book...
Jun 1 1997  
  Profiling computer science master’s programs
Eerkes G. Communications of the ACM 34(1): 100-109, 1991.  Type: Article

The August 1989 survey described in this well-written, comprehensive report covered 150 US and Canadian computer science master’s programs. The report, which includes a general description of the respondees as well as their r...

Jul 1 1992  
  Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991.  Type: Article

IBM’s relatively new Transaction Security System implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems with IBM components...

Mar 1 1992  
  Toward an ideal competency-based computer science teacher certification program: the Delphi approach
Chen J. ACM SIGCSE Bulletin 21(1): 257-261, 1989.  Type: Article

This paper reports on the results of a series of opinion surveys relating to certification for secondary- and junior high-school computer science teachers. Although it is well-written and concise, I feel that its content is borderline ...

Dec 1 1989  
  A course in number theory and cryptography
Koblitz N. (ed), Springer-Verlag New York, Inc., New York, NY, 1987.  Type: Book (9789780387965765)

Koblitz begins by immediately discussing bit operations and big-O notation and its relation to algorithm complexity. Basic number theory topics are introduced rather systematically. Material is well presented in reasonable-sized...

Apr 1 1988  
  Crypto management made manageable--demands on crypto equipment design
Fåk V. Computers and Security 6(1): 36-40, 1987.  Type: Article

Increased security consciousness in most large organizations has brought on an increase in the use of encryption; and crypto management is, indeed, possible in a normal computer environment. In some instances, such as protecting files ...

Feb 1 1988  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy