Computer Forensics
A competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations. This page will discuss the need to understand how computer forensics fits as a strategic element in overall organizational computer security. [...]
Safe Online Shopping
The Internet offers convenience not available from other shopping outlets: you can search for items from multiple vendors, compare prices with a few mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient [...]
Risks of File-Sharing Technology
What is file sharing? File sharing involves the use of technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some [...]
Articoli Recenti
Iscriviti alla Security Newsletter
Computer Forensics
A competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations. This page will discuss the need to understand how computer forensics fits as a strategic element in overall organizational computer security. [...]
Safe Online Shopping
The Internet offers convenience not available from other shopping outlets: you can search for items from multiple vendors, compare prices with a few mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient [...]
Risks of File-Sharing Technology
What is file sharing? File sharing involves the use of technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some [...]