A Holistic Approach for Managing Spyware
نویسندگان
چکیده
منابع مشابه
A Holistic Approach for Managing Spyware
n the past, the main anti-malware targets for IT were viruses and worms. Yet, information privacy and security control are being increasingly challenged by the mushrooming emergence and propagation of spyware, which is one of the perilous cyber-threats confronting the IT community in terms of privacy violation. In general, most people regard spyware as a stealthy transmitter gathering and passi...
متن کاملManaging Student Support: A Holistic Approach
With the advance and scaling up of e-learning and distance learning provision, the scope of student support systems has extended and deepened, demanding consideration of the methods for its planning and implementation. Management of student support is used as an example of a key business process that is one part of a higher education enterprise’s end-to-end process of e-learning provision, with...
متن کاملA Holistic Approach for Managing Requirements of Data Warehouse Systems
Quantitive evaluations show that many data warehouse projects fail at an alarming rate, wasting all the time, money, and effort spent on them. Cost overruns and schedule delays are attributed in large part, to problems associated with requirements. Therefore, a crucial success factor for the implementation of data warehouse systems is efficient requirements management. In this paper we introduc...
متن کاملA Holistic Approach to Managing Microalgae for Biofuel Applications
Microalgae contribute up to 60% of the oxygen content in the Earth's atmosphere by absorbing carbon dioxide and releasing oxygen during photosynthesis. Microalgae are abundantly available in the natural environment, thanks to their ability to survive and grow rapidly under harsh and inhospitable conditions. Microalgal cultivation is environmentally friendly because the microalgal biomass can be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Systems Security
سال: 2006
ISSN: 1065-898X
DOI: 10.1201/1086.1065898x/46051.15.2.20060501/93407.6