Academic literature on the topic 'Biometry. Computer security. Computers Computer software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometry. Computer security. Computers Computer software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometry. Computer security. Computers Computer software"

1

Chinwe C, Ibebuogu, Philip Seth, and Anyaduba Obiageli J. "Biometric Authentication System Using Face Geometry." International Journal of Engineering and Computer Science 8, no. 08 (2019): 24805–13. http://dx.doi.org/10.18535/ijecs/v8i08.4332.

Full text
Abstract:
This seminar paper deals with biometric authentication, using human facial geometry as the login verification parameter. Biometric is the measurement and statistical analysis of human's unique physical and behavioral characteristics by mapping face geometry, fingerprints, iris, and voice. The aim of this seminar paper is to develop a functional Biometric Authentication System Using Face Geometry as the authentication method. Facial Geometry Authentication is a category of biometric technology that maps an individual's facial features mathematically and stores the data as face-prints in a datab
APA, Harvard, Vancouver, ISO, and other styles
2

Zhifang Wang, Shuangshuang Wang, and Qun Ding. "Security of Multimodal Biometric Fusion System." International Journal of Digital Content Technology and its Applications 5, no. 4 (2011): 264–70. http://dx.doi.org/10.4156/jdcta.vol5.issue4.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Хайдаров, Александр Александрович, Сергей Александрович Бодячевский, and Николай Николаевич Толстых. "RISK ASSESSMENT OF SUCCESSFUL IMPLEMENTATION OF SPOOFING ATTACKS ON VOICE AUTHENTICATION ELEMENTS IN DISTRIBUTED COMPUTER SYSTEMS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 9, 2021): 115–26. http://dx.doi.org/10.36622/vstu.2021.24.1.011.

Full text
Abstract:
Цель исследования заключается в рекомендациях по улучшению мер защиты голосовых систем аутентификации от реализации спуфинг-атак. В работе рассмотрены разнообразные виды спуфинг-атак и выделены самые опасные на данный момент. Разработана методика оценки защищенности голосовых систем аутентификации, учитывающая воздействие различных видов спуфиг-атак на системы голосовой аутентификации. Проведены количественные эксперименты, показывающие преимущество разработанной методики, в сравнении с существующими аналогами. Описан комплекс программных средств оценки защищенности систем голосовой аутентифик
APA, Harvard, Vancouver, ISO, and other styles
4

Milinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.

Full text
Abstract:
Nowadays, the development and the application of biometric systems on one hand, and the large number of hardware and software manufacturers on the other, caused two the most common problems of biometric systems: a problem of interoperability between system's components as well as between different biometric systems and a problem of biometric data security and privacy protection, both in storage and exchange. Specifications and standards, such as BioAPI and CBEFF, registered and published as multiple standards by ISO (International Organization for Standardization), propose the establishment of
APA, Harvard, Vancouver, ISO, and other styles
5

Singleton, Tommie. "Biometric Security Systems: The Best Infosec Solution?" EDPACS 30, no. 9 (2003): 1–24. http://dx.doi.org/10.1201/1079/43292.30.9.20030301/41230.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smiatacz, Maciej, and Bogdan Wiszniewski. "Just look at to open it up:." Multimedia Tools and Applications 80, no. 13 (2021): 20089–124. http://dx.doi.org/10.1007/s11042-021-10533-8.

Full text
Abstract:
AbstractElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface to encrypted documents with a biometric facial identity verification providing highly personalized security mechanism based on pseudo-identities. In consequence
APA, Harvard, Vancouver, ISO, and other styles
7

Paul, Padma P., and Marina L. Gavrilova. "Cancelable Fusion of Face and Ear for Secure Multi-Biometric Template." International Journal of Cognitive Informatics and Natural Intelligence 7, no. 3 (2013): 80–94. http://dx.doi.org/10.4018/ijcini.2013070105.

Full text
Abstract:
Biometric fusion to achieve multimodality has emerged as a highly successful new approach to combat problems of unimodal biometric system such as intraclass variability, interclass similarity, data quality, non-universality, and sensitivity to noise. The authors have proposed new type of biometric fusion called cancelable fusion. The idea behind the cancelable biometric or cancelability is to transform a biometric data or feature into a new one so that the stored biometric template can be easily changed in a biometric security system. Cancelable fusion does the fusion of multiple biometric tra
APA, Harvard, Vancouver, ISO, and other styles
8

Yadav, Amit Kumar, Neeraj Gupta, Aamir Khan, and Anand Singh Jalal. "Robust Face Recognition Under Partial Occlusion Based on Local Generic Features." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 3 (2021): 47–57. http://dx.doi.org/10.4018/ijcini.20210701.oa4.

Full text
Abstract:
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various state-of-the-art methods of face recognition in constrained environments have achieved satisfactory results, there are still many issues which are untouched in unconstrained environments, such as partial occlusions, large pose variations, etc. In this paper, the authors have proposed an approach which utilized the local generic feature (LGF) to recognize the face in the
APA, Harvard, Vancouver, ISO, and other styles
9

Vigila, Soosai Antony Maria Celestin, Karuppiah Muneeswaran, and William Thomas Berkin Albert Antony. "Biometric security system over finite field for mobile applications." IET Information Security 9, no. 2 (2015): 119–26. http://dx.doi.org/10.1049/iet-ifs.2013.0286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.

Full text
Abstract:
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard bas
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometry. Computer security. Computers Computer software"

1

Mahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2003.<br>Title from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
APA, Harvard, Vancouver, ISO, and other styles
2

Fuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications))--Naval Postgraduate School, March 1992.<br>Thesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Julian, Donald P. "Delaying-type responses for use by software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FJulian.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Neil C. Rowe, J. Bret Michael. Includes bibliographical references (p. 55-57). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Taramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.

Full text
Abstract:
The rapid growth of information and communication systems in recent years has brought with it an increased need for security. Meanwhile, encryption, which constitutes the basis of the majority of security schemes, may imply a significant amount of energy consumption. Encryption algorithms, depending on their complexity, may consume a significant amount of computing resources, such as memory, battery power and processing time. Therefore, low energy encryption is crucial, especially for battery powered and passively powered devices. Thus, it is of great importance to achieve the desired security
APA, Harvard, Vancouver, ISO, and other styles
5

Shonola, Shaibu A. "Mobile learning security in Nigeria." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/98529/.

Full text
Abstract:
Innovation in learning technologies is driven by demands to meet students’ needs and make knowledge delivery easier by Higher Education Institutions. The technologies could play an important role in extending the possibilities for teaching, learning, and research in higher educational institutions (HEIs). Mobile learning emerged from this innovation as a result of massive use in the number of mobile devices due to availability and affordability among students. The lightweight nature of mobile devices in comparison to textbooks is also a source of attraction for students. Competition in the mob
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, Jennifer T. "A biodiversity approach to cyber security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/106820/.

Full text
Abstract:
Cyber crime is a significant threat to modern society that will continue to grow as technology is integrated further into our lives. Cyber attackers can exploit vulnerabilities to access computing systems and propagate malware. Of growing concern is the use of multiple exploits across layers of the software stack, plus faster criminal response times to newly disclosed vulnerabilities creating surges in attacks before signature-based malware protection can take effect. The wide scale adoption of few software systems fuels the problem, allowing identical vulnerabilities to be exploited across ne
APA, Harvard, Vancouver, ISO, and other styles
7

Katsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.

Full text
Abstract:
Decision making in the context of crime execution and crime prevention can be successfully investigated with the implementation of game-theoretic tools. Evolutionary and mean-field game theory allow for the consideration of a large number of interacting players organized in social and behavioural structures, which typically characterize this context. Alternatively, `traditional' game-theoretic approaches can be applied for studying the security of an arbitrary network on a two player non-cooperative game. Theoretically underpinned by these instruments, in this thesis we formulate and analyse g
APA, Harvard, Vancouver, ISO, and other styles
8

AlAdraj, Resala A. "Security and collaborative groupware tools usage." Thesis, University of Warwick, 2015. http://wrap.warwick.ac.uk/73319/.

Full text
Abstract:
This thesis investigates the usage problems of Online Collaborative Groupware (OCG) tools for learning at the University of Bahrain (UOB) in the Kingdom of Bahrain. An initial study revealed that the main problems faced by students when they use OCG tools in the learning process are security and trust. SWFG (Skype, Wiki, Facebook, and Gmail) tools were proposed as being effective and commonly used OCG tools for learning. A quasi-experiment has been done with UOB students to identify the perceptions of the students towards security, privacy and safety relating to use of SWFG tools. Based on thi
APA, Harvard, Vancouver, ISO, and other styles
9

Fragkos, Georgios. "An event-trace language for software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Tsigkritis, Theocharis. "Diagnosing runtime violations of security and dependability properties." Thesis, City University London, 2010. http://openaccess.city.ac.uk/1181/.

Full text
Abstract:
Monitoring the preservation of security and dependability (S&D) properties of complex software systems is widely accepted as a necessity. Basic monitoring can detect violations but does not always provide sufficient information for deciding what the appropriate response to a violation is. Such decisions often require additional diagnostic information that explains why a violation has occurred and can, therefore, indicate what would be an appropriate response action to it. In this thesis, we describe a diagnostic procedure for generating explanations of violations of S&D properties developed as
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometry. Computer security. Computers Computer software"

1

Core software security: Security at the source. Taylor & Francis, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Security matters: Getting software security right with static analysis. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Computer forensics: Computer crime scene investigation. Charles River Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steve, Lipner, ed. The security development lifecycle: SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Garay Juan, ed. Information security: 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Parker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. Icon Group International, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometry. Computer security. Computers Computer software"

1

Pulkkis, Göran, Kaj J. Grahn, and Jonny Karlsson. "Taxonomies of User-Authentication Methods in Computer Networks." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch054.

Full text
Abstract:
This chapter outlines classifications of user-authentication methods based on five different taxonomies. The outlined taxonomies are: user identification-based taxonomy, authentication methodology-based taxonomy, authentication quality-based taxonomy, authentication complexity-based taxonomy, and authentication scope-based taxonomy. Administration of user authentication is briefly discussed. A technical survey of different user-authentication methods and elements of a user-authentication method is also given. User-identification methods such as passwords, tokens, and biometric methods are described. Proposed and implemented user-authentication protocols to overcome security weaknesses of the basic password authentication are surveyed. New user-authentication protocols such as PANA and SOLA are also included. Protocols and software for user registration as well as centralized user authentication are presented and compared.
APA, Harvard, Vancouver, ISO, and other styles
2

Cooper, J. Arlin, and Anna M. Johnston. "Computer and Communications Security." In Computers, Software Engineering, and Digital Devices. CRC Press, 2018. http://dx.doi.org/10.1201/9781315220659-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.

Full text
Abstract:
The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administration programs, unauthorized access, denial of service, and so forth, and equally suggests measures of protecting the computers or networks such as installation of firewalls, use of antivirus, avoidance of opening unknown attachments, disabling of hidden filename extensions, keeping all applications parched, disconnecting from the net when not in use, regular backup of data, virtual private networks, and so forth.
APA, Harvard, Vancouver, ISO, and other styles
4

Garuba, Abdul Rahman. "Computer Virus Phenomena in Cybercafé." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch012.

Full text
Abstract:
The chapter examines the concepts, history, sources, spread, detection, and removal of computer viruses. The increase in the number of computers and accessibility to Internet has made it easy for hackers to invade systems all over the world. Computer viruses have reached epidemic numbers in many computer environments resulting in computer security vulnerabilities. Cybercafés systems/networks are potential objects of virus attacks due to the fact that they are connected to the Net. Cybercafé managers should have a good understanding of the risk and controls associated with various security technologies. It is the hope of the author that adequate awareness and understanding of the destructive devices by cybercafé managers and computer users generally will help secure their systems. It is recommended that cybercafé administrators develop a security policy for both employees and users.
APA, Harvard, Vancouver, ISO, and other styles
5

Baecker, Ronald M. "Security." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0013.

Full text
Abstract:
Throughout history, humanity has invented valuable technologies and ways to organize society. These innovations are typically accompanied by risks. Fire cooks food, and also provides heat on cold nights. Yet, when left unchecked, fire can cause huge damage as well as loss of life. Cities enabled new forms of community and commerce. However, they brought us more thievery, and made it easier for epidemics to spread. The automobile allowed a separation of locales for work and residence; trucks allowed goods to be shipped long distances. But vehicular accidents have caused far greater injury and loss of life than did mishaps with horses and mules. Information technology, like other technologies, has potential for good and for harm. In the first six chapters, we introduced aspects of human activity, such as education, medicine, and government, in which IT has been transformative and mostly positive. The next three chapters examine areas in which the negatives of IT are dominant, in which risks seem everywhere. This chapter focuses on security. IT security flaws are exploited by outsiders for personal or political gain. In Chapter 8 we shall look at safety, where the risks are often injury or loss of life. In Chapter 9, we shall look at privacy, where the risks are exposure of private, confidential, and even sensitive information. Security is the attribute of a computer system that ensures that it can continue to function properly after an attack. Attacks against computer systems happen routinely now, are in the news almost every week, and are accelerating in numbers and in impact. Damage to both individuals and organizations—financial losses, chaos, and deteriorating morale— is severe. We shall provide a primer on the multitude of ways computer systems, from large networks to mobile phones, can be ‘hacked’ so that they no longer function properly. We shall define the most common kinds of destructive software, often called malware. We will discuss large-scale data breaches, which now happen frequently and expose the personal data of millions to billions of people. The word hackers refers to individuals who disrupt digital technologies and thereby damage the functioning of an institution or a society.
APA, Harvard, Vancouver, ISO, and other styles
6

Ajewole, Ayotokunbo I. "Software Requirements for Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch009.

Full text
Abstract:
This chapter discusses basic software that should be found in a typical cybercafé setup. ‘Software requirements’ are broadly divided into requirements for the server side and client side of the network. As a commercial venture, it is of great importance that only necessary software be found installed in a cybercafé, to meet the café user’s need. Starting with an introduction, a general overview of the café user’s needs are set forth, thereby leading to the division into two broad areas: server and client side. An outline of the chapter is given. The background section gives some details on some basic terminologies (server, client, operating system, etc.) that a cybercafé user/prospective operator might want to get acquainted with. Software requirements for the server side of the café network are discussed first; general features of timing softwares, notes on Internet security, viruses, and spyware. As the café server is a very important element in café management, it is necessary that the server is not overwhelmed by unnecessary tasks thereby leading to a generally slow network. Software for the client side of the café network is discussed next with emphasis on basic software applications often used/requested by café users. Examples of such are word processing applications and graphics viewing software. Since a lot of computer literate people are familiar with the Windows operating system, all software discussed for client use derives from such a perspective. Some security issues necessary for maintaining crisp client computers are also discussed. Due to lack of in-depth knowledge about information security among internet users, the future trends section discusses the applicability of the personal Internet communicator in the Nigerian environment, because of its portability and built in security. Other possible trends in security and cyber-crime are also discussed. The chapter ends with a note that café users will continue to demand faster Internet speeds, and therefore operators must be on the search for latest software to meet their needs, latest security software to keep their café network always clean and secure. Future research directions include software development research to allow café users modify or design their desktops to their own taste while in the café. Complete café solution software is also proposed to cater for everything from operating systems to end-user applications which can be installed once, and from a single source.Literature used for this chapter is sourced mainly from the Internet, and from personal experience of the author, as there are not literatures dealing with ‘cybercafé software’ on a specific note. A whole lot of software are been used, and could be used in a café. This depends actually on general client’s requirements and/or the operator’s amount of know-how /preferences which may vary across different environments.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Thomas M., and Gregg W. Tally. "Malicious Software." In Software Applications. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-060-8.ch030.

Full text
Abstract:
Malicious software (malware) allows an intruder to take over or damage a target host without the owner’s consent and often without his or her knowledge. Over the past thirty years, malware has become a more serious worldwide problem as Internet-connected computers have proliferated and operating systems have become more complex. Today, the average PC user must be more cognizant of computer security than ever before due to the constant threat of possible infection. Although exact costs are difficult to determine, there is little doubt that malware has widespread impact on equipment damages, loss of data, and loss of productivity. According to surveys, malware is one of the most common and costly types of attack on organizations (CERT, CSO, &amp; ECTF, 2005).
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Thomas M., and Gregg W. Tally. "Malicious Software." In Encyclopedia of Internet Technologies and Applications. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch041.

Full text
Abstract:
Malicious software (malware) allows an intruder to take over or damage a target host without the owner’s consent and often without his or her knowledge. Over the past thirty years, malware has become a more serious worldwide problem as Internet-connected computers have proliferated and operating systems have become more complex. Today, the average PC user must be more cognizant of computer security than ever before due to the constant threat of possible infection. Although exact costs are difficult to determine, there is little doubt that malware has widespread impact on equipment damages, loss of data, and loss of productivity. According to surveys, malware is one of the most common and costly types of attack on organizations (CERT, CSO, and ECTF, 2005).
APA, Harvard, Vancouver, ISO, and other styles
9

Adogbeji, Oghenevwogaga Benson, and Esharenana E. Adomi. "Computer Networking of Cybercafés in Delta State, Nigeria." In Database Technologies. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-058-5.ch087.

Full text
Abstract:
The convergence of information and communication technology as embodied in the Internet has transformed the present day society into a knowledge society. Earlier, information and knowledge were passed by word of mouth or through manuscripts, and communication was a slow process, but today information is passed from one individual to an infinite number of other users through a number of media and formats which makes rapid and widespread dissemination of information possible (Preeti, 2006). This information dissemination has been so easy today due to the advent of computer network. Computer network is the interconnection of two or more computers for the purpose of sharing resources; this may involve the sharing of common database, software, printer etc. In networking, one may use peer-to-peer model or the client/server model. The peer-to-peer model is a decentralized networking model, which means all account administration is local to each machine and each machine maintains its own account database. In this model, each computer is equal or “peer” of the others. None of the members has total control over the others. This networking may involve the use of hub if the systems are more than two but none of the workstation has total control of the others. However, client/server type of network model is the type of network model, which is defined by the presence of server on the network that provides security and administration of the network. The server enables centralized database security and backup (Adogbeji &amp; Adomi, 2005). In order for the cyber cafés in Nigeria to be able to have access to the entire world and give access to users, there comes the need to network their computers. This they do using client/server model and star topology. This chapter investigates networking patterns in cybercafes in Delta state. It explores the types of network adopted locally, types of networking model adopted in the cafes, reasons for adopting the models, types of networking topology adopted and problems inherited in the networking pattern adopted. Recommendations for improvement are also set forth.
APA, Harvard, Vancouver, ISO, and other styles
10

Baecker, Ronald M. "Safety." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0014.

Full text
Abstract:
Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometry. Computer security. Computers Computer software"

1

Yanushkevich, Svetlana N., and Anna V. Shmerko. "Fundamentals of Biometric System Design: New Course for Electrical, Computer, and Software Engineering Students." In 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security (BLISS). IEEE, 2009. http://dx.doi.org/10.1109/bliss.2009.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

WISSEMAN, W., and DAVID GOBUTY. "A method for software implementation of computer security policy enforcement mechanisms." In 7th Computers in Aerospace Conference. American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Balakrishnan, Bhargav. "Software Framework for Authorized and Unauthorized Users in an Organization & Maintain High Security for IT Gadgets and Data (Using Encryption, Biometric, Bar Code)." In 2010 Second International Conference on Computer Engineering and Applications. IEEE, 2010. http://dx.doi.org/10.1109/iccea.2010.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Po Ting, and Yu-Cheng Chou. "Principles on Collaborations in Cloud-Aided X (CLAX)." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12882.

Full text
Abstract:
In the past few years, the Computer-Aided Technologies, also known as Computer-Aided X (CAX) have been evolving to the Cloud. Cloud computing provides remote services with data storage, software, platform and infrastructure. The next-generation computing applications rely on the collaborations using the technologies of Cloud-Aided Technologies, or Cloud-Aided X (CLAX). The engineers and designers at various locations in different time zones can collaboratively and simultaneously work on a computing design project using CLAX. Issues such as security, conflict, storage, and online computing are
APA, Harvard, Vancouver, ISO, and other styles
5

Röhl, Peter J., Raymond M. Kolonay, Michael J. Paradis, and Michael W. Bailey. "Intelligent Compressor Design in a Network-Centric Environment." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/cie-21667.

Full text
Abstract:
Abstract The concept of a federation of distributed devices on a network which enter the federation through a process of “discover and join”, by which they register with a service request broker and publish the services which they perform is applied to engineering software tools. A highly flexible computer architecture is developed, leveraging emerging web technologies like Sun Microsystems’ Jini™, RMI, JavaSpaces, in which engineering software tools like CAD, CAE, PDM, optimization, cost modeling, etc. act as distributed service providers and service requestors. The individual services commun
APA, Harvard, Vancouver, ISO, and other styles
6

"An Examination of Gen Z Learners Attending a Minority University." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3955.

Full text
Abstract:
Aim/Purpose: [This Proceedings paper was revised and published in the 2018 issue of the Interdisciplinary Journal of e-Skills and Lifelong Learning, Volume 14] This presentation presents the preliminary findings of a survey that sought to examine the technology uses, needs, interests, career goals, and professional expectations of Generation Z college students Background: Students entering college today are part of Generation Z born in the late 90’s through 2016 making the oldest among them 20 or so years old. They already outnumber millennials and are the first true digital natives being born
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!