NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Taylor, Arlene G. – 1999
This book addresses the history, theory, and practices of the organization of recorded information. Chapter 1, "Organization in Human Endeavors," looks at the basic human need to organize and how it is approached in various environments. Chapter 2, "Retrieval Tools," is concerned with the formats and functions of basic…
Descriptors: Classification, Computer System Design, Information Industry, Information Management
Peer reviewed Peer reviewed
Sprehe, J. Timothy – Government Information Quarterly, 1997
The United States Bureau of the Census is making the Internet and other electronic systems the primary sources for its statistics and is actively seeking user feedback on its systems design activities. Discusses the design principles of the Data Access and Dissemination System (DADS) and policy issues of pricing/cost recovery, partnerships, and…
Descriptors: Access to Information, Computer System Design, Costs, Databases