Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Information Technology | 4 |
| Metadata | 4 |
| Statistical Analysis | 4 |
| Access to Information | 2 |
| Computer Networks | 2 |
| Computer Security | 2 |
| Electronic Libraries | 2 |
| Information Management | 2 |
| Program Effectiveness | 2 |
| Academic Libraries | 1 |
| Adoption (Ideas) | 1 |
| More ▼ | |
Source
| ProQuest LLC | 3 |
| Online Submission | 1 |
Author
| Alemneh, Daniel Gelaw | 1 |
| Amin, Rohan Mahesh | 1 |
| Baudino, Frank, Ed. | 1 |
| Handorf, C. Russell | 1 |
| Johnson, Carolyn, Ed. | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Collected Works - Proceedings | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
| Missouri | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Baudino, Frank, Ed.; Johnson, Carolyn, Ed. – Online Submission, 2014
Eighteen scholarly papers and twelve abstracts comprise the content of the fourteenth annual Brick and Click Libraries Symposium, held annually at Northwest Missouri State University in Maryville, Missouri. The proceedings, authored by academic librarians and presented at the symposium, portray the contemporary and future face of librarianship.…
Descriptors: Academic Libraries, Librarians, Information Technology, Electronic Libraries
Alemneh, Daniel Gelaw – ProQuest LLC, 2009
Digital preservation is a significant challenge for cultural heritage institutions and other repositories of digital information resources. Recognizing the critical role of metadata in any successful digital preservation strategy, the Preservation Metadata Implementation Strategies (PREMIS) has been extremely influential on providing a "core" set…
Descriptors: Preservation, Metadata, Cultural Background, Museums
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Direct link
