Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Service computing has become a very promising area of research and development for business-to-business integration, enterprise service migration and communication on the Internet. It provides the potential of communicating businesses online, and expands to become a large scale organization. Service market is growing continuously and need for service innovation is associated with demands for service...
Network education given in the universities and in the other education areas constitutes the backbone of computer science. This education is provided not only in theoretical form but also in the practical way. Since it is hard to settle some information of computer networks in learners' mind practices are the necessary activities of learning process. As the visuality increases, learners start learning...
This paper describes how the author integrates work culture issues into his undergraduate course in Software Engineering. This is a required course for all Computer Science majors in our program. At issue is how work culture impacts upon the quality of the products being created by Software Engineers. The course addresses work culture concerns such as: What kinds of work culture issues arise during...
Computers have become a very important part of our society. Most operations done in industrial, commercial, military, educational and sanitary areas (among others) would not work properly without the use of computing. As society is becoming ever more dependent on computers, we are also becoming increasingly vulnerable due to the widespread misuse of them. The development of IT ethics, along with the...
In this paper, we describe a new computer science course, CSC115, that fulfills a general education scientific analysis requirement at the College of Staten Island of CUNY. This course is an introduction to fundamental scientific concepts in computers and technology, including information representation, development and application of algorithms, network and communication principles, and critical...
With the extensive application of cryptography technologies in our lives, cryptography course has been paid more attention to in many universities. The contents of cryptography course are profound and complicated, so it becomes quite hard for some undergraduate students with less mathematical background. In addition to, the class hours have not enough and experimental condition is very poor in some...
The number of computer forensics related courses in Australian universities tripled in the last three years. This unprecedented growth is fuelled by the growth of the discipline itself and the increase in demand for specialists by both law enforcement agencies and business organisations. This paper presents an overview of current computer forensics education in Australian tertiary institutions. We...
With the advent of the Internet and the World Wide Web, the focus on securing information has become a topic of increasing importance. To ensure the security of information in a society of e-commerce, e-business, and e-sharing it is essential for graduates of computer science departments to be trained in the fundamentals of information security and to gain hands-on experience with security tools....
Software systems continue to become more complex. However, with this increased complexity, also comes an increased chance of malicious attacks resulting in system failures. Since 1988 statistics indicate that corresponding to the phenomenal growth of the Internet, the number of security incidents reported to the Computer Emergency Response Team has increased by 498%, and the number of Internet sites...
For the past 20 years, Seattle University's Master of Software Engineering program has incorporated industry sponsored projects into its capstone course sequence. Starting in 2005 the program was expanded to leverage projects that would cut across the themes presented in various courses to enable students to experience continuity and a common pedagogical application in various topics. The projects...
Agile processes play an important role in the authorpsilas undergraduate course in software engineering. The course is a required course for undergraduate majors in Computer Science. Agile processes, like eXtreme Programming (XP), have been criticized for not providing a good framework for building secure software. The course begins by covering what some people have called ldquothe warrdquo between...
University computer science and software engineering students must build reliability and security into their software applications from the start of development. A graduate-level Software Testing and Reliability course at North Carolina State University has a learning objective of using appropriate testing techniques for the development of a reliable and secure system. Beginning in Fall 2005, the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.