Dogu Akdeniz Universitesi

1.1. The New Insecurity

Since the terrorist attacks on September 11, 2001, computer security has taken on some new meanings. The first is positive.…

1 yıl ago

1.1.1.1. Information Sharing and Analysis Centers

Akin to CERTs, Information Sharing and Analysis Centers (ISACs) help develop and promulgate "best practices" for protecting critical infrastructures and…

1 yıl ago

1.1.2.1. Computer Crime

Computer crime has also become a major threat to business. According to the Federal Bureau of Investigation, computer crime is…

1 yıl ago

1.1.1.3. No computer Is An Island

While once it was easy to ignore most warnings and scares as mere nuisances because most sites were isolated and…

1 yıl ago

1.1.1.2. Vulnerable broadband

Just as corporate and government users are bonding together to provide mutual protection, however, a huge emerging class of users…

1 yıl ago

Review of Frequently used UNIX Commands

REVIEW OF FREQUENTLY USED UNIX COMMANDSGENERAL COMMAND SYNTAX:$ command –[options] <arguments>DISPLAYING CONTENTS OF A DIRECTORY:$ ls      (simple form)$ ls –l  …

2 yıl ago

Exercisec About FILES (ifstream)

FILE EXERCISES student.txt file contains student number, mt1, mt2 and final exam results 980000 50 40 60 980001 38 90…

2 yıl ago

Lecture 1

CSIT341 LECTURE 1 INPUT/OUTPUT : OUTPUT : Uses ostream class cout is the object of the class ostream Output Operator…

15 yıl ago