Bilgi Teknolojileri Bolumu (35) ( ITEC / CSIT)

1.1. The New Insecurity

Since the terrorist attacks on September 11, 2001, computer security has taken on some new meanings. The first is positive.…

10 ay ago

1.1.1.1. Information Sharing and Analysis Centers

Akin to CERTs, Information Sharing and Analysis Centers (ISACs) help develop and promulgate "best practices" for protecting critical infrastructures and…

12 ay ago

1.1.2.1. Computer Crime

Computer crime has also become a major threat to business. According to the Federal Bureau of Investigation, computer crime is…

1 yıl ago

1.1.1.3. No computer Is An Island

While once it was easy to ignore most warnings and scares as mere nuisances because most sites were isolated and…

1 yıl ago

1.1.1.2. Vulnerable broadband

Just as corporate and government users are bonding together to provide mutual protection, however, a huge emerging class of users…

1 yıl ago

Review of Frequently used UNIX Commands

REVIEW OF FREQUENTLY USED UNIX COMMANDSGENERAL COMMAND SYNTAX:$ command –[options] <arguments>DISPLAYING CONTENTS OF A DIRECTORY:$ ls      (simple form)$ ls –l  …

2 yıl ago

Exercisec About FILES (ifstream)

FILE EXERCISES student.txt file contains student number, mt1, mt2 and final exam results 980000 50 40 60 980001 38 90…

2 yıl ago

Lecture 1

CSIT341 LECTURE 1 INPUT/OUTPUT : OUTPUT : Uses ostream class cout is the object of the class ostream Output Operator…

15 yıl ago