Cyberattack on Florida Water Treatment Facility Should Prompt Security Assessments
Cybersecurity, Clean Energy, and Sustainability Top the Concerns of Engineers
NewsBriefs: NSF Grants $1.9 Million For Cybersecurity Research (Syracuse University)
NewsBriefs: Standards Bodies to Create Security Database (The Infrastructure Security Partnership)
Drinking Water: Pilot Project, Web Service Focus on Security
Storing Your Computer Data: Is There Such Thing as Security?
Implementation of a True Multi-User System on a PC
This paper describes the use of and experience with SCO XENIX, a version of the UNIX operating system from Santa Cruz Operation. SCO XENIX offers multi-user features and capabilities,...
A Computer System for Designing Physical Security
Microcomputer Security
The author emphasizes the importance of back-up in relation to microcomputer security. He also adds that equipment and accidental file destruction must be avoided. The author examines...
Security Issues in Transportation Software Development
While there may indeed be valid concern for controlling access to computers and programs, and data integrity should be considered, there should not be burdensome features which render...
Addressing the Risks of Computer Model Misuse
The proliferation of relatively inexpensive small computers, and accompanying transportation-oriented software, has brought many capabilities to transportation agencies previously unavailable...
Security Issues for Microcomputers
This paper addresses microcomputer security in the context of a transportation agency. Schemes for physical protection of hardware, such as locking workstations and alarms, are examined...
Effective Management of Microcomputer Resources
In recent years the number of microcomputers in the workplace has boomed. This has allowed the user to develop his own applications, but problems with decentralization, data security,...
Return to search