Browsing by Subject "Internet security"
Now showing items 1-2 of 2
-
The diminishing private network security perimeter defense
(Fountain publishers kampala, 2007)It is difficult to believe that just a few years ago, no one would worry about the security of a computer or a computer network for that matter. Computer security literally meant protecting your computer from thieves. Then ... -
Managing spam through mapping anti-spam software to e-mail policy: a case study of the Copperbelt University, Zambia
(2008-10)The emergence of unsolicited commercial electronic mail (UCE) also known as spam in 1978 has become a big global problem. What is being experienced now is that the numbers of unsolicited commercial electronic mails are ...