Cyber attacks, phishing, and ransomware incidents are predominantly user-facilitated threats; their success is reliant on a human interaction. Relying solely on the next generation of technology to ...
The government has set out an artificial intelligence (AI)-focused cyber security code of practice for UK businesses, which it describes as a “world first”. The Department for Science, Innovation and ...
Taking action to personally ensure computer security helps protect everyone from data and identity theft, viruses, hackers, and other abuses. Everyone who uses a computer makes Purdue’s computing ...
The past decade has seen an explosion in the concern for the security of information. This course introduces students to the basic principles and practices of computer and information security. Focus ...
Let’s be honest: most people only think about computer health when they’re facing a problem. Unfortunately, this approach can provide a false sense of security. When you understand the basics of ...
Computers play an essential role in all aspects of the management and safe and secure operation of nuclear facilities. Computer-based systems also support the authorities in the facilities’ regulation ...
Design and implement in a simulator a circuit using three different technologies. They assess their designs based on environmental impact in terms of maintenance and disposal, and on economic factors ...
On 1 January 2026, the Office of the Commissioner of Critical Infrastructure (Computer-system Security) issued a Code of Practice (the “CoP”) ...
Considering what healthcare systems might learn from past efforts to develop highly trustworthy computer systems.
The Saint Louis University Department of Computer Science offers courses at the undergraduate and graduate level. Content below is provided by SLU Academic Catalog. A broad survey of the computer ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results