Back to comment hit list
Back to comment hit list

MERLOT II


    

Comment


Material:

Computer Crimes: Security Implications to Minimizing Vulnerability

Rating: 5 stars
Used in Course: Used in course
Submitted by: Azubike Okpalaeze (Faculty), Oct 06, 2009
Comment: Used to enhance students understanding of computer crime vulnerability and how to avoid common pitfall and consequent financial and emotional losses.
Time spent reviewing site: Thirty minutes