Back to comment hit list
Back to comment hit list
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II


    

Comment


Material:

Computer Crimes: Security Implications to Minimizing Vulnerability

Rating: 5 stars
Used in Course: Used in course
Submitted by: Azubike Okpalaeze (Faculty), Oct 06, 2009
Comment: Used to enhance students understanding of computer crime vulnerability and how to avoid common pitfall and consequent financial and emotional losses.
Time spent reviewing site: Thirty minutes