Search For:

Displaying 1-3 out of 3 total
A View from the C-Suite
Found in: IEEE Security & Privacy
By Edward G. Amoroso,Hugh Thompson
Issue Date:January 2013
pp. 11-12
Businesses need to make tradeoffs: they need to balance resources between delivering technology that will help them grow while committing resources to protect the enterprise. This special issue taps into the business view of information security.
From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
Found in: IEEE Security & Privacy
By Edward G. Amoroso
Issue Date:January 2013
pp. 23-31
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and adva...
A graduate course in computing security technology
Found in: Proceedings of the twenty-fourth SIGCSE technical symposium on Computer science education (SIGCSE '93)
By Edward G. Amoroso
Issue Date:February 1993
pp. 313-317
Performance is a central issue in parallel computing. In this paper, we describe our approach to teaching advanced undergraduates and graduate students about the fundamentals of measuring and analyzing the performance of programs running on a variety of pa...