Searching for email : 51 results found | RSS Feed for this search

1 2

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Email address directory

Description

This is an illustration of an email address directory. It shows individual names and corresponding email addresses.

Subjects

email | email directories | business | email addresses | correspondence | administration | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | Employability | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | administrative studies | N000 | A

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Example of spam email

Description

This is an illustration of a piece of spam or junk email, together with an attachment.

Subjects

spam emails | junk emails | spam | email | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | INFORMATION | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | Design and delivery of programmes | Students | Employability | administrative studies | N000 | INFORMATION TECHNOLOGY and INFORMATION | A | C

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Animation depicting internal and external email

Description

An interactive animation showing internal and external email communication. (Copyright Swansea College 2005)

Subjects

emails | business | internal emails | external emails | globalisation | communications | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | Employability | Design and delivery of programmes | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | administrative studies | N000 | A

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Writing professional emails

Description

This resource looks at the do's and don'ts of writing professional emails

Subjects

emails | writing emails | professional communications | professional emails | making a good impression | coventry university | cele | administrative studies | N000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

15.599 Workshop in IT: Collaborative Innovation Networks (MIT) 15.599 Workshop in IT: Collaborative Innovation Networks (MIT)

Description

Diversity begets creativity—in this seminar we tap the amazing power of swarm creativity on the Web by studying and working together as Collaborative Innovation Networks (COINs). As interdisciplinary teams of MIT management, SCAD design, University of Cologne informatics, and Aalto University software engineering students we will explore how to discover latest trends on the Web, and how to make them succeed in online social networks. We study a wide range of methods for predictive analytics (coolhunting) and online social marketing (coolfarming), mostly based on social network analysis and the emerging science of collaboration. Students will also learn to use our own unique MIT-developed Condor tool for Web mining, social network analysis, and trend prediction. Diversity begets creativity—in this seminar we tap the amazing power of swarm creativity on the Web by studying and working together as Collaborative Innovation Networks (COINs). As interdisciplinary teams of MIT management, SCAD design, University of Cologne informatics, and Aalto University software engineering students we will explore how to discover latest trends on the Web, and how to make them succeed in online social networks. We study a wide range of methods for predictive analytics (coolhunting) and online social marketing (coolfarming), mostly based on social network analysis and the emerging science of collaboration. Students will also learn to use our own unique MIT-developed Condor tool for Web mining, social network analysis, and trend prediction.

Subjects

collaborative innovation networks | collaborative innovation networks | social networks | social networks | social marketing | social marketing | Web | Web | swarm creativity | swarm creativity | predictive analytics | predictive analytics | Web trends | Web trends | Facebook | Facebook | email | email | Web mining | Web mining | social network analysis | social network analysis | trend predictions | trend predictions | viral marketing | viral marketing | global virtual collaboration | global virtual collaboration

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

MAS.961 Special Topics: Designing Sociable Media (MIT) MAS.961 Special Topics: Designing Sociable Media (MIT)

Description

This project-based course explores new design strategies for social interaction in the computer mediated world. Through weekly readings and design assignments we will examine topics such as: Data-based portraiture Depicting growth, change and the passage of time Visualizing conversations, crowds, and networks Interfaces for the connected city Mobile social technologies The course emphasizes developing visual and interactive literacy. This project-based course explores new design strategies for social interaction in the computer mediated world. Through weekly readings and design assignments we will examine topics such as: Data-based portraiture Depicting growth, change and the passage of time Visualizing conversations, crowds, and networks Interfaces for the connected city Mobile social technologies The course emphasizes developing visual and interactive literacy.

Subjects

online | online | online behavior | online behavior | internet | internet | interface | interface | interaction | interaction | cultural mores | cultural mores | social cues | social cues | virtual world | virtual world | on-line community | on-line community | social networking | social networking | storytelling | storytelling | persona | persona | web 2.0 | web 2.0 | email | email | IM | IM | cooperation | cooperation | marketing | marketing | surveillance | surveillance | creativity | creativity | connection | connection | conversation | conversation | mobility | mobility | web design | web design | conceptual metaphor | conceptual metaphor

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-MAS.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

MAS.632 Conversational Computer Systems (MIT) MAS.632 Conversational Computer Systems (MIT)

Description

This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature. This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature.

Subjects

digital voice | digital voice | voice synthesis | voice synthesis | speech synthesis | speech synthesis | digital speech | digital speech | audio | audio | coding | coding | noise | noise | comprehension | comprehension | audio browsing | audio browsing | voice messaging | voice messaging | voice recognition | voice recognition | call center | call center | voice response | voice response | computer voice | computer voice | computer speech | computer speech | telephony | telephony | mobile applications | mobile applications | voicemail | voicemail

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-MAS.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

SP.240 Composing Your Life: Exploration of Self through Visual Arts and Writing (MIT) SP.240 Composing Your Life: Exploration of Self through Visual Arts and Writing (MIT)

Description

In this interdisciplinary seminar, we explore a variety of visual and written tools for self exploration and self expression. Through discussion, written assignments, and directed exercises, students practice utilizing a variety of media to explore and express who they are. In this interdisciplinary seminar, we explore a variety of visual and written tools for self exploration and self expression. Through discussion, written assignments, and directed exercises, students practice utilizing a variety of media to explore and express who they are.

Subjects

self-exploration | self-exploration | self-expression | self-expression | photography | photography | representations of self | representations of self | family history | family history | race | race | gender | gender | personal values | personal values | letters | letters | emails | emails | blogs | blogs | journals | journals | poetry | poetry | memoirs | memoirs | autobiographies | autobiographies | self-portraiture | self-portraiture | narrative | narrative | ESG.SP240 | ESG.SP240

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

21W.732-5 Introduction to Technical Communication: Explorations in Scientific and Technical Writing (MIT) 21W.732-5 Introduction to Technical Communication: Explorations in Scientific and Technical Writing (MIT)

Description

This course is designed to help you develop skills that will enable you to produce clear and effective scientific and technical documents. We will focus on basic principles of good writing-which scientific and technical writing shares with other forms of writing-and on types of documents common in scientific and technical fields and organizations. While the emphasis will be on writing, oral communication of scientific and technical information will form an important component of the course, as well. This course is designed to help you develop skills that will enable you to produce clear and effective scientific and technical documents. We will focus on basic principles of good writing-which scientific and technical writing shares with other forms of writing-and on types of documents common in scientific and technical fields and organizations. While the emphasis will be on writing, oral communication of scientific and technical information will form an important component of the course, as well.

Subjects

scienticifc writing | scienticifc writing | scientific documents | scientific documents | technical documents | technical documents | argument | argument | review | review | critique | critique | graphics | graphics | email | email | webpage writing | webpage writing | webpage design | webpage design | literature reivew | literature reivew | narrative essay | narrative essay | technical description | technical description | design proposal | design proposal

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Images of letters and a computer mailbox

Description

This resource shows alternating images of a pile of letters and a computer screen displaying a mailbox.

Subjects

letters | computers | emails | email inboxes | computer mailboxes | correspondence | Business and Administrative studies | BUSINESS / MANAGEMENT / OFFICE STUDIES | RETAILING | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL07 = SCQF 7 | Higher Certificate | NICAT 4 | CQFW 4 | NVQ 4 | Advanced Higher | SVQ 4 | HN Certificate | UK EL08 = SCQF 8 | Higher Diploma | NICAT 5 | CQFW 5 | HN Diploma | Diploma in HE | Employability | Design and delivery of programmes | Students | administrative studies | N000 | SALES MARKETING and RETAILING | A | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Animation depicting the receipt of new email

Description

An interactive animation showing receipt of a new internal email. (Copyright Swansea College 2005)

Subjects

email | business | networks | internal email | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | Design and delivery of programmes | Learning | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | administrative studies | N000 | A

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Format of an email address

Description

Resource comprises an email business address to demonstrate its component parts. (Copyright Swansea College 2005)

Subjects

email | email addresses | business | RETAILING | Business and Administrative studies | Learning | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | administrative studies | N000 | SALES MARKETING and RETAILING | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Internet spam

Description

This interactive learning object gives a detailed explanation as to what spam is, why people spam, how it works and what can be done to avoid receiving it. The information is presented by means of both text and illustrations and animations. Quiz-style questions are embedded within the resource to ascertain users' existing knowledge of what spam is, but a separate accompanying assessment tests and consolidates what has been learned. The resource also features a number of additional tools designed to enhance the user experience, including a magnifying glass, calculator, notepad and colour changer.

Subjects

email | unsolicited email | junk mail | INFORMATION | Mathematical and Computer Sciences | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | Learning | Computer science | I100 | INFORMATION TECHNOLOGY and INFORMATION | C

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Email

Description

This is a graphic illustration depicting an email address and binary code.

Subjects

business | e-commerce | email addresses | emails | binary code | internet | RETAILING | BUSINESS / MANAGEMENT / OFFICE STUDIES | INFORMATION | Business and Administrative studies | Mathematical and Computer Sciences | Employability | Teaching | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | UK EL07 = SCQF 7 | Higher Certificate | NICAT 4 | CQFW 4 | NVQ 4 | Advanced Higher | SVQ 4 | HN Certificate | administrative studies | Computer science | N000 | I100 | EDUCATION / TRAINING / TEACHING | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | A | G | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

ES.240 Composing Your Life: Exploration of Self through Visual Arts and Writing (MIT) ES.240 Composing Your Life: Exploration of Self through Visual Arts and Writing (MIT)

Description

In this interdisciplinary seminar, we explore a variety of visual and written tools for self exploration and self expression. Through discussion, written assignments, and directed exercises, students practice utilizing a variety of media to explore and express who they are. In this interdisciplinary seminar, we explore a variety of visual and written tools for self exploration and self expression. Through discussion, written assignments, and directed exercises, students practice utilizing a variety of media to explore and express who they are.

Subjects

self-exploration | self-exploration | self-expression | self-expression | photography | photography | representations of self | representations of self | family history | family history | race | race | gender | gender | personal values | personal values | letters | letters | emails | emails | blogs | blogs | journals | journals | poetry | poetry | memoirs | memoirs | autobiographies | autobiographies | self-portraiture | self-portraiture | narrative | narrative | ESG.SP240 | ESG.SP240

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-ES.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

21W.732-5 Introduction to Technical Communication: Explorations in Scientific and Technical Writing (MIT)

Description

This course is designed to help you develop skills that will enable you to produce clear and effective scientific and technical documents. We will focus on basic principles of good writing-which scientific and technical writing shares with other forms of writing-and on types of documents common in scientific and technical fields and organizations. While the emphasis will be on writing, oral communication of scientific and technical information will form an important component of the course, as well.

Subjects

scienticifc writing | scientific documents | technical documents | argument | review | critique | graphics | email | webpage writing | webpage design | literature reivew | narrative essay | technical description | design proposal

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Contact Form with HTML, CSS and PHP

Description

This set of video tutorials explains how to create a contact form for a web page in HTML, style it with CSS and make it work using PHP server side scripting. Some experience with HTML is assumed, but no previous experience of PHP is required.

Subjects

forms | html | css | php | web development | dreamweaver | contact | email | ukoer | INFORMATION TECHNOLOGY and INFORMATION | C

License

Attribution-Noncommercial 2.0 UK: England & Wales Attribution-Noncommercial 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc/2.0/uk/ http://creativecommons.org/licenses/by-nc/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Writing and Reading Effective Business E-mails - Learning Package

Description

A learning activity designed to provide a clear understanding of e-mail communication and its impacts.

Subjects

employability | emails | writing | interpreting | ukoer | business communication | administrative studies | N000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Writing and Reading Effective Business Emails - Raw Materials

Description

This is the raw materials package for a learning activity designed to provide a clear understanding of e-mail communication and its impacts.

Subjects

emails | employability | employers | skills | reading | writing | ukoer | administrative studies | N000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Amstrad Emailer

Description

Amstrad Emailer. Maker: Amstrad - from the The Betty Smithers Design Collection at Staffordshire University.

Subjects

emailer | ukoer | design | W000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Example of an email

Description

An illustration of an email with attachments. (Copyright Swansea College 2005)

Subjects

emails | attachments | documents | communications | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | Employability | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | administrative studies | N000 | A

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata