Displaying 161-176 of 412 results for inside risks.
Research and Advances

Two Approaches to an Information Security Laboratory

Hands-on course work plays an important role in information security education. Through such course work, students can apply, deepen, and extend the conceptual knowledge taught in more theory-oriented lectures. Moreover, they can acquire experience with, and an understanding of, realistic systems, which is particularly important in Information Security. Hands-on experience shows how often a system’s […]
Opinion

Words Both Kind and Contrary

For the first time in many, many years I found Communications (July 2008) both friendly to the reader and useful. Over the years, the physical form and font of the issues were very unfriendly, let alone the content, which was quite rarified. Not this latest issue. The redesign makes the physical attributes—paper (non-glossy, yeah!), layout, […]
Research and Advances

Collaborative Virtual Design Environments: Introduction

Computer-generated animated and enhanced movies and training simulations are now commonplace because of an exponential increase in cost-effective computer power and software robustness. Today, pilots and astronauts routinely train and practice normal and emergency scenarios much as they would in a real vehicle in an operational environment. As entertainment-seeking consumers, we regularly find ourselves viewing movies, TV, and games containing imaginary dinosaurs, aircraft dogfights, monsters, and voyages to other planets and galaxies.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More