The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
XML and Web services are revolutioning the automatic management of distributed information, somewhat in the same way that HTML, Web browsers and search engines modified human acce...
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...