2,311 research outputs found

    Special Libraries, October 1935

    Get PDF
    Volume 26, Issue 8https://scholarworks.sjsu.edu/sla_sl_1935/1007/thumbnail.jp

    Computer‐assisted learning as an alternative to didactic lectures: A study of teaching the physics of diagnostic imaging

    Get PDF
    A computer‐assisted learning (CAL) package entitled Physics of Diagnostic Imaging was developed in 1995 to replace five hours of didactic lectures at the University of Glasgow Faculty of Veterinary Medicine, and has been available as an additional learning resource for students in the other five UK veterinary schools for over three years. The package was reviewed by peer experts and the reaction of the students to its use gauged by post‐task questionnaire administration, informal discussions and observation. To assess the effect of integration into the curriculum, analyses of fourth‐year degree examination results over a six‐year period were carried out. Analyses of students’ examination results for pre‐ and post‐CAL delivery of the diagnostic imaging course showed that performance in the CAL‐based course was significantly higher than in other subjects. This confirmed that the courseware can be used to replace didactic lectures as part of a rich learning environment supported by other resources. Initial student resistance to lecture replacement with CAL occurred, but has lessened as the use of the package has become established in the curriculum

    SMM rootkit: a new breed of OS independent malware

    Get PDF
    The emergence of hardware virtualization technology has led to the development of OS independent malware such as the virtual machine-based rootkits (VMBRs). In this paper, we draw attention to a different but related threat that exists on many commodity systems in operation today: The system management Mode based rootkit (SMBR). System Management mode (SMM) is a relatively obscure mode on Intel processors used for low-level hardware control. It has its own private memory space and execution environment which is generally invisible to code running outside (e.g., the Operating System). Furthermore, SMM code is completely non-preemptible, lacks any concept of privilege level, and is immune to memory protection mechanisms. These features make it a potentially attractive home for stealthy rootkits used for high-profile targeted attacks. In this paper, we present our development of a proof of concept SMM rootkit. In it, we explore the potential of system management mode for malicious use by implementing a chipset level keylogger and a network backdoor capable of directly interacting with the network card to send logged keystrokes to a remote machine via UDP and receive remote command packets stealthily. By modifying and reflashing the BIOS, the SMM rootkit can install itself on a computer even if the computer has originally locked its SMM. The rootkit hides its memory footprint and requires no changes to the existing operating system. It is compared and contrasted with VMBRs. Finally, techniques to defend against these threats are explored. By taking an offensive perspective we hope to help security researchers better understand the depth and scope of the problems posed by an emerging class of OS independent malware

    Bibliographic and Technical Problems in Implementing a National Library Network

    Get PDF
    published or submitted for publicatio

    Special Libraries, March 1925

    Get PDF
    Volume 16, Issue 3https://scholarworks.sjsu.edu/sla_sl_1925/1002/thumbnail.jp

    Special Libraries, March 1925

    Get PDF
    Volume 16, Issue 3https://scholarworks.sjsu.edu/sla_sl_1925/1002/thumbnail.jp

    Special Libraries, March 1925

    Get PDF
    Volume 16, Issue 3https://scholarworks.sjsu.edu/sla_sl_1925/1002/thumbnail.jp

    Special Libraries, October 1966

    Get PDF
    Volume 57, Issue 8https://scholarworks.sjsu.edu/sla_sl_1966/1007/thumbnail.jp

    Major Trends in Operating Systems Development

    Get PDF
    Operating systems have changed in nature in response to demands of users, and in response to advances in hardware and software technology. The purpose of this paper is to trace the development of major themes in operating system design from their beginnings through the present. This is not an exhaustive history of operating systems, but instead is intended to give the reader the flavor of the dif ferent periods in operating systems\u27 development. To this end, the paper will be organized by topic in approximate order of development. Each chapter will start with an introduction to the factors behind the rise of the period. This will be fol lowed by a survey of the state-of-the-art systems, and the conditions influencing them. The chapters close with a summation of the significant hardware and software contributions from the period

    Pervasive Parallel And Distributed Computing In A Liberal Arts College Curriculum

    Get PDF
    We present a model for incorporating parallel and distributed computing (PDC) throughout an undergraduate CS curriculum. Our curriculum is designed to introduce students early to parallel and distributed computing topics and to expose students to these topics repeatedly in the context of a wide variety of CS courses. The key to our approach is the development of a required intermediate-level course that serves as a introduction to computer systems and parallel computing. It serves as a requirement for every CS major and minor and is a prerequisite to upper-level courses that expand on parallel and distributed computing topics in different contexts. With the addition of this new course, we are able to easily make room in upper-level courses to add and expand parallel and distributed computing topics. The goal of our curricular design is to ensure that every graduating CS major has exposure to parallel and distributed computing, with both a breadth and depth of coverage. Our curriculum is particularly designed for the constraints of a small liberal arts college, however, much of its ideas and its design are applicable to any undergraduate CS curriculum
    • 

    corecore