285 research outputs found
Pleomorphic adenoma of the nasal septum : a case report
Polypoid nasal lesions are commonly encountered in clinical practice and all should be examined histologically. The authors report a case of pleomorphic adenoma arising in the nasal septum in salivary-type tissue. The interest of this case is both in the relative rarity of the condition, and also in its being the first such report in local practice.peer-reviewe
Constructing video games to teach security using Game Maker, Flash and Unity
Video Games and Security are two popular specializations in practically any computing curriculum. For most computer science topics (Programming, System Analysis, Databases) students can be required to build a product at the end of the course. In security, this is a greater challenge. Professors can\u27t inject viruses on a network for students to practice removing them. However, videogames can simulate this scenario. The target audience for this Tutorial will be any computer science professor, although professors teaching videogames or security may have greater interest
SIGCSE - A multi-level video game for teaching security (abstract only)
Video games can provide a secure and motivating active learning environment with practical scenarios. This video game project simulates a security competition where the player has to protect the system and keep the services running by reacting to injections that occur at random. The game has several modules (content areas) and levels. Modules have at least two levels. The first level requires installing and configuring hardware/software. For the second level players needs to respond to random events. In the Network module, players install and configure network components such as a firewall/router, a WPA2 WIFI, a web filter/proxy, a spam filter and antivirus software. In the Database Module, players install Apache Web Server, the Data Management System (DBMS) and Database Applications. Players need to install the database and the web-server in a port different than their default port, disable default passwords and test for SQL injection before installing the database. In the Encryption Module, players will be given several scenarios and need to choose the best encrypting method perform the actions to ensure that the data is encrypted. The last module integrates content areas from all other modules
Indications for antimicrobials in Acute otitis media
Acute otitis media is a condition affecting all age groups, particularly children, which commonly presents to the General Practitioner Although correctly diagnosed by the majority of doctors, otitis media is very commonly treated indiscriminately with wide-spectrum antibiotics. This is undoubtedly playing a major role in the increasing emergence of resistant micro-organisms in the Maltese community. We hereby seek to provide a comprehensive guide for the judicious prescription of antimicrobial treatment in acute otitis media for the Maltese Islands.peer-reviewe
Experience with video games for security
This paper describes the creation of video games to teach security. The first section explains why video games can be effective tools for improving security awareness. The next section provides an overview of existing video games related to security. The third section describes why three platforms for building videogames were selected. The last section describes the prototypes created and the results of classroom testing
The study of the interrelation between law programs and digital forensics in UAE Academia
The field of digital forensics is growing in the Middle East which is shown by the establishment of technical digital forensic programs in various universities. Even though these programs are important for the development and advancement of the field they are overlooking the legal aspect of e-crimes and digital forensics in UAE. This paper discusses available law programs and its relations to e-crimes and digital forensics, analyzing the implications caused by the lack of proper e-crimes and digital forensics educational materials in UAE law programs. Even though there are efforts made to overcome this gap between the legal and the technical aspect of digital forensics by creating individual courses it still lacks a strong educational law program preparing the judicial system to face these crimes in a more effective manner. This paper also discusses the possible improvement on the curricula of law programs. Copyright 2013 ACM
Database and database application security
This paper focuses on the emerging importance of database and application security, textbooks and other supplementary materials to teach these topics and where to place these topics in a curriculum. The paper emphasizes 1) the growing concerns of database technologies and database applications, 2) existing books and supporting materials, and 3) and Zayed University\u27s approach to teaching these topics. At Zayed, we incorporate database and database application security in two different courses. © 2009 ACM
Forensic analysis of private browsing artifacts
The paper investigates the effectiveness of the privacy mode feature in three widely used Web browsers, and outlines how to investigate when these browsers have been used to perform a criminal or illegal act. It performs an identical test on a privacy mode session for each of the three Web browsers and investigates whether traces are left behind. The analysis is done in three phases. First, common places where history and cache records are usually stored are examined. Then, other locations on the local machine are examined using special forensic tools. Also, the physical memory (RAM) is captured and examined for traces. © 2011 IEEE
Forensics and war-driving on unsecured wireless network
This paper investigates the effect of common war-driving on wireless network. Different war-driving software tools are examined and their effects are compared. It also investigates how forensics tools can monitor war drivers. The experiments show that significant numbers of homes are deploying wireless access points without much regard to the security of these devices and it is anticipated that more digital crime cases in this field will be deployed. Such cases include connecting to an unsecured home Wi-Fi network and performing illegal activities, or stealing personal data with sensitive information and using it to threaten victims or perform identity theft. © 2011 ICITST
- …