Abstracts - faqs.org

Abstracts

Science and technology

Search abstracts:
Abstracts » Science and technology

The risks of software

Article Abstract:

Software errors can cause costly and deadly errors in critical computer systems, such as those controlling anti-lock brakes or chemical plants. Because software reliability is difficult to accurately assess, it may be necessary to limit the role of software in some computer systems.

Author: Littlewood, Bev, Strigini, Lorenzo
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1992
Prevention, Program errors, Bugs (Software)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


How computer security works: three types of safeguards offer a formidable defense against Internet intruders

Article Abstract:

Three types of computer security techniques: the firewall, digital certificates and the Java Sandbox, are discussed, highlighting the specific verification system each technique uses to assure the integrity of the computer system and its contents.

Author: Cheswick, William, Ford, Warwick, Gosling, James
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1998
Firewalls (Data security)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Cryptography for the Internet: e-mail and other information sent electronically are like digital postcards - they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions

Article Abstract:

A profile on the cryptographic techniques develope for Internet use is presented. Public-key cryptography relies on two encryption programs, the public key which is distributed widely, and the private key, which only individuals can use.

Author: Zimmerman, Philip R.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1998
Data encryption, Online transaction processing

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Computers, Safety and security measures, Digital computers, Analysis
Similar abstracts:
  • Abstracts: The impact of mission on firm innovativeness. A comparison of mission statements and their rationales in innovative and non-innovative firms
  • Abstracts: Terminal island turnaround. Ferry terminal replacement works around sensitive foundation. Modular mooring
  • Abstracts: Regulation of alloreactivity in vivo by a soluble form of the interleukin-1 receptor
  • Abstracts: The E. coli are coming. Public eye: spy satellite technology may assist government watchdogs. Ballpark physics: automating the scribbles on engineers' envelopes
  • Abstracts: The problem of consciousness. Why neuroscience may be able to explain consciousness. How does consciousness happen?
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.