Security and Software for Cybercafes
Esharenana E. Adomi
IGI Global Snippet, Jan 1, 2008 - Business & Economics - 337 pages
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery. Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.
1 page matching mIRC scripting language in this book
What people are saying - Write a review
We haven't found any reviews in the usual places.
Computer Security in Cybercafés
Enhancing Social Security through Appropriate Cybercafé Security Policy in Nigeria
Cyber Security of Children Implications for SubSaharan Africa
19 other sections not shown
activities Adomi Africa antivirus software applications attacks browser browsing cafes campus cybercafés chapter client committed communication computer crimes computer security computer system computer virus criminal cyber crime cyber laws cyber security cybercafé management software cybercafé operators cybercafé security policy Cybercrime Delta State University desktop detection developing countries disk e-mail EFCC electronic ensure environment evaluation firewall fraud global hackers hardware identified infected installed Internet access Internet café Internet connection Internet security Internet service providers intruders ISPs issues Journal Library malicious malware Media24 messages Microsoft monitoring Nepal network security Nigeria offence operating system organizations partnership passwords person prevent problem program or data protect requirements Retrieved August Retrieved February Retrieved June Retrieved March server small businesses social spyware Symantec target terrorists threats tion Trojan horse updates users vendors viruses vulnerable Windows worms