Gregg Vesonder

Learn More
Protecting computer and information systems from security attacks is becoming an increasingly important task for system administrators. Honeypots are a technology often used to detect attacks and collect information about techniques and targets (e.g., services, ports, operating systems) of attacks. However, managing a large and complex network of honeypots(More)
The members of this panel are all users of object oriented technologies, and they have some experiences in working with and modifying some of the standard object oriented analysis and design methodologies. Each panelist can tell success stories and failure stories. Each panelist has some good pragmatic reasons why their software projects either departed(More)
  • 1