Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of the following information. Web presentation A.Hartley GLC 2000 project coordination A.
Traditional Database Security has focused primarily on creating user accounts and managing user privileges to database objects. The wide spread use of databases over the web, heterogeneous client-server architectures, application servers, and networks creates an urgent need to widen this focus. This paper will provide an overview of the new and old database… (More)
The Kennesaw Database Courseware (http://cofffee.kennesaw.edu) consists of animations, examples, and sample tests to support database curricula. This paper will 1) inform the recent animations/examples that have been developed, 2) discuss evaluations methods used, and 3) describe the new evaluation component that is being incorporated in the software. The… (More)
Finding digital forensic artifacts in the ever changing and complex digital world can be a daunting task for any digital forensic investigator. Familiar tools, such as Sandboxie and Symantec Workspace virtualization used as an aid in forensic investigations may significantly decrease the learning curve. The value of sandboxing for digital forensic… (More)
The student game exposition is open to all students to submit digital game designs and working games. Entries will be reviewed on Saturday, March 26 by panel. Prizes will be awarded for 1<sup>st</sup>, 2<sup>nd</sup>, and 3<sup>rd</sup> place entries. The top 50% of reviewed entries will be listed in the final conference proceedings, listing the name of the… (More)
This tutorial will give participants the necessary knowledge to create applications using the .NET framework as well as create applications for a PDA. We will give an overview of different technologies available for creating PDA applications, but we will focus primarily on Visual Basic .NET, Appforge's Crossfire, Sybase's Ultralite, and the Pocket PC. Links… (More)
This tutorial will focus on a database courseware tool developed at Kennesaw State University (KDC) available at http://coffee.kennesaw.edu/. It will also introduce participants to other database courseware tools (particularly WinRDBI and other tools developed at Arizona State University) that are also freely available on the web. The workshop will focus on… (More)
Designing normalized tables is a subject of great difficulty and importance. Unnecessary redundancy may results not only in too much space being used to store the data and poor query performance, but it may also result in inconsistencies as denormalized (unnecessary redundancy) data is much more difficult to keep current. Converting tables from E-R Diagrams… (More)