Security: A Necessary Piece of the Collaboration Puzzle

Alex Kisyake
Educational Institutions have always been known to be the heart of complex computing systems in any region they exist especially in Africa. The existence of high end computing power often connected to the Internet and to research network grids make educational institutions soft targets for attackers. Attackers of such networks are normally either looking to exploit the large computing resources available for use in secondary attacks or to steal Intellectual Property (IP) from the research...
This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.