Search

Results: 2
Learning How to Learn
This article describes how every learner is a unique creative individual responsible for paving his/her own way of learning in a preclusion of external restraints. Learners apply a bunch of idiosyncratic means to segue the...
Published by: IGI Global
A Summary of the Development of Cyber Security Threat Intelligence Sharing
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security...
Published by: IGI Global