Skip to main content

Research Repository

Advanced Search

All Outputs (7)

Mastering Computing. (2002)
Book
Buchanan, W. J. (2002). Mastering Computing. Macmillan Press

Computing is an area which continues to grow. This book covers the main areas of computing, including programming, computer hardware, operating systems, the Internet, data communications and networking. It uses practical examples to show basic concep... Read More about Mastering Computing..

Mastering Delphi programming. (2002)
Book
Buchanan, W. J. (2002). Mastering Delphi programming. Palgrave Publishers

This book provides an introduction to the use of Delphi Version 3/4 in developing programs, full of real-life applications including serial communications, internet programming and system interfacing. The book also contains tutorial questions, many w... Read More about Mastering Delphi programming..

Towards reusable and reconfigurable models for the WWW (2002)
Presentation / Conference Contribution
Brown, E., & Buchanan, W. (2002, August). Towards reusable and reconfigurable models for the WWW. Presented at 26th Annual International Computer Software and Applications, Oxford, UK

Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW developers currently design WWW content for the most efficient delivery and do... Read More about Towards reusable and reconfigurable models for the WWW.

An intelligent agent security intrusion system (2002)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002). An intelligent agent security intrusion system. In Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (94-99). https:/

Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI mo... Read More about An intelligent agent security intrusion system.