Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive usability study comparing five two-factor authentication methods, examining setup procedures, user experiences, and preferences to inform better security implementations for online accounts.
Explores user attitudes towards password managers, revealing differences between built-in and separate tool users, and provides insights to improve adoption and effective usage of these security tools.
Examining system administrators' software update management practices, challenges, and potential improvements for multiple machines to enhance organizational cybersecurity.
Explores privacy and security perceptions of older adults using smart technologies, identifying unique challenges, misconceptions, and mitigation strategies to inform better design and protection measures.
Explores GDPR 'Right of Access' vulnerabilities, revealing how impersonation tactics can lead to unauthorized data access. Offers insights on improving identity verification processes for enhanced data protection.
Explores user perceptions of smart home device data practices, revealing uncertainties about data handling and how experiences shape security concerns and behaviors in connected homes.
Explores how entertainment media shapes people's understanding of computer security, identifying misconceptions from fictional tropes and examining how viewers evaluate realism in portrayals.
Analyzes security risks in npm ecosystem, revealing vulnerabilities due to dependencies, maintainer influence, and lack of maintenance. Discusses potential mitigations for the JavaScript community.
Exploring challenges in building safe, trustworthy tech products for billions globally, drawing from past mistakes and suggesting ways forward in this complex, multidisciplinary issue.
Explore a privacy-preserving protocol for detecting exposed credentials, its implementation as a cloud service, and its effectiveness in prompting users to update compromised passwords.
Explore WAVE, a decentralized authorization framework offering autonomous delegation, enhanced security, and scalability without central trust, as applied to IoT device control.
Explore in-toto, a framework ensuring software supply chain integrity from inception to deployment, addressing vulnerabilities and protecting millions of users across various cloud environments.
Comparative analysis of threat intelligence sources, evaluating metrics, coverage, and effectiveness for cybersecurity defense. Highlights limitations and challenges in using existing data.
Exploring challenges of implementing Data Protection by Design under GDPR, including legal obligations, assessment criteria, and the role of privacy engineering in meeting comprehensive demands.
Comprehensive study on cryptojacking campaigns, revealing underestimated scale, infection methods, and prevalence across the internet. Insights on mining services, attack vectors, and compromised third-party software.
Get personalized course recommendations, track subjects and courses with reminders, and more.