ICT in Road Safety and Rescue Operations in Nigeria(2)

Read part 1:http://techtrendsng.com/ict-in-road-safety-and-rescue-operations-in-nigeria1/ Notable Benchmarks The following are case studies around the world that can be used to understand what other nations and unions are doing to improve road safety with the help of Information and Communications Technologies. 1. The European Union Over 15 years ago, the EU set a target to reduce by half,…

ICT in Road Safety and Rescue Operations in Nigeria(1)

Introduction Driving and commuting are central to our daily lives. We rely on them for mobility to keep in touch with friends, relatives and associates; and to have our goods and services delivered to desired destinations. Driving also brings problems such as traffic congestion, pollution and accidents. Over the last decade, ICT has totally redefined…

Web Technologies for Developing Political Campaign Websites.

Introduction In 2008, President Obama exploited the power of internet technologies during his US presidential campaign, and today the rest is history; little wonder he has glued to his blackberry and has even appointed an internet adviser into his cabinet. All over the globe there are several latest instances of the practical mass use of…

The Fundamentals of Digital Forensics in Computer Reactive Security(2)

COMPUTER FORENSICS Computer forensics is the application of computer investigation techniques to thoroughly analyze digital media, software program, suite of applications, computer network resources, or a group of related cyber activities and therefore gather evidence suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while…

The Fundamentals of Digital Forensics in Computer Reactive Security(Part 1).

INTRODUCTION Computer security is a vast field that touches all aspects of data confidentiality, integrity and availability for suitably controlling access to data. Access control is only one of the ten domains of Information Systems Security categorized by the International Information Systems Security Certification Consortium (ISC) 2 which is responsible for certifying Information Systems Security…