- This conversation deserves a blog entry.
Test results do not show any difference. Any suggestions, comments? Please, include sample code and/or testing methodology to show any difference that you might believe exists.
This blog is dedicated to methodology development of the scientific approach to computer science education and cybersecurity fields like digital forensics and information assurance. This site is not intended as a reference for practitioners of cybersecurity, but a guidance for those entering this field and would like to learn the basics of the scientific approach and methodological testing of scientific problems that is missing from a basic computer science and technology based STEM education.
No comments:
Post a Comment