Includes instruction in pc concepts, data programs, networking, working programs, computer hardware, the Web, software applications, help desk ideas and downside solving, and rules of customer support. Assistant Professor Jun Li’s analysis targets network security, distributed programs, Internet protocols, and community simulation and efficiency evaluation. His ongoing analysis initiatives embody automatic defense against unknown self-propagating Web worms by means of distributed monitoring; detecting and tracing attacks in opposition to the BGP routing protocol; sturdy communication structure for safety monitoring and warning methods; and secure information sharing among information purchasers.