SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Operating Systems Security Threats and Protective Measures

Essays 571 - 600

Strategies for Network Security

employees; and a plastic container plant in Georgia, with 45 employees. Each of these locations is required to maintain records pe...

Security in Organizations

of required training for "private security personnel" (Moore, 1988). In fact, the employment of private security agents may prove ...

Employee Rights and Organizational Security

be addressed, such that best practices can be established in order to balance the needs of employers with the rights of employees,...

Computer History and Their Impact on Society

This research paper offers a comprehensive overview of the development of computers. Then, the writer discusses the impact that co...

Policymaking Security

This essay demonstrates that psychologists are learning how to interview potential terrorists more effectively. It also explains t...

Two Aspects of National Security

There are many different aspects or elements of national security. Paper discusses border security and cybersecurity, which is bec...

Security Issues - Airlines and Water Supply Pipes

The writer looks at two different issues where there may be security concerns. In the first section security of airlines and airc...

DHS Success or Failure

are not in agreement with each other. Some believe the Department of Homeland Security has made a mess of everything while other b...

Security - The Psychological and Practical Aspects

In a paper of three pages, the writer looks at the topic of risk management. Practical security as well as psychological security ...

Indonesia, Various Societal Features

This research paper discusses various aspects of Indonesian society, such as security of work, employment statistics, social secur...

HSO and the Changes in Management Information System

This 8 page paper gives an overview of security issues for organizations. This paper includes discussions of sensitive materials a...

American Social Security in the Future

This 7 page paper gives an overview of the current and future state of Social Security in America. This paper includes a discussio...

Internal Marketing Role and Security Management

that seems to be when more security is called for. In addition, research shows that the most devastating attacks on computer netwo...

HCI Overview Human-Computer Interface

no date). This analogy becomes even more accurate, according to Dennehy, if one images that the stranger driving the car has poor ...

E-Marketing Strategies for a Computer Company

benefit of Prehistoric Computers. Having said that however, the one big disadvantage is that the information supplied by t...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Student Case Study on Systems Development

requires a different access level, with the ability to process data to produce the final results, bringing the different results t...

Planning and Security Management

In eight pages this p aper discusses organizational planning and security management and the importance of structural security tha...

Ethics and Computers in the Workplace

problems is usually a human misuse of information and technology (1). Still, as new technologies unfold, specific ethical questio...

Computers and Independent Thinking

In five pages this paper discusses computer intelligence and what would be meant if A.M. Turing's test was passed by a computer an...

Russia Sales and IBM

In six pages this paper answers questions having to do with IBM's sale of a super computer and 16 computer work stations to a nucl...

Communications Between Computer and Printer in Document Printing

In five pages the communications between a computer and printer regarding document printing are examined within the contexts of ne...

Computer Anxiety and Gender Differences

In six pages this paper discusses how computer anxiety may be gender based with a consideration of 3 studies in which a correlatio...

The Changes in Airport Security Through the Years

In a paper that contains six pages the history of airport security is discussed with the impact of the 911 terrorist attacks also ...

Overview of Computer Aided Translation

translating those Internet sites that are in a language unfamiliar to the user. This quick translation is not intended to be that...

Animation in 3D

for a 2D presentation is called cel animation (Doyle, 2001). The third dimension is added through the processes of modeling, text...

Entertainment and Computers

In six pages the entertainment industry is examined with the effects of the personal computer and how computers can be utilized as...

Medical Technology and Computers

In seven pages medicine and its computer history are considered with such concepts as telemedicine, computer aided surgery, and 'v...

Computer Science Majors and Computers

Core computer curriculum is discussed in six pages as it pertains to a computer scienc major with an emphasis upon getting back to...

Evolution of Computer Technology

In four pages computer evolution is traced from the 500 B.C. abacus to contemporary desktop computers. Four sources are cited in ...