SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Computer Security

Essays 121 - 150

OSI Model Protocols - An Overview

& Fajfar, 2000). For example, the first layer of the OSI model is the "physical layer", which includes the actual hardware, includ...

Overview and Legal Issues Associated with Penetration Testing

In seven pages this research paper presents an overview of the penetration testing field for the confirmation of security precauti...

1996's HIPAA

In six pages the 1996 bill the Health Insurance Portability and Accountability Act is examined in an overview of privacy and secur...

Overview of Dept. of Homeland Security

This research paper offers an overview of the history, role, mission, and duties of the Department of Homeland Security (DHS). Fou...

Security for Retirement in America

This 6 page paper gives an overview of the problems with securing retirement for older Americans. This paper includes issues such ...

Container Security Initiative, An Overview

This research paper/essay offers an overview of the Container Security Initiative (CSI), which is under the jurisdiction of the U....

Overview of Security Fraud and Protection

beating the clock and waiting in long lines are becoming a thing of the past. There is no question that the concept of Electronic...

An Essay on Airport Security

This paper provides an overview of FAA measures and other relevant issues that pertain to airport security. There are five biblio...

An Overview and History of the Penitentiary at Alcatraz

venues, inclusive of Alcatraz in San Franciso Bay, California (86). The design of such facilities radically altered the advent of...

Workplace and Transsexual Issues

that the European Sex Discrimination Act will be rewritten to specifically address the concerns of transsexuals in the workplace. ...

'New' Russia and Its Power, Ideology, Military, and Policy

he pointed out that "Russias national identity is still evolving" and probably more importantly, "the new Russia is not the Soviet...

Person Identification Through Retinal Scan Biometrics

Iris recognition technology can be used for physical access security, information security, and a variety of walk-up applications"...

Domestic and Global Security Management

and continue to find holes" (Security Directors Report, 2003, p. 1). What should corporations do? Limit business travel to the min...

Securities Purchasing and the Federal Reserve System

such a move would not be the best idea. For one thing, the Treasury market is large, flexible and liquid (Wheelock, 2002)....

Analyzing a Security Guard Company

profile persons, such as high-ranking executives (Command Security Corporation, About, 2002). Prior to September 11, 2001, CSC pr...

LOVE Computer Virus Attack of 2000

in the emails were exactly the same. Additionally, the emails were coming from software developers in the office, five emails in a...

IS and Risk Assessment

hackers can readily infiltrate any given companys entire computer system with the intent to destroy data is more than enough reaso...

Classrooms, Computers, and the Educational Tool Known as Technology

tools currently in use in the classroom and in the home. In just the last decade some $9 billion has been spent in U.S. schools t...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Distribution and Dell Computer

In five pages the direct sales methods of Dell Computer are examined in terms of its revolutionary impact upon the personal comput...

Saudi Arabia and Apple Computers

of extremely successful computers, which brought its U.S. market share back up to 10%. Overseas, it has maintained dominance, howe...

Indonesia, Various Societal Features

This research paper discusses various aspects of Indonesian society, such as security of work, employment statistics, social secur...

E-Commerce and Security Issues

A paper examining common security problems faced in e-commerce. Specifically, the author addresses high-security measures such as...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

College Campuses and Date Rape

In ten pages college campuses and the incidences of acquaintance or date rape are examined in terms of information, statistics, se...

Overview of Hydrodynamic Hull Testing Development

In ten pages this paper presents the development of hydrodynamic hull testing in an overview that includes history, technology, co...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

Computer Aided Graphic Design

foci) is constant. The parabola is a set of points in a plane that are equal distances from a given line (the directrix) and a gi...

Classrooms, Technology, and Teacher Education

may inevitably have to use. The Problem Statement Increasingly, the use of microcomputers in the classroom setting has bee...