SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Computer Security

Essays 241 - 270

Evolution of Computer Technology

In four pages computer evolution is traced from the 500 B.C. abacus to contemporary desktop computers. Four sources are cited in ...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

Overview of the Uniform Computer Information Transaction Act Law

An overview of this proposed law and its impact on America's corporate sector and consumers are presented in a paper consisting of...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Communications Between Computer and Printer in Document Printing

In five pages the communications between a computer and printer regarding document printing are examined within the contexts of ne...

Russia Sales and IBM

In six pages this paper answers questions having to do with IBM's sale of a super computer and 16 computer work stations to a nucl...

Classrooms and Computers

In ten pages utilizing computers in a classroom setting is discussed in terms of its advantages and the ways in which computers ca...

Security Survey

well. Parking is at a premium as is the case on the fringes of most large universities, and there is a great deal of foot traffic...

Competition Between Compaq and Dell Computers

In six pages this paper examines whether Dell Computer will take advantage of Compaq's difficulties and become the largest persona...

ING Security

customer provides the opportunity for a breach. However, this is mainly out of the control of the bank, and giving advice and maki...

Prejudice and Security Management

aware of the types of risk faced by the organization or government entity and then control for contributing factors. Danie...

Recent Changes in Aviation Security

over the past several years things have changed, concerns linger. In a recent report it is learned that airports are overwhelmed b...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

Twenty First Century Outlook for the Personal Computer Industry

In a paper consisting of seven pages computer pricing and its industry implications are discussed with the end of 100 percent grow...

Overview of Dell Computer Corporation

In eight pages the computer industry with emphasis upon Dell Computer Corporation is the focus of this examination that includes s...

Advantages and Disadvantages Associated with Outsourcing Global Security Tasks

advantage. Indeed Beck (2001) notes that this threat is one that has the potential to align different government interests; global...

Strategies for Network Security

employees; and a plastic container plant in Georgia, with 45 employees. Each of these locations is required to maintain records pe...

Is the Social Constructivism Paradigm the Most Appropriate Security Models for the 21st Century?

The writer considers whether or not the adoption of a social constructivism approach to security is the best model for the modern ...

Employee Rights and Organizational Security

be addressed, such that best practices can be established in order to balance the needs of employers with the rights of employees,...

Security in Organizations

of required training for "private security personnel" (Moore, 1988). In fact, the employment of private security agents may prove ...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Using Encryption as a Key for Corporate Security

during or after encryption has been implemented. If the implementation or the encryption is not properly planned and realized, the...

Overview of Computer Database Structures

(George Mason University, 2003). Furthermore, the flat file database is familiar to most users -- meaning it is more familiar and ...

Security Issues and the Effects of Organizational Culture

of organization. All of these things are significant in the decision-making process. First, what is organizational culture and why...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...

E-Marketing Strategies for a Computer Company

benefit of Prehistoric Computers. Having said that however, the one big disadvantage is that the information supplied by t...

Stadium Security and Honeywell

systems are interconnected on a single network. The Honeywell network consists of a "structured cabling system for voice and data...

Modern Airport Design - Security Measures

perimeter control at facilities (Transportation Security Administration, 2004). This is handled in a variety of ways, from the obv...