SEARCH RESULTS

YOU WERE LOOKING FOR :Security Issues and Computer Network Management

Essays 481 - 510

E-Commerce and Security Issues

A paper examining common security problems faced in e-commerce. Specifically, the author addresses high-security measures such as...

Proposed School Board Plan for Children Using Computers

In eight pages this paper discusses a school board proposal for the use of computers for all children in a school district regardl...

Hobart and William Smith Colleges Campus Security Research Proposal

In eleven pages this paper presents a research proposal to study attitudes of students and security officers regarding campus secu...

Issues of Human and Computer Interface

In twelve pages this paper considers human and computer interface in a discussion of cognitive problems that have yet to be addres...

India as a Market for PC Sales

In seven pages this research paper discusses computer sales in a consideration of India's personal computer market. Six sources a...

Education and Computer Uses

In five pages the evolution of computers in the field of education is traced to the 1944 MARK 1 installation as discussed in the J...

An Outline for an Apple Computers Analysis

In five pages this writer describes an Apple Computers' case study outline that provides an effective method of analysis. Three s...

Computer Anxiety and Gender Differences

In six pages this paper discusses how computer anxiety may be gender based with a consideration of 3 studies in which a correlatio...

Animation in 3D

for a 2D presentation is called cel animation (Doyle, 2001). The third dimension is added through the processes of modeling, text...

Overview of Computer Aided Translation

translating those Internet sites that are in a language unfamiliar to the user. This quick translation is not intended to be that...

The Changes in Airport Security Through the Years

In a paper that contains six pages the history of airport security is discussed with the impact of the 911 terrorist attacks also ...

United Nations Security Council Threats

of challenges that constitute threats to international peace and security, and whether this new trend is a positive development fo...

Computers and Independent Thinking

In five pages this paper discusses computer intelligence and what would be meant if A.M. Turing's test was passed by a computer an...

Russia Sales and IBM

In six pages this paper answers questions having to do with IBM's sale of a super computer and 16 computer work stations to a nucl...

The Wen Ho Lee Case and National Security Problems

Case, and IT and Managerial Policies That Can Be Implemented to Prevent Theft The Wen Ho Lee case shows once again that the damag...

Buying a Laptop

for this we need to consider the different uses. * The general use will be as a family laptop, rather than in a business environme...

Computer Technology in the Classroom: Advantages and Disadvantages

Instructional technology has been in a state of evolution throughout history. In the latter part of the twentieth century, howeve...

Security for a Men's Retail Clothing Department

the objective of the guard to apprehend those who they discover shoplifting. Security cameras can be used to watch activities in ...

Building a Personal Computer v. Purchasing a Personal Computer

In fifteen pages this paper assesses the advantages of building a personal computer as opposed to purchasing a ready made computer...

Prejudice and Security Management

aware of the types of risk faced by the organization or government entity and then control for contributing factors. Danie...

Power and Wireless Senor Networks

a power supply is challenging when there are needs for ever smaller nodes. In some cases this may lead it a trade off of size of t...

Recent Changes in Aviation Security

over the past several years things have changed, concerns linger. In a recent report it is learned that airports are overwhelmed b...

ING Security

customer provides the opportunity for a breach. However, this is mainly out of the control of the bank, and giving advice and maki...

Employees and Corporate Cyber Security

consider cyber security is "social engineering." Social engineering "is the manipulation of people rather than electronic systems ...

Security Survey

well. Parking is at a premium as is the case on the fringes of most large universities, and there is a great deal of foot traffic...

Knowledge Management

Management In the past it may be argued that knowledge management was a potential source of competitive advantage, but i...

Project Management and the Subject of Risk

identified, evaluated and controlled." (Shildon Town Council, 2008). However the way that this is achieved in the context of proje...

Aspro Problems and Communications

difficulty is a leading factor in the development of the problems at Aspro, but there are other negative factors at work as well. ...

The Use of PM Tools to Improve Project Management

had not, this served as a useful introduction, and can be seen as a necessary stage as it allows introduction. The meeting was als...

Project Managers

perspective to others on the project team as well. One of the first considerations in any decision-making process should be, "How...