SEARCH RESULTS

YOU WERE LOOKING FOR :Topics on Computer Security

Essays 991 - 1020

Computer Network Logical and Physical Designs

computer (Cardiff University, 2003). These configurations rely on the network "neighborhood" for relay of data as well (Cardiff Un...

Enlargement of EU and Impact on NATO Relationship of Common Foreign and Security Policy

policy of foreign and security policy. Many countries such as Ireland, Finland and Sweden have traditionally occupied a neutral st...

TSA Contact Center's Practical Implementation

In ten pages this paper discusses the Transportation Security Administration in a consideration of how its contact center can be l...

'Ethics' of Insider Trading

This paper will argue that insider trading is not acceptable in any degree. A Matter of Degree? Of course the implications ...

Gary Hamel's Leading the Revolution

In seven pages this paper discusses this text in terms of achieving greater insights into GE's CEO Jack Welch and Dell Computer CE...

Accomplishments of Computer Designer Seymour Cray

components ( Anonymous 2). He was a truly a "master" of computer architecture, creating computer systems with both skill and elega...

Security Systems and Organizational Culture

demonstrate the connection. As a result, the research presented will help outline the basic premises surrounding the nature of or...

System of Criminal Justice and Impact of Homeland Security

availability mentioned above, every part of the criminal justice system is or has been affected in some way by the threat of domes...

Deteriorating European Security as a Result of the Cold War

which, in reality, should have been their own responsibility. They viewed the USSR as their greatest threat and the U.S. as the s...

Computer Based Visual Instruction Materials Designing

more than three small images (2000). In computer presentations, it is important to be consistent in regards to such features as ...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Disaster Recovery Planning

A survey conducted in 1995 by ICR Survey Research Group regarding vulnerability of computers found that sixty six percent of respo...

Use of Convertible Securities

In five pages convertible securities are examined in terms of disadvantages and advantages for investor and company alike. Six so...

Globalization, Technology, and Graphic Design

and the popular culture of mass communications. There has been a tendency to dismiss computer art as being in some way inferior to...

Computer Allocation Justification

In five pages this report justifies a computer allocation to a company manager in an explanation to management how efficiency and ...

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

American Security from a Unilateral Perspective

In twelve pages this paper discusses the major security role the US plays from a unilateral perspective. Seven sources are cited ...

P2P Connections, Grid Computing, and Their Impacts

In five pages this paper discusses how the future of computers has been impacted by P2P connections and grid computing. Ten sourc...

Incentive Programs and Positive Discipline of Adult Inmates in Maximum Security Facilities

This paper consists of five pages and discusses how positive and incentive programs can improve discipline among adult inmates in ...

eCommerce Strategy of Dell

In five pages Dell's corporate rise within the personal computer industry is assessed in terms of its ecommerce strategy. Four so...

Global Marketing of Computers

In five pages a United States' computer retailer is considering expanding operations to Morocco and this paper presents a marketin...

An Overdoes of Intravenous Medication and a Change Theory Application

while in the hospital plus the incidence of symptoms and/or disease that would have initially required use of the medication. In ...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Network Security Issues

In seven pages this paper discusses firewall and encryption as they relate to telecommunications' network security with the pros a...

CRT Monitors, Effects, and Diseases

In seven pages this report considers the effects of excessive computer use with such health issues as electromagnetic radiation, b...

High School Curriculum and Computer Integration

In five pages this report discusses the significance of computers in the high school educational curriculum. Four sources are cit...

Japan, the U.S. and the Computer Games Industry

In nine pages this paper discusses microenvironmental and macroenviromental issues as they pertain to the computer games industry ...

Europe and its Common Security Policy Failure

In sixteen pages this paper examines the European Union in an analysis of why the implementation of a policy regarding common secu...

IT's Impact on HRM's Changing Role

In seventeen pages this paper examines how human resource management has been affected by computers and the use of information tec...

Security Risks of Data Warehousing

In eight pages a possible security risk posed by a company's external data warehouse is examined in terms of the business's altern...