SEARCH RESULTS

YOU WERE LOOKING FOR :Using Computer Networks and Security Issues

Essays 31 - 60

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Online Trading and the Infrastructure of Technology

been successful in achieving its goals in this regard. Network Protocol Now an "old" technology, Transmission Control Proto...

Security in the Global Context

this has impacted on the emergence of the security issues. There are a number of definitions which look at different perspectives ...

Security and Secrecy Issues Following the Cases of Wen Ho Lee and Robert Hanssen

on both morale and confidence (Meek, 2001). Mole hunting measure need to be in place. These measures can include the use of random...

The Language of Security

to life and limb, in the case of security for an organisations, while this may be a physical threat, it may also be a threat in t...

Communications Between Computer and Printer in Document Printing

In five pages the communications between a computer and printer regarding document printing are examined within the contexts of ne...

Computer Networking as a Career

In a paper consisting of 5 pages relevant issues to the choice of computer networking will be discussed and include career path pe...

Network Security and Computers

than fifteen percent back in 1994. It can be argued that with the ever-expanding user-friendly applications over the past decade ...

Dealing with Disaster using Computer Networks

1. Domain Sizing and Capacity Planning for Windows NT Server 4.0 (reproduced from Microsoft Corporation, 2002) Number SAM Reg...

Developing a Marketing Plan for Viagra

to influencers Pfizer may appeal to men who would not otherwise come forward. It is undertaken in a tasteful manner, in line with ...

Discussion Questions on Network Security

In a paper of five pages, the writer looks at network security. A variety of topics are addressed via discussion questions. Paper ...

Assessment of a Network

In five pages this network evaluation includes a discussion of uses, basic performance, topography, and security considerations. ...

Employee Rights and Organizational Security

be addressed, such that best practices can be established in order to balance the needs of employers with the rights of employees,...

Security in Organizations

of required training for "private security personnel" (Moore, 1988). In fact, the employment of private security agents may prove ...

Upgrading Riordan Manufacturing's Working Information

production and procurement of raw materials also should assist the company in planning for the future. Riordan currently has mark...

Chief Security Officers - Role and Responsibilities

stage of the plan necessarily involves developing an understanding of recent security breach events at similar institutions, ident...

Police and Private Security

police force can no longer cope with the law enforcement demands of local communities. It is certainly the case that there have be...

Computers and Their Early History

In five pages the computer's early history is discussed. Five sources are cited in the bibliography....

Case Study on Business Networking Decisions

In eleven pages this discusses a networking change to a frame relay network from an X.25 network in this consideration of corporat...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

Computers: The Battlegrounds of the Future

and other highly specialized tasks. Information technology and the computers and global network that bind all three together, in ...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

Packing Switching Movement to ISDN or Frame Relay ISDN

on the way for folks who live in high-density population regions in terms of actually be able to access ISDN services. The proble...

Corporate Management and Information System Security

In seventy five pages this paper discusses IS security training and computer crime issues. Fifty five sources are cited in the bi...

Prehistorica Computers and Case Study Analysis on eBusiness

programmers may have to work and maintain the site on an ongoing basis. It will likely mean buying new hardware and dedicating a s...

Protection and Data Risk

exploitation of any potential vulnerabilities that have been discovered in stage 1, the actual hacking, either to gain the inform...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

Ethical Issues and Computers

workings of a computer hold as much interest for hackers as the workings of a 57 Chevy do for the car fanatic. This interest is ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....