StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Human computer interaction Information Technology Annotated Bibliography
15 pages (3750 words) , Download 4 , Annotated Bibliography
Free
Bush The author of this paper is a respected scientist in the scientific community of the Allies. The paper is set in the immediate aftermath of the Second World War and the author concentrates on the large amounts of learning and research produced during the war effort and the inaccessibility posed by the large volumes of information available.
Preview sample
Cyber Terrorism Information Technology Research Paper
10 pages (2500 words) , Download 4 , Research Paper
Free
The dependence on IT networks is a defining feature of most industries in today’s world. The corporate sector, the banking and financial sector, the marketing sector and even the entertainment industry are all globally integrated via the internet. The global internet, in recent times forms the backbone of business and knowledge sourcing, sales and marketing, banking and finance, strategy management and many more systems.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Voice over Internet Protocol (VOIP) Basics Information Technology Research Paper
10 pages (2500 words) , Download 3 , Research Paper
Free
This paper is being carried out to discuss some of the important aspects of Voice over Internet Protocol. This paper will discuss important features of Voice over Internet Protocol technology, its economics and disadvantages. This paper will also analyze possible future of Voice over Internet Protocol.
Preview sample
IIS Networking Infrastructure Design Information Technology Essay
11 pages (2750 words) , Download 4 , Essay
Free
Intelligent Imaging Solutions (IIS) is a corporate organization that designs, engineer, manufacture and distribute consumer-oriented navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products.
Preview sample
Security issues in Online games Information Technology Thesis
18 pages (4500 words) , Download 2 , Thesis
Free
This paper analyses in detail the security, tries to compare the different kinds of threats to cyber security, the pole who pose a threat, how to identify them and how to solve the security issues that exists in online games. The different legal and technical methods to fight cyber criminals discusses in the article.
Preview sample
Analyzing and contrasting data mining based network intrusion detection system Information Technology Essay
46 pages (11500 words) , Download 4 , Essay
This research discusses data mining and the significance of IDSs for network security followed by few drawbacks, provides data mining and its various techniques in an elaborate manner, in relation to the present topic apart from various methodologies implemented till date, concludes the work done and gives plan for future work.
Preview sample
Ethical Hacking Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data.
Preview sample
Model for Integrating Physical and Virtual Identity Management Systems Information Technology Thesis
39 pages (9750 words) , Download 2 , Thesis
It is evidently clear from the discussion that the framework of Global Interoperability Framework (GIF) has been developed on the basis of Identification, Authentication and Electronic Signature (IAS). Interoperability between different types of smart card schemes is desired to be achieved by means of this framework.
Preview sample
Understanding IT security and its impact to organizations Information Technology Research Paper
15 pages (3750 words) , Download 2 , Research Paper
Free
This study attempts to compare the effort with actual tangible benefits using the experiences of organizations as described by various authors in implementing Information Security Management System frameworks. The primary question that this thesis shall answer is the effort to implement Information Technology Security in organization worth the effort?
Preview sample
Security of Information in Government Organizations Information Technology Essay
15 pages (3750 words) , Download 5 , Essay
Free
The purpose of information security for government organizations is to confirm stability of governance and decrease information loss or damage by inhibiting and reducing the effect of security misconducts or breaches. Important aspects of information security: asset classification, types of threats and implication of those threats are described in this paper.
Preview sample
Literature review: E-Government Significance Information Technology Dissertation
13 pages (3250 words) , Download 2 , Dissertation
Free
Literature Review: 1. Introduction…………….…………………………………………………… 2 1.1. Meaning and definitions ……………………………………………… 3 2. E-government types ………………………………………………………..
Preview sample
Physical Threat to Organizations Information Holdings Information Technology Essay
14 pages (4191 words) , Download 5 , Essay
Free
It is essential to state that with the rapid improvement in information systems and the exceptional development of the internet, information security has become a critical issue for every organization. Information is acknowledged as an important monetary asset for organizations, thus, it needs to be secured consequently.
Preview sample
An Assessment of the Vulnerabilities of the iPhone Information Technology Dissertation
20 pages (5000 words) , Download 2 , Dissertation
Free
The RMF consist of certain steps, where the each of the steps has to undergo the vulnerability analysis and assessment. The various six steps in the vulnerability analysis help in the easy identification and the evaluation of the various vulnerabilities found in the various steps where the identification is necessary.
Preview sample
IT Security. Epworth Information Technology Assignment
4 pages (1000 words) , Download 2 , Assignment
Free
The field of IT has many developments that enable those using it to store profile data. The data is widely applied by many firms because it is exceedingly reliable. Its reliability lies in the fact that information stored does not leak into the hands of the enemy.
Preview sample
Strategic Implications of IT Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
In the today’s fast-paced world, information technology is one of the arenas that are not only escalating at an unprecedented rate but also bringing in new changes with it. In addition, it has altered and shifted the ways and standards of living of the general population of the world.
Preview sample
TCP/IP Security Threats and Attack Methods Information Technology Report
20 pages (4985 words) , Download 2 , Report
Free
Now, various communication protocols are amalgamated together to form a set through which networks such as the ‘Internet’ function. The ‘Internet Protocol Suite’ is one such set of communication protocols and is popularly known as TCP/IP. The name, ‘TCP/IP’ is derived from two of the most integral protocols within the suite and stands for: the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
Preview sample
Protecting Personal Information Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Technology, along with its pros, has introduced exceedingly technical and chic means of acquiring someone’s PII. Whatever means the thief uses, identity theft brings great damage to the victim’s name and reputation as the victim is solely left responsible for whatever financial or personal loss he faces.
Preview sample
Agile Software Development Information Technology Research Paper
8 pages (2000 words) , Download 7 , Research Paper
Free
Introduction Agile software development represents a set of practice-based software development methodologies intended to design and document a software system. It is based on a collection values, principles and strategies that are light-weight by nature and yet produce effective software systems.
Preview sample
Current Trend in the Area of Telecommunication Information Technology Research Paper
14 pages (3500 words) , Download 2 , Research Paper
Free
The author states that despite the global economic decline, the telecommunication sector has developed continuously. It is due to this reason that major contribution to the development arises from the emerging markets. The increased utilization of mobile services is one of the significant drivers for the development of telecommunication.
Preview sample
Mutation as a Diversity Enhancing Mechanism in Genetic Programming Information Technology Essay
13 pages (3250 words) , Download 2 , Essay
Free
Genetic programming (GP) is a novel approach to machine learning and artificial intelligence using evolutionary algorithms. It involves the use of operators that are metaphorical to biological processes such as gene mutations, alterations, deletions and crossovers.
Preview sample
Strategic Information Systems ICT Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
This report outlines some of the major aspects and areas regarding ICT issues at the corporate. This report will try to assess some of the key issues regarding technology application and underlying technology issues those can hinder in the overall performance of Ready Rural Business.
Preview sample
Republic Polytechnic Case Study Information Technology Assignment
13 pages (2750 words) , Download 2 , Assignment
Free
The author studies the concept of ERPs in terms the phases involved in its implementation. It can also be used in knowledge sharing strategies adopted to enhance implementation of the ERP, the implications of heavy customization and finally, the strategic recommendations to counter problems arising from such ES customization.
Preview sample
Advantages and disadvantages of measures use to protect operating system Information Technology Research Paper
7 pages (1750 words) , Download 5 , Research Paper
Free
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently.
Preview sample
Applied Information Technology Project Information Technology Research Proposal
12 pages (3341 words) , Download 2 , Research Proposal
Free
Maughan (2010) posited that risks are linked to events and circumstances that can affect the outcome of certain projects. In technical terms, risk management involves logical and systematic methods of identification, analysis, mitigation, monitoring and communication of risks.
Preview sample
Social Network Companies: Riot Incitement Using Social Media Information Technology Essay
11 pages (2750 words) , Download 3 , Essay
Free
Moral panic is a common and universal reaction to any new and unfamiliar form of communication. The arrival of television generated fears of mass digitization. In the same way, in the early 1990’s, critics believed that the diffusion of the internet was proof of individuals’ increasingly estrangement and isolation from the society.
Preview sample
Technical factors affecting e-banking development in Iran Information Technology Dissertation
57 pages (14250 words) , Download 3 , Dissertation
The purpose of this study is to get greater understanding of e-Banking phenomenon and find out its implementation obstacles in Iran. In the conduct of the collection of data; both primary and secondary data, it is important that the researcher has a guide on the kind of data to collect and which ones to ignore.
Preview sample
Future Trends in System Consolidation Information Technology Research Paper
16 pages (4000 words) , Download 4 , Research Paper
Free
The author states that consolidation does not occur only to the software part but also on the hardware resources. The firm might decide to employ virtualization of their servers and eliminate the different distributed servers. System consolidation is continuing to be used due to its advantages and positive technological changes taking place.
Preview sample
Prevention of Financial Frauds Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
ABSTRACT This paper focuses on one of the important issues of the world; financial frauds which could impact the overall financial stability of the economy. Financial analysts and auditors have stressed a lot in the last few years to eliminate financial frauds and thus several techniques and methods have been recommended by auditors and financial analysts from different parts of the world to prevent financial frauds.
Preview sample
Software Engineering Testing tools Information Technology Research Paper
11 pages (2750 words) , Download 3 , Research Paper
Free
This research paper details a study about the unreliability of software engineering testing tools as a result of the misuse of these testing tools in development. Testing activities that are geared towards evaluating the capabilities and attributes of systems or programs with a view to ascertaining whether the program produces the required results will be discussed.
Preview sample
Networks and System Administration Information Technology Term Paper
16 pages (4457 words) , Download 2 , Term Paper
Free
Strategies on Network scalability are essential to certain disaster recovery and business continuity, these policies are incorporated in the design to cater to the future growth of the company. The information needs of the company are subject to change due to an increase in its business operations. This may due to the expansion of the business or an increase in its customer base.
Preview sample
Specifications & Documentations Information Technology Research Paper
11 pages (2750 words) , Download 4 , Research Paper
Free
The project involves the strict organization of information and also of data to obtain the product output of the project, while the project specification is any rules for creating the product. Most of the website software program design projects ought to have at least information or even data which are contained in the main body of the documentation.
Preview sample
Ensuring Appropriate Search Engine Registration Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
The aim of this report is to review the computer crime laws and regulations as they apply to a search engine company. It begins with an overview of search engines and search engine development and how it impacts information sharing on the web.
Preview sample
Design System and Security Control Information Technology Essay
13 pages (3250 words) , Download 3 , Essay
Free
Many are the times the data in the IT system is at risk from a number of sources. This includes user errors, malicious and non-malicious attacks, accidents as well as external attack from hackers, who try to gain access to the system and disrupt the various system operations hence rendering it useless, or data alteration or even data loss.
Preview sample
Data Warehousing and Data Mining Information Technology Research Paper
8 pages (2193 words) , Download 2 , Research Paper
Free
The increased use of information technology in every spheres of life is generating huge amount of data every day. However, there is an increase realization among information scientists that knowledge and power that should have been extracted from these huge information resources is far lesser than its capacity and most of the data collected globally each day by billions of information systems is never used for the purposes it was collected.
Preview sample
Security of Websites Information Technology Term Paper
12 pages (3285 words) , Download 3 , Term Paper
Free
Web security does not only entail securing the web application only but also securing the webserver and the web users as well. This article aims at explicating the various forms of threats, attacks, and vulnerabilities that web applications, servers, and users face. It will also show various methods of how to prevent minimize.
Preview sample
System Software and Network Security Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
It is evident from the research that most of the cloud providers are not focused on the security in the cloud but rather their main concern is the delivery of the their customers need i.e. low cost solutions, fast application deployment which will improve the customer service while increasing the efficiency of the IT function.
Preview sample
Cloud Computing and Security Issues Information Technology Dissertation
51 pages (12750 words) , Download 4 , Dissertation
1.1 Research Background Cloud computing is a new and emerging trend in the IT industry that is set to revolutionize the way people approach and use computing. There has been an exponential growth in new technologies that have converged to develop cloud computing services.
Preview sample
Which directrion will Cloud Computing take us Information Technology Essay
14 pages (3500 words) , Download 4 , Essay
Free
What Direction will Cloud Computing take us? This is a research report on the future of cloud computing. It is based on the topic of cloud computing centering on the definition, its features, the various forms of cloud computing, impact of cloud in terms of terms of pros and cons of cloud computing, and the prospect of cloud computing.
Preview sample
SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Information Technology Dissertation
68 pages (17000 words) , Download 2 , Dissertation
From this research it is clear that the safety protection of Linux cannot leave without all kinds of security principles and tools. SELinux System use the mandatory access control based on the rules which are set by the administrator, restricting the process to the least privilege and control the file access, resolving some authentication issues.
Preview sample
Methods for Database Security Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
Abstract Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive.
Preview sample
Does Google Make Us Stupid Information Technology Essay
13 pages (3250 words) , Download 4 , Essay
Free
The internet has become one of the most pervasive technologies used and enjoyed by almost all people in the planet. It is also a media upon which various technologies, including search engines and social networking sites are being borne and developed. Google is one of these technologies.
Preview sample
Understanding project management techniques Information Technology Coursework
9 pages (2250 words) , Download 5 , Coursework
Free
10 percent of the total systems are being used by the company’s staff members who work from home. Special technical team consisting of six members, of whom two are experienced in dealing with end users, are required to travel by local public transport to install, train and maintain the systems for upgradation.
Preview sample
Cloud Computing as a New IT Paradigm Information Technology Essay
14 pages (4069 words) , Download 5 , Essay
Free
Cloud computing is a new IT paradigm that allows the provisioning of IT infrastructure through the flexible pay-per-use model. Its application in industry is still new because it has not yet been fully understood. This paper aims to educate the industry on the value of cloud computing to business starting by defining it, outlining its pros and cons and describing its applicability.
Preview sample
Managing mobile platform proliferation and Smartphone market fragmentation Information Technology Dissertation
32 pages (8000 words) , Download 4 , Dissertation
This study attempts to explore the factors at play in the proliferation of development platforms and to give software developers (mostly independent) bases for sound decision making. Recommendations as to what market opportunities may be tapped and how industry-specific elements should be approached will be presented.
Preview sample
Ontology, epistemology and methodology in information system researches Information Technology Article
35 pages (8750 words) , Download 5 , Article
This paper provides an overview of the concepts and ideas that are concerned with ontology, epistemology, and methodology in the researches on information systems. Definitions of particular concepts both on philosophical and practical levels are provided, highlighting the similarities and differences among these definitions. Finally, the empirical side of these concepts were discussed.
Preview sample
Inside a Computer Laboratory Information Technology Lab Report
12 pages (3000 words) , Download 2 , Lab Report
Free
The author states that in the process of purchasing the laboratory is important to that you ask yourself some questions regarding the computer specification. First, you need to list down how the computer is going to be used. Secondly, the software that will be used can follow and here you determine whether any specialized functions are going to be used.
Preview sample
Decision Support Systems in Medicine Information Technology Research Paper
12 pages (3000 words) , Download 3 , Research Paper
Free
This study is aimed at highlighting a few such facts that have assisted in the betterment of medical treatments by virtue of improvements in technology. It also summarizes how the said affects have been formalized along with assessing how this all has been of help to the physicians and medical practitioners as well.
Preview sample
Benefits and risks of migrating physical servers into a virtual environment Information Technology Essay
9 pages (2250 words) , Download 4 , Essay
Free
This essay will try to analyze both the advantages and the disadvantages of server virtualization in a business environment and evaluate its potential issues and risks. Studies have shown that migrating physical servers to a virtual environment improve utilization, simplify operations, and reduce overhead costs which tend to make business overlook the risks involved.
Preview sample
Allowing Mobile Devices In The Office Information Technology Essay
9 pages (2250 words) , Download 3 , Essay
Free
According to the paper almost every worker in the office environment owns a mobile phone. Critiques argue allowing workers use their mobile phone in the office premises will lower productivity. These devices give voice and data communication ability. Their portability reason can allow easier location of workers. Businesses which allow workers to use their mobile phones have policy on which place to use devices. This reduces the possibility of workers making noise to others when talking on their mobile phones.
Preview sample
Installation of a Firewall Policy in a Small Office-Home Office Environment Information Technology Literature review
15 pages (4089 words) , Download 2 , Literature review
Free
A small office/home office environment involves one or many workers. It can also be a part of a large company’s network that has been decentralized or just an independent business. The advent of SOHO environments has undergone major transformations since anyone working from a home office can globally compete due to the inception of the Internet.
Preview sample
10101 - 10150 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us