Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Enterprise Architecture
Enterprise Architecture Enterprise Architecture Introduction It is a strategic concept for the company's business today. It sets out a definition based on landscape “general” for companies for their continuous process improvement. It takes into account the area of technology to support the mission and lead the foundation to give way to the realization ...
It Project
IT Project IT Project Introduction This paper discusses the key components related to areas of expertise that are important and necessary to IT project. The project I have chosen for this assignment is Project Management System. This paper includes objective of this project, project's environment, general management of the project and, the ...
Project Management Estimation Methods
PROJECT MANAGEMENT ESTIMATION METHODS Project Management Estimation Methods Project Management Estimation Methods Abstract Estimation is the process of calculating the approximate time and the cost for completing a project. One of the most crucial—and difficult—activities in project management is estimating the time it will take to complete a particular task. Since a resource ...
Impact Of Information Technology On Business Development
Impact of Information Technology on Business Development Abstract In this study we try to explore the concept of “Information Technology” in a holistic context. The main focus of the research is on “the concepts and constructs developed on the basis of information technology” and its relation with “business growth and expansion”. The ...
Virtual Private Network
Virtual Private Network Research paper on Virtual private networks Introduction The purpose behind this paper is to understand VPN's (virtual private networks) how they are beneficial and what their disadvantages are, I will also design a system using VPN's and firewalls. To begin with I will start with an explanation on VPN's. Discussion According to ...
Use Of Smart Phones And Tablet Pcs In The Learning Process
Use of Smart Phones and Tablet PCs in the Learning Process CHAPTER 1 Introduction The technology has improved a lot in today's world that has significantly affected the level of the learning process. The learning process is an effective procedure that provides new and unique information to the individuals. The learning process is ...
Information System
Information System Information System Computer viruses are now very common everywhere. It sometimes become a nightmare, even for various high profile institutions, having very strict security. In this paper, we will discuss in detail about Viruses and examples of how it affected various organizations. Early in the history of computer development, ...
Information Security
Information Security Information Security Business need for information security In small businesses, the security that is given to the information systems and the networks is not high enough and is not given priority over other tasks in a business. However, the security of information and networks is very important for the customers of ...
Organizational Ethics In Dealing With Data Breaches Within Credit Card Companies
Organizational Ethics in Dealing with Data Breaches within Credit Card Companies Organizational Ethics in Dealing with Data Breaches within Credit Card Companies Introduction It is important to understand the concept of ethics before we discuss the dilemma in organizations that cause ethical issues. The term “ethics” is defined as the study of the ...
Linux Security
Linux Security Abstract In this research, we try to discover the insight of “Linux” in a holistic perspective. The key heart of the study is on “Linux” and its relation with “Security”. The research also examines various characteristics of “Linux” and tries to measure its effect. Lastly the research illustrates a variety ...
131 - 140 of 287 Go To Page 9  10  11  12  13  14  15  16  17  18