Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Information Security Program
Information Security Program Information Security Program Introduction The paper will discuss the Information Security Program in the Department of Veteran Affairs. Department of Veterans Affairs U.S. is the executive department of the United States government. It is the second largest after the Federal Ministry of the Ministry of Defense, employing about 280,000 ...
Disseminating Organizational It Security And Troubleshooting Best Practices
Disseminating Organizational IT Security and Troubleshooting Best Practices Abstract This paper describes that how we can improve the security of a company's IT infrastructure after a series of network security breaches. This paper also analyzes the importance of internal communication and medium of communication that can be used to improve the ...
\ relational Model Of Database Management
\ Relational Model of Database Management Executive Summary The primary problem faced by our business enterprise is the organization and handling of the large amount of data. This problem is causing the decrement in the pace of our organizational practices as the process of the handling and organization of the data determines the ...
How Buffer Overflows Are Used To Exploit Computers?
How Buffer Overflows Are Used To Exploit Computers? How Buffer Overflows Are Used To Exploit Computers? Buffer Overflow Buffer overflow attacks represent the vast majority of all attacks against information systems as buffer overflow vulnerabilities are common and relatively easy to exploit. Buffer overflow vulnerabilities are the main cause of intrusions in ...
Cisco 4300 Video Surveillance Camera
Cisco 4300 Video Surveillance camera Cisco 4300 Video Surveillance camera Protection alternatives structured within an organization In a lot of organizations and remarkable occasions surveillance camera system is required. This assists the protection group connected with the occasion or organization to control protection related issues more easily. Cisco is one of ...
Java Servlet Concept
Java Servlet Concept Java Servlet Concept Java Servlet A Servlet is a class of java programming language that is used to broaden the server's capabilities. Even though servlets might respond to any king of request, these servlets are mainly used to broaden the applications that are hosted with the help of ...
Artificial Intelligence
ARTIFICIAL INTELLIGENCE Artificial Intelligence Artificial Intelligence Introduction The term and concept of Artificial intelligence (AI) was first defined by John McCarthy, an American computer scientist, in 1956 as the “science and engineering of creating intelligent machines.” While there are some tasks that computers are able to perform, they cannot do all, and, most importantly, ...
TCP/IP Benefits of Utilizing TCP/IP in a server-based setting Benefits of Utilizing TCP/IP in a server-based setting Introduction Transmission protocols and application level services are comprehensively supported by the TCP/IP networking suite. It also provides support for the clients such as SNMP, Telnet, HTTP, and many others. For large networks, Transmission Control Protocol/Internet Protocol ...
Parallel Fiber In Communication Computer Field
Parallel Fiber in Communication Computer Field Parallel Fiber in Communication Computer Field Introduction Technology and communication are now interlinked with each other up to a huge extent. In fact, it will be fair to say that various scientists, researchers and research institutes have dedicated their time in order to propose, plan ...
Modern Attacks On Vpn And Firewalls
Modern Attacks on VPN and Firewalls Table of Contents Introduction3 Discussion4 Challenges to VPN and Firewalls5 Increased Network Complexity5 Increased Application and Attack Sophistication6 Viruses and Worms7 Spoofing of IP Address7 Fundamental Flaw in Firewall Middle-box Design8 VPN Cracking by Exploiting Microsoft Technologies9 “Smart” Threats to Firewall and VPN10 Conclusion10 References12 Modern Attacks on VPN and Firewalls Introduction The advancement in the different uses of the ...
11 - 20 of 287 Go To Page 1  2  3  4  5  6  7  8  9  10