Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Public Key Infrastructure
Rating
Public Key Infrastructure Table of Contents Introduction4 Elements for the Development of a New Era5 Overview of Public Key strategies6 Public Key Infrastructure (PKI) and its applications7 Public Key Infrastructure or PKI9 Public Key Infrastructure - Technical Information11 Conclusion21 References22 Table of Figures ViPNet KC & CA17 ViPNet Registration Point19 ViPNet Publication Service20 ViPNet PKI products. The client software21 ViPNet CryptoService21 Public Key Infrastructure Introduction The globalization process has ...
It Virtual Management
Rating
IT VIRTUAL MANAGEMENT IT Virtual Management IT Virtual Management Question 1 The three main differentiators that differentiate high performing virtual teams over others are as follows: Commitment and Engagement The team members must be committed, engaged and able to take initiatives for making the project and team move forward. The team leader's role for this ...
Digital Business Assignment
Rating
Digital Business Assignment Abstract This assignment will have a detail analysis of doing e-business, e-commerce or e-marketing. It will analyse an e-marketing business of www.downlaod.com which will be owned by me. The purpose of this e-marketing is to create awareness about the use of software in your personal computers, working systems and ...
Information Security - (Is 300)
Rating
Information Security - (IS 300) Abstract There are various types of patient information that are stored in electronic format within a health care system. This helps to avoid the re-entering of information that was obtained before. In past this information was used to be write on paper and it was saved ...
Information Security
Rating
Information Security Executive Summary The purpose of this report is to expand the boundaries of our knowledge by exploring some relevant facts related to the analysis of information system in a health care organization. In this report, we have provided pertinent information in regard to social media and smart device technology usages, ...
Digital Business Assignment
Rating
DIGITAL BUSINESS ASSIGNMENT Digital Business Assignment Digital Business Assignment Business Model This paper intends to classify the business operations of the organization trying to focus on its digital business. The business of the organization in question is related to the manufacturing and selling of furniture. The furniture business is one of the most ...
Technology In Medicine Radiation Machines Used To Treat Cancer
Rating
Technology in Medicine Radiation Machines Used to Treat Cancer Table of Contents Introduction3 Thesis Statement4 Discussion4 Radiotherapy - A Constant Technological Progress4 Recent Technological Advances5 Intensity Modulated Radiation Therapy (IMRT)5 Helical Tomo-Therapy7 Stereotactic Radio-surgery (SRS / SBRT)9 Psychological Considerations of Cancer Treatment11 Fear of Recurrence11 Grief11 Depression12 Spirituality12 Sociological Effects of Cancer Treatment12 Life and the Workplace12 Survivor Guilt13 Relationships13 Economic Questions and Considerations of Cancer Treatment13 Conclusion14 References15 Technology in Medicine ...
It Vulnerabilities
Rating
IT VULNERABILITIES IT Vulnerabilities IT Vulnerabilities Introduction Cyber attacks have become a critical issue in today's advanced age of information technology. Various reasons motivate the hackers to make security breach or system intrusion attempts. This paper discusses the major cyber attacks and IT vulnerabilities, with the help of documented examples. The motivations behind ...
Evaluation Of Data Protection Measures
Rating
Evaluation of Data Protection Measures Evaluation of Data Protection Measures Introduction Federal Information Processing Standards (FIPS) defines data protection as "The protection of data from unauthorized alteration, damage, or disclosure." With the over reliance of industries and organizations on IT, data protection appears to be the stand out concern because damage or modification ...
Unethical Decisions -Information Systems Management
Rating
Unethical Decisions -Information Systems Management Introduction An information ethics is to formulate the universal maxims to guide the creation and use of media in a community as is the case of Europe. Such a maxim might be: The organization of the media and their messages must be in consonance with the ...
41 - 50 of 287 Go To Page 1  2  3  4  5  6  7  8  9  10