Rating
Client side architecture vs. Server side Architecture
Introduction
Client-server architecture allows simultaneous access to data for multiple users. Database based on SQL-server, in most cases support the optimistic locking (optimistic locking) - an approach that allows multiple users at one and the same time work with the same data. Conflict resolution is ...
Rating
CRYPTOGRAPHY
Cryptography
Name of the Writer
Name of the Institution
Abstract
This paper studies the Cryptography in detail and explores the concept of algorithms. Particularly, hash algorithm, and its advantages and disadvantages. Furthermore, explains the overall encryption security.
Cryptography
Introduction
The study and practice of system that facilities in securing communication in the existence of adversaries. In ...
Rating
Social Web
Social Web
Introduction
The social web includes services that set the trend in the form of digital data, in this case it is important to define what the Internet, understand the network of networks exists that enable services such as web, web 2.0. The so-called social web, then, refers to: Smart ...
Rating
CYBER SECURITY
Cyber Security Threats
Cyber Security Threats
Introduction
Today we enjoy increased sophistication in computer and internet technologies, in terms of power, storage capacity and communication speed. The Internet has undoubtedly become essential for the world's economic competitiveness, innovation and well being. Though, advanced internet technologies have many advantages, However, the ...
Rating
Social Media/Web
Social media/web
Introduction
This paper highlights the high use of social networking sites. The paper also discusses the privacy issues derived because of these social networking sites. In our latitudes, the Internet has become indispensable in the professional world and in private life. However, it contains well-known dangers that loom as ...
Rating
Online Privacy Rights
Online Privacy Rights
Introduction
The Internet is a popular medium of communication for people around the world. Through the internet communication, one can befriend anyone from any part of the world while maintaining anonymity. Due to this feature of online communication, certain individuals lure young people into inappropriate or ...
Rating
Internet Addiction in Children
Internet Addiction in Children
Introduction
The use of internet is increasing with the rapid pace and has become an addiction especially among children. This is resulting in numerous negative impacts on them. The internet is a medium fast, efficient and affordable. However, a problem when it becomes an addiction, ...
Rating
Cyber Bullying
Cyber Bullying
Introduction
Cyber Bullying is evident in contemporary societies who have had the impact of information technologies and communication technologies (ICT) in the daily lives of young people. The most common technologies and most widespread among young people are: computer, internet and mobile phone. As these technologies spread ...
Rating
Social Web
Social Web
Introduction
In the long and continuous journey of invention in the field of technology internet can be considered as the most remarkable and spectacular invention. The development and access to the internet in recent times has grown tremendously. Similarly, social web is a new advent within the field of ...
Rating
The Internet
Introduction
Communication technology plays an increasingly prominent role in our daily lives. According to the Pew Internet and American Life Project, technology has become a central feature of American families' everyday lives, with 84% of households having at least one mobile phone and 77% of households having a computer. Traditionally, ...