Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Global Defense Corporation
Rating
GLOBAL DEFENSE CORPORATION Implementation of web-based project management software for Global Defense Corporation Chris Firestone ITM 6000 Eve Yeates Abstract The paper explores the concpet of implementing the web-based project management software in a holistic context. The purpose of this study is determining the benefit of implementing web-based project management software for Global Defense Corporation's ...
Windows Executive Summary
Rating
Windows Executive summary [Name of the institute] Windows Executive summary An interface of operating system is required to run the computer system successfully on a computer. Microsoft has made such an interface that is helping in operating the computer system. This interface made by Microsoft has eliminated the use of command line for ...
Linux As An Operating System
Rating
Linux as an Operating System [Dated] Linux as an Operating System Linux is for users who do not want to deal with the protection of the PC and still require a secure and flexible operating system. The security level of a Linux distribution is already very high after installation. The programmed for Windows ...
Internet Privacy And Security
Rating
Internet Privacy and Security Abstract In this study we try to explore the concept of “Topic” in a holistic context. The main focus of the research is on “Topic” and its relation with “Subtopic”. The research also analyzes many aspects of “topic” and tries to gauge its effect on “subtopic”. Finally ...
Addressing Wireless Threats With Integrated Wireless Ids And Ips In The Cisco Unified Wireless Network
Rating
Addressing Wireless Threats with Integrated Wireless IDS and IPS in the Cisco Unified Wireless Network Introduction The topic under study is based on addressing wireless threats and Integrated Wireless IDS and IPS in the Cisco Unified Wireless Network. The development of new technology has immensely improved security of wireless LAN. The advent ...
Snmp And Cli
Rating
SNMP AND CLI Simple Network Management protocol and Command-Line Interface Abstract The exponential growth of the Internet has revolutionized society and technology and is one of the most interesting and exciting phenomena in networking. Two decades ago, the Internet, which is the biggest network of networks, or internetwork, was a research project that ...
Highschool Technology
Rating
HIGHSCHOOL TECHNOLOGY High School Technology High School Technology Answer 1). Why should we have a separate databases and a data warehouse? Separate data bases and data warehouse is one of the most important management and business development tool which is object-oriented, integrated and time-dependent data set. Databases and data warehouse are not ...
Cloud Computing
Rating
CLOUD COMPUTING Cloud Computing Table of Contents 1.Introduction1 2.Network Management1 3.Cloud Computing1 6.Advantages3 7.Disadvantages4 9.Enterprise Private Clouds5 10.Self Service5 11.Automation5 13.Virtualization6 16.Conclusion8 17.References9 Introduction Cloud Computing is the culture of outsourcing some part of company's technology to a common 3rd party setting. The terminology is new, but the concept is not fresh. In the past, matching contributions were known as Application server provider. Internet ...
It Security Planning
Rating
IT SECURITY PLANNING Information Technology Security Planning Abstract Organizations integrate information security measures through information security planning and policy development. This study aims to examine how the extent of collaborative exchange within the organization and extent of formalization of the information security function impact the effective utilization of well-established information security objectives. ...
The Effects Of Advanced Technology On Communication
Rating
THE EFFECTS OF ADVANCED TECHNOLOGY ON COMMUNICATION The Effects of Advanced Technology on Communication The Effects of Advanced Technology on Communication Introduction Advances in technology have significantly impacted the way we communicate in both our personal and professional lives. While email, Instant Messaging (IM), texting and other forms of quick electronic communication may ...
171 - 180 of 287 Go To Page 13  14  15  16  17  18  19  20  21  22