Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Information System
Rating
INFORMATION SYSTEM Information System Information System Introduction In this paper, we are discussing the importance of information system in business process. We are considering the information system of Tesco plc. Tesco is merchandise and global grocery retailer headquartered in UK. It is considered to be the world's 3rd largest retailer after Wal-Mart and Carrefor. ...
Abstract
Rating
Abstract The paper discusses the importance of Internet security in the workplace. The employee considerations in relation with the security policies are also mentioned. It details out the implementation of Internet security in accordance with the ethical approaches. The impact of Internet restrictions are also mentioned along with the effective implementation ...
Virtual Private Database (Vpd) On Oracle 11g Release 2 And Microsoft SQL 2008
Rating
Virtual Private Database (VPD) on Oracle 11g Release 2 and Microsoft SQL 2008 Introduction Human world is becoming more and more dependent on computers and information technology (IT). The autonomic capabilities in computers and IT have become the need of the day. These capabilities in software and systems increase performance, accuracy, availability ...
Harvard Research Paper
Rating
HARVARD RESEARCH PAPER Harvard Research Paper Contents ACKNOWLEDGEMENT2 DECLARATION3 Abstract4 CHAPTER 1: INTRODUCTION5 Thesis Statement5 Background5 CHAPTER 2: LITERATURE REVIEW9 CHAPTER 3: METHODOLOGY12 Research Method12 Literature Search12 Rationale13 Research Design13 Search Technique14 Appraisal limitations14 Inclusion and exclusion criteria15 Search rationale15 Reliability15 Validity16 CHAPTER 4: FINDINGS17 CHAPTER 5: DISCUSSION19 Easily equipped with Notebook or handheld devices19 Cost/Benefit19 Uncertainty from Government and 3G Operators19 Power Consumption20 Interference20 Security21 THE DEPLOYMENT OF PUBLIC WLAN21 Business Models of Public WLAN22 Acknowledgement I would like to thank ...
Itunes
Rating
ITUNES iTunes Section I Executive Summary The American Association of Independent Music (A2IM) served as an independent music industry that included over 30% of the Music Industry's market share in the U.S. (38% of digital sales). As commercially driven industry, A2IM's changes in technology lead businesses to adapt in order to keep up ...
User Interaction Technologies
Rating
USER INTERACTION TECHNOLOGIES User Interaction Technologies User Interaction Technologies Introduction Since the advent, of modern computing in 1946, the uses of interactive technology have expanded far beyond their initial role of performing complex calculations. Today, computers are not just for scientists; they are an integral part of workplaces and homes. The diffusion ...
The Impact Of Information Technology
Rating
THE IMPACT OF INFORMATION TECHNOLOGY The Impact of Information Technology The Impact of Information Technology on Individual and Firm Marketing Performance Research design. All the research was shaped using mail surveys that were either formulated by the writers or altered from formerly issued scales to the technical surroundings in which the survey was applied ...
Modern Issues Facing Private Security
Rating
MODERN ISSUES FACING PRIVATE SECURITY Modern issues facing private security Modern issues facing private security Introduction The concept of private security pertains to the amount of personal or otherwise sensitive information. It that can be gleaned directly from the contents of one data source or indirectly when one source analyzes in combination with other ...
Artificial Intelligence
Rating
ARTIFICIAL INTELLIGENCE Artificial Intelligence Artificial Intelligence Introduction Artificial intelligence (AI) was first defined by the American computer scientist John McCarthy, who coined the term in 1956, as the “science and engineering of creating intelligent machines.” This definition, in its essence, has held, despite considerable shifts in technological paradigms, from the earlier emphasis on creation ...
Cryptography
Rating
CRYPTOGRAPHY Cryptography Table of Contents Introduction3 Malware3 Hidden Malware: Trojans, Backdoors and Rootkits5 Trojan5 Root kits5 Malware and anti-virus programs6 Packing and encryption code6 Mutation of the code7 Cryptography for securing networks7 Cryptographic Privacy System8 Conclusion8 References9 Cryptography and Malware Introduction Although some characteristics of the Internet have emerged as a thing that can be easily exploited (dematerialization information, real time, abolition of borders), however, ...
251 - 260 of 287 Go To Page 21  22  23  24  25  26  27  28  29