Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Voip (Voice Over Internet Protocol)
Rating
VoIP (Voice over Internet Protocol) #First-Third Department, Name of the UniversityAddress [Email address] Abstract— this document gives information on the VoIP (Voice over Internet Protocol) and the use of VoIP use in the world. The document aims to give explicit knowledge on the VoIP, its protocols and its working implementation and different methods ...
Network Design
Rating
Network Design #First-Third Department, Name of the UniversityAddress [Email address] Abstract- This document provides information on the Network Design and use of a network in common organizational or building structure. The document aims to give explicit knowledge about the network design and its implementation and some light is also enshrouded upon its different ...
Information Technology- The Privacy, Management And Control Within A Business
Rating
Information Technology- The Privacy, Management and Control within a Business Information Technology- The Privacy, Management and Control within a Business Introduction The importance of security and privacy management has increased as witnessed by the increasing number of security and privacy breach incidents that organizations have encountered within the last few years. For ...
Security Risk Assessment
Rating
Security Risk Assessment Security Risk Assessment Introduction Security risk assessment also termed as risk assessment, and it is necessarily required for assuring the security of any organization. It is very important for an organization to make sure that the management and costs are completely appropriate according to the risks and challenges faced ...
It And Jordan Worker’s Productivity
Rating
IT AND JORDAN WORKER'S PRODUCTIVITY Revision 26/02/11 IT and Jordan Worker's Productivity R7001 Introduction to Research methods Dr. Sema Barlas 30/01/2011 Malek Al Harafsheh How does IT influence worker productivity in Jordan? Theoretical Framework This study will investigate the relationship between information technology and worker's productivity in Jordan. Private companies in any country and even the Arab ...
Wireless Technology
Rating
Wireless Technology Executive Summary This report basically shows how to implement WLAN in various stores to make them connected. This report highlights how WLAN works, infrastructure WLANS, assessment and implementation of WLAN and solutions regarding it. The core focus of this report is to help the management to take actions in order ...
Cyber Security
Rating
Cyber Security Cyber Security Introduction With the emergence of the Internet and the extent of its use on a massive scale during the last decade, new threats and ways to commit crimes emerged. Cyberspace entirely consists of the mesh network and is radically different physical space. There is no boundary, evolving anonymous and ...
Government Cyber Security Intervention
Rating
Government Cyber Security Intervention Government Cyber Security Intervention HOW CAN GOVERNMENT JUSTIFY TELLING PRIVATE INDUSTRY HOW TO SET UP OR IMPROVE THEIR CYBER SECURITY? When U.S. diplomacy seeks outside help to strengthen cyber security, it is with high barriers. The political aspect of cyber security becomes a problem. While the U.S. State Department ...
Big Data
Rating
Big Data Big Data Introduction The term big data refers simply to the management and analysis of large amounts of data. According to the report of McKinsey Institute big data is a new frontier for innovation, competition and productivity. The term 'big data' refers to data sets whose size is beyond the capabilities ...
Cloud Computing
Rating
Cloud Computing Introduction Cloud functions are used in a similar way both in public and in private. The applications that are accessed over the internet are hosted on a server. Whether a Software as a Service (SaaS) version of customer relationship management (CRM) software is used by the organization either in establishing ...
271 - 280 of 287 Go To Page 23  24  25  26  27  28  29