StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Research Report on Internet Security
13 pages (3782 words) , Download 3 , Report
Free
This report ''Research Report on Internet security'' is acquired a brief idea about different security threats that exist in internet and how these threats can be dealt with and tells how to develop a network which can operate even if main segments of communication network crash....
Preview sample
Roles in homeland security
5 pages (1250 words) , Download 2 , Essay
The term homeland security is an umbrella phrase used by Americans to refer to the coordinated effort by the entire nation so as to have a homeland that is secure, safe, and one that can withstand terrorism and other dangers so as the Americans aspirations and interests, and the.... The term came about in 2003 when many Homeland Defense refers to the provision of security to the US domestic population, sovereignty, territory, and important infrastructure against threats and aggression that are external (Bullock, et al....
Preview sample
Business Analysis of British Airways
15 pages (3750 words) , Download 4 , Case Study
Free
M from its operations for a Cash Flow margin of 0.... Analysts are predicting an operating margin of about 7.... Long queues formed for staff security checks and the belts carrying the bags became clogged as they were not being unloaded quickly enough.... ? Proposals to enable the achievement of a 10 per cent operating margin and prepare the airline for future profitable growth.... The operating margin was 7....
Preview sample
The Demographic Imbalance in the UAE and Security Threats
7 pages (2236 words) , Download 0 , Report
Free
ith UAE under increasing global pressure to grant non-national expatriate populations citizenship rights (Spiess, 2010), the UAE citizen population perceives this as an invasion in their principles and the fact that they are national minorities further exacerbates the threat of their social structures and national identity in the face of higher diversity.... This paper ''The Demographic Imbalance in the UAE and security Threats'' tells that the United Arabs Emirates population composition represents a unique phenomenon unlike any other in the world....
Preview sample
A Survey of Advances in Biometric Security
10 pages (2500 words) , Download 4 , Research Paper
Free
The primary purpose this particular research paper is to determine a thorough survey about the advancement of biometric solutions as security measures in numerous sectors over the years.... An insight is also drawn about the current trend and the historical context of security approaches.... This research paper intends to provide a comprehensive understanding about the aspect of biometric security solutions along with an evaluation of its performance efficacy in the present day context....
Preview sample
Security of Websites
12 pages (3285 words) , Download 3 , Term Paper
Free
The following paper under the title 'security of Websites' gives detailed information about the extensive growth and use of the internet over the years which have created and led to websites and web applications facing more threats and vulnerabilities each day.... Web security does not only entail securing the web application only but also securing the webserver and the web users as well.... This has thus demonstrates the importance and emphasis developers and website administrators have put on web security....
Preview sample
Wireless Security
7 pages (1750 words) , Download 3 , Research Paper
Free
Wireless security.... Wireless security Introduction Recently, wireless networking has become more affordable, available and easy to use.... However, despite its popularity, there are many security threats that are associated with the wireless technology, thereby preventing them from being widely spread.... Because the earlier mechanisms used in wireless security did not adequately provide defense against such attacks, WLANs provided an avenue for attackers to access an organization's network and take away important information (Us-cert....
Preview sample
The Health Issues and Global Food Security
5 pages (1540 words) , Download 1 , Essay
Free
The paper "The Health Issues and Global Food security" explores the health issues due to malnutrition.... Addressing Somalia's problems needs to focus on various dimensions, but the crucial factor at stake is the country's security.... THE ISSUE OF GLOBAL FOOD security (SOMALIA) by of the of the of the School 5 January, Introduction ... ood security is a crucial issue that links with health factors in any population.... Food security is recognized to be achieved when everyone has physical and economic access to acquire adequate, safe, and nutritious food all the time, so that their dietary needs and food preferences are met to achieve an active and healthy life (Bhargava, 2006, p....
Preview sample
Information Technology- Security
2 pages (500 words) , Download 4 , Research Paper
Free
In the Information technology- security Information technology- security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources.... Information assurances policies and its goals, mission and objectivesAn organization defines its information assurance policy as a course of actions pursued to enable organizations to obtain information assurance security....
Preview sample
Network Security Risk Assessment
9 pages (2250 words) , Download 4 , Term Paper
Free
he increasing complexity of information systems has resulted to information security threats .... The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information.... Network security Risk Assessment Network security Risk Assessment Introduction Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions....
Preview sample
Human Security and the Face of War in United Kingdom
6 pages (1726 words) , Download 0 , Essay
Free
The proponents of security dispute the relevance of the concept of national security by asserting that the proper focus for security should be the individual.... The proponents of human security dispute the relevance of traditional concept of national security by asserting that the proper focus for security should be the individual rather than the state.... This paper ''Human security and the Face of War in United Kingdom'' tells us that human security refers to an emerging paradigm for comprehending worldwide vulnerabilities....
Preview sample
Energy Security in Germany
8 pages (2171 words) , Download 0 , Essay
Free
This essay "Energy security in Germany" focuses on Germany's own energy resources are concerned, its established natural gas reserves were estimated at 325 billion in 1999.... Section 1: Introduction - background on energy security -Germany: ... ection 2: Define energy security + energy mix –Energy ... While energy security is incessant supply of energy to consumers. ... In the view of oil crisis the world over and diminishing fossil fuel resources, The EU-27 states have formulated objectives to ensure energy security....
Preview sample
Privacy and Security in Cloud Services
20 pages (5451 words) , Download 1 , Literature review
Free
"Privacy and security in Cloud Services" paper argues that the originators of cloud services were quick to sell their ideas without first addressing privacy issues exhaustively.... PRIVACY AND security IN CLOUD SERVICES ... Cloud services thus face the biggest security threat especially because they transmit and pool huge amounts of important and private data on the Internet, where it becomes the target of cyber criminals.... It is therefore imperative that key issues of data security and handling of personal data on cloud systems undergo a fresh study or review in order to forestall future disasters that threaten cloud service providers and their users....
Preview sample
The Return of Martin Guerre
4 pages (1000 words) , Download 2 , Book Report/Review
The return of Martin Guerreby Natalie Zemon Davis is an informative novel which narrates the story of the lives of peasants in the sixteenth century and the story of Martin, Bertrande, and Arnaud unfolds as Western Christendom is splitting into opposing camps.... ... ... ... The author has been effective in portraying the true story of a law suit against a man claiming to be someone he is not and Natalie Zemon Davis introduces to the readers the various aspects of the social life of the sixteenth century including peasantry, laws, and moral attitudes of the people....
Preview sample
What is European Security
20 pages (5000 words) , Download 2 , Essay
The concept of security has become.... The level at which security influences the rules and the policies of the European authorities but also of the member states is being differentiated under the influence of the political, social and One of the most important difficulties when trying to develop effective security schemes has been the identification of the conditions under which these schemes will operate; another issue in regard to the above initiative is the understanding of the needs that these schemes will serve....
Preview sample
Cultural, National Identity and Globalization
8 pages (2195 words) , Download 1 , Essay
Free
This paper 'Cultural, National Identity and Globalization' explores the concepts cultural and national identities, and the process of globalization and its impact on different cultures worldwide.... Cultural and national identities are very important for individuals in a given state as they create a sense of belonging and togetherness among members of a particular society.... Cultural, National Identity and Globalization Cultural and national identities are very important for individuals in a given state as they create a sense of belonging and togetherness among members of a particular society....
Preview sample
B&Q Consumer Perceptions and Values: Statistical Analysis
54 pages (13500 words) , Download 3 , Dissertation
DIY (‘do-it-yourself'), defined by the Office for national Statistics (ONS) is: ... B&Q needs to find the factors that influence buying decision of customers.... The research "B&Q Consumer Perceptions and Values: Statistical Analysis" shows that consumer behavior, as well as perceptions, is in relationship to B & Q's quality of service, brand name and loyalty....
Preview sample
US National Security Policy Towards Pakistan During the Last Three Administrations
20 pages (5000 words) , Download 2 , Research Paper
Free
However this is not deemed as a breakthrough in the foreign and national security policy of the United States with Pakistan because the following years saw greater developments (US Council on Foreign Relations). ... The writer of this paper aims to analyze the US national security Policy towards Pakistan during the last three Administrations.... The future of the US national security policy towards Pakistan will largely depend on Pakistan's willingness to support the US....
Preview sample
Sale Volumes and Profit margins by Selling Products and Services
6 pages (1644 words) , Download 2 , Essay
Free
It is the relation between the two that decides the price of products which in turn decides the potential profit margin of the enterprise.... The paper "Sale Volumes and Profit margins by Selling Products and Services" tells that small scale operations may be sufficient for production at the time of initiating a business....
Preview sample
How Geography Affects US Border Security
3 pages (1230 words) , Download 1 , Literature review
Free
Heyman and Ackleson (2008) cite that security has remained a key issue for the people of the United States and the government at large since 9/11, following the terrorist attacks on the World Trade Center.... Nevertheless, the Office of the National Drug Policy (1999) reports The paper 'How Geography Affects the US Border security" is a meaningful version of a literature review on politics.... Among others, Heyman and Ackleson (2008) cite that security has remained a key issue for the people of the United States and the government at large since 9/11, following the terrorist attacks on the World Trade Center....
Preview sample
The Automotive Sector of Canada
9 pages (2359 words) , Download 2 , Essay
Free
Now suppose other foreign speculators believe foreign fund managers are going to invest in Canada because of the interest rate differential and prediction of appreciation in Canadian dollar.... Enhance the security and efficiency of Canada's borders.... , this creates a nominal unit labor cost disadvantage (measured in national currencies) that must be offset by the exchange rate between the two currencies.... Manufacturing wages are 22 per cent higher than the national average....
Preview sample
National day in U.A.E
1 pages (250 words) , Download 14 , Essay
Free
Finally, may God bless my country and his Highness Sheikh Khalifa Bin Zayed AlNahyan, UAE President; to preserve our unity, security and prosperity.... national Day in the UAE UAE 2/14/2011 Khalid Ibrahim Khouri There is a national importance of December in the UAE.... hy do we celebrate a national Day?... national Day in the UAE UAE 2/14 Khalid Ibrahim Khouri There is a national importance of December in the UAE....
Preview sample
Nonel Peace prize ( Martin Luther King and The Dalai Lama)
7 pages (1750 words) , Download 2 , Research Paper
Free
He became the executive committee member of the national Association for the Advancement of Colored People by this age.... On the other hand he had to maintain diplomatic relations with the other neighbor, India, seeking support for Tibet to maintain its national integrity.... and Their Relevance to Surgery”, JOURNAL OF THE national MEDICAL ASSOCIATION 99 (1), p.... and the Making of a national Leader”, Book Review, Journal of American History, December 2009, p....
Preview sample
Security Planning at Grange Electronics International Ltd
11 pages (2873 words) , Download 2 , Essay
Free
The paper "security Planning at Grange Electronics International Ltd" argues the role of the security agency is not limited to providing safety, they provide the executive with the freedom to work.... A detailed executive security plan needs to be implemented by with the help of a professional security agency which has adequate experience of providing such services. ... he CEO of GEIL will have take into consideration various factors about Political, cultural, business, security environment of Nyland before choosing a course of action that is most appropriate to GEIL's investments in Nyland. ...
Preview sample
Managing information risk and security
17 pages (4250 words) , Download 4 , Essay
Free
opic of the Table of Contents Introduction …………………………………………………………………2 Risk and Actual Breach of security……………………………………….... Individuating Protection Motivation and Mandatory Responses ……………9 Management: security and Control ……………………………………….... IT-based corporation has also made it as standard policy to restrict employees from breaching organizational rules and requirements in the use of information systems and security policy (ISSP) to ascertain that their behaviours are also aligned on the need to secure company's database....
Preview sample
Using Multiple Interventions to Improve Mathematics Achievement with Grade 8 Students
118 pages (34567 words) , Download 3 , Research Proposal
The objective of this study is to implement and asses the effectiveness of the district approved mathematics program combine with multiple interventions that focus on the use of math manipulative tools among eighth-graders.... An urban middle school in the southeast section of Mid-Atlantic city.... ...
Preview sample
The Concept of Security Sector Reform
10 pages (2500 words) , Download 1 , Term Paper
Free
Demobilization implies the abandoning of armed groups for performing administration-oriented jobs like the setting and managing of temporary camps in which ex-insurgents get training for going back to normal life or joining the national security forces.... In Chile, civil-military relations and national integration in the aftermath of Pinochet affair, resulting in the arrest of former dictator Augusto Pinochet in 1999, and national reconciliation was an essential condition for political discussions on civil-military reforms....
Preview sample
Transport Security Administration
1 pages (326 words) , Download 0 , Assignment
Free
This assignment "Transport security Administration" presents the Transport security Administration (T.... based agency entrusted with the provision of security to passengers who are traveling.... The agency has employed twenty security layers to beef up security to people especially by air.... The security checkpoints usually mount a tight screening and inspection of passengers and their cargo to get rid of any dangerous weapon at their disposal....
Preview sample
Security System in Reference to Immigration
11 pages (2989 words) , Download 2 , Essay
Free
mmigration judges and national militaries.... nforcement and national militaries must be given more weight in our attempt to wrestle ... it is surprising, however, is that despite the restrictionist climate of public opinion in both Western Europe and the United States, the 1990s has been the decade of immigration and one, which recast the racial and national composition ... This paper ''security System in Reference to Immigration'' tells that Globalization has been the defining trait of the late twentieth century, exemplified by sharply increased trade in goods, inter-connected financial markets, and large-scale international migration....
Preview sample
Computer Security
9 pages (2250 words) , Download 2 , Research Paper
Free
The paper gives detailed information about the computer security.... Therefore, computer system security is considered to be the vital aspect of any organization.... Computer security ... Therefore, computer system security is considered to be the vital aspect in any organization (Armor2net Software Ltd.... Furthermore, web based technology and digital companies make it simple to collect, incorporate, and share business information, offering new fears regarding the suitable usage of customer details, the safety of individual confidentiality, as well as the security of intellectual property of the organization (Armor2net Software Ltd....
Preview sample
Planning for a National Emergency
7 pages (1750 words) , Download 2 , Research Paper
Free
The September 2001 terrorist attack was one of the disasters that prompted the federal government to institute the Department of Homeland security.... The September 2001 terrorist attack was one of the disasters that prompted the federal government to institute the Department of Homeland security.... Moreover, the agency has to ensure a high level of coordination exists between the different sections, and with the department of Homeland security....
Preview sample
Homeland Security Threats to Yemen
8 pages (2239 words) , Download 1 , Essay
Free
national security.... national security.... "Homeland security Threats to Yemen" paper states that Yemen faces threats to its homeland security, which should be handled to ensure much-wanted stability.... This has not been for the benefit of the Yemeni but as a strategy by the United States to manage its own homeland security by destroying the Al-Qaeda in the Arabian Peninsula and their haven (Katherine, 2012)....
Preview sample
Factors Affecting Attachment Security
1 pages (250 words) , Download 0 , Essay
Free
The author of the following paper "Factors Affecting Attachment security" will begin with the statement that the term attachment security is mainly used to define the bond that is developed between a child and the parent, especially during infancy.... As the paper outlines, attachment security helps children to acquire a sense of self-efficiency as they interact with the world.... ome factors affecting attachment security include: ...
Preview sample
Security Plan: Mecklenburg County Courthouse
6 pages (1500 words) , Download 2 , Research Paper
Free
(2003) Challenges to police, human rights and national security.... This essay discusses the security plan: Mecklenburg County Courthouse.... This building was therefore designed to be a large structure easing congestion and improve coordination, among which include security of courtrooms.... On a vulnerability score, the security Coordinator will formulate an effective security strategy for the Mecklenburg County Courthouse....
Preview sample
The United States Department of Homeland Security
8 pages (2360 words) , Download 2 , Research Paper
Free
The paper "The United States Department of Homeland security " discusses that although DHS has covered a long distance from its initiation and establishment and many reforms and reconstructions have led to improvements but DHS has shown certain shortcomings in critical circumstances in its history.... Homeland security Homeland security The twin towers of the World Trade Centre in New York were hit by two hijacked airlines on September 11, 2001....
Preview sample
Gandhi's VS. Martin Luther King's Views on Nonviolence
3 pages (750 words) , Download 2 , Essay
Martin Luther King and Mahatma Gandhi have been two of the most renowned leaders in the history of the world.... Born in two different places, and exposed to entirely different kinds of challenges in life, the views of the two leaders regarding nonviolence are totally different from each other.... ....
Preview sample
National Business Cultures
12 pages (3270 words) , Download 4 , Research Paper
Free
It is evidently clear from the discussion "national Business Cultures" that the formerly conservatively dressed men have changed rapidly to the modern open style.... Are national Business Cultures Affected by Changing Environments LEARNING OUTCOMES I.... Hofstede Analysis will help the foreign based national in his or her decision making processes because different cultures react differently in the same situation.... Hofstede Analysis will again help the foreign based national in decision making processes because different cultures react differently in the same situation. ...
Preview sample
Security Options
8 pages (2152 words) , Download 1 , Assignment
Free
In the paper 'security Options' the author analyzes the Computer security concentration, which focuses on basic security matters that occur in the design, study, and execution of distributed systems.... The author states that setting up a corporate security policy is one of the vital steps in establishing a strong and secure organizational context.... Even though the guidelines that require to be taken may be strenuous, they are essential to the progress and security of the whole institution....
Preview sample
Similarities and Differences between Security Risk Management
10 pages (2978 words) , Download 0 , Coursework
Free
The paper "Similarities and Differences between security Risk Management" states that the outcome of both assessments provides recommendations that maximize the protection of confidentiality, integrity and availability while providing usability and functionality.... Running head: Similarities and differences between security risk management and security threat security ... The management decisions made will include the allocation of security staff and the dissemination of warnings to the workforce and the general public....
Preview sample
National Programme for IT
4 pages (1000 words) , Download 3 , Essay
The British government offered eight big contracts in IT to different organizations so that they could develop IT systems in Europe's largest public sector organization, national Health Service [NHS].... These are NASPS, NISPS national application service providers (NASPS) will be responsible for delivering national application.... PS will have the responsibility of delivering the local aspects of national care record service (NCRS)....
Preview sample
National australian bank
3 pages (750 words) , Download 2 , Essay
In addition to all these, there is a separate section called using the site which gives all information regarding all the contents in website, security, accessibility, technical requirements and submitting feedback.... ther Company Owned Sites: The website provides link to national Australian bank group site which provides all information on the bank like annual reports, corporate governance details, financial results, etc....
Preview sample
Employment, Inflation and National Debt
10 pages (2745 words) , Download 2 , Coursework
Free
The paper "Employment, Inflation and national Debt" highlights that monopolies can be good or evil based on their formation.... There is rapid technological growth in the world today, and despite fears that most companies adapt development technologies from overseas, the rapid advance of ideas and the demand for constant upgrades assures technology professionals of job security in the next five years.... There is a rapid technological growth in the world today, and despite fears that most companies adapt development technologies from overseas, the rapid advance of ideas and the demand for constant upgrades assures technology professionals of job security in the next five years....
Preview sample
Sea Ports and Port Security Management
4 pages (1162 words) , Download 2 , Assignment
Free
ea ports are a vital element of the American economy and national security.... ustoms and coast guard employees must be remunerated well so that they input an extra effort in securing the national security.... The paper "Sea Ports and Port security Management" discusses that most ships calling at U.... Port security has been a topic of great debate among Homeland security since the 9/11 attack of September 2000....
Preview sample
Information Technology Security
7 pages (2129 words) , Download 2 , Coursework
Free
This coursework "Information Technology security" describes different types of attacks and the main aspects of security.... The discussion that follows will outline some of the challenges of information technology security.... INFORMATION TECHNOLOGY security by + Table of Contents INFORMATION TECHNOLOGY security 3 ... NFORMATION TECHNOLOGY security ... The discussion that follows will outline some of the challenges of information technology security....
Preview sample
Security Priorities in Britain
11 pages (3185 words) , Download 0 , Essay
Free
The manifesto has a very significant proposal in that the national security Service is paramount, with its emphasizing that citizen safety, Armed forces' well being, and also defence to be highly prioritized in policy- making.... The national security Council is among the most influential bodies trying to deal with terrorism but has been widely blamed because of coming up with a strategy to provide protection to the security of Britain by adoption of policies which caused Islamic terrorism in the beginning....
Preview sample
Interventions Towards Food Security in India
12 pages (3817 words) , Download 2 , Essay
Free
This essay "Interventions Towards Food security in India" is about the problem of food insecurity that persists in India, even though it is a food surplus and food grains exporting country.... But through public intervention methods, importantly through Public Distribution System, Kerala has done considerable successful interventions in food security, though the problem has not been solved fully.... Interventions towards Food security in India- a case of Kerala in South India Introduction Earlier, food availability and stability were considered the good indicators for measuring food security in any country and hence, achievement of self sufficiency was given higher priority in the food policies of the developing countries....
Preview sample
Networking Security Engineering
16 pages (4233 words) , Download 2 , Essay
Free
The paper "Networking security Engineering" tells us about advances in communications and technology.... Networking security Engineering The advance in communications and technology is compelling us to share information all over the world and which in turn paved the way for E-Commerce.... Keeping all the vulnerable sections in mind one has to maintain a high level of security for the site.... his is feasible if the knowledge about security strategies and awareness was enough....
Preview sample
Development of Military Power for International Security
9 pages (2547 words) , Download 1 , Essay
Free
Both the threatened and the threat are to be considered objective and national security as material condition.... national security has in the past been associated with state survival toward threats that are posed by other states.... The same legacy has continued to be used in national security matters.... Exceptional measures such as use of force, secrecy, suspension of civil liberties, extra legal activities and increase of executive powers by national security is justified by the same legacy (Art, 2009)....
Preview sample
Fiber Optic Security Systems
8 pages (2548 words) , Download 5 , Thesis Proposal
Free
The paper "Fiber Optic security Systems" discusses that the author will study the different physical intrusions on the fiber optic cable with a view of proposing a hybrid system that can detect and alleviate most of the physical and nonphysical attacks.... FIBER OPTIC security SYSTEMS College: Table of contents Table of contents 2 Introduction 3 1 Introduction 3 ... Study of the different Standards used for security systems 13 ... Study of the fiber optic security threats 13 ...
Preview sample
Data and Network Security
11 pages (2887 words) , Download 2 , Essay
Free
This paper ''Data and Network security'' tells that The company is known as 'Enterprise Training Solutions' is involved in the primary activity of providing training services and is based in Leeds, England as well as in Edinburgh, Scotland.... DATA AND NETWORK security ANALYSIS OF PROBLEM SCENARIO The company known as 'Enterprise Training Solutions' is involved in the primary activity of providing training services and is based in Leeds, England as well as in Edinburgh, Scotland....
Preview sample
1551 - 1600 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us