StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Operating Systems and Security
5 pages (1260 words) , Download 1 , Report
Free
This report "Operating Systems and security" presents the security systems for the two file systems that are more or less similar to minor differences.... Topic: Operating systems and security Pre-brief 26th February Shell Program 1.... The permission and access control differ with the ext3 advancing an owner and owner group system and NTFS adapting an access control....
Preview sample
Data Privacy and Security
12 pages (3320 words) , Download 2 , Research Paper
Free
The research paper 'Data Privacy and security' demonstrates that cybercrime is any felony that is committed using a computer or any other computer-related device for example the internet.... The key way of ensuring the security of data and information on transit is making sure that the laid network devices are protected from any vulnerable attack like theft since a breakdown in the physical network setup weakness gives an opportunity to attackers.... Scope of the problem The different types of attack that amount to cyber crime and are detriment to cyber security are keylogging and spyware....
Preview sample
Managing Change, Human Resource Management, and Timex by Graeme Martin and Martin Dowling
1 pages (250 words) , Download 2 , Assignment
Free
This assignment "Managing Change, Human Resource Management, and Timex by Graeme Martin and Martin Dowling" discuss the experience of Timex Corporation, a US-based Multinational Corporation owned by Fred Olsen.... Timex is known for assembling and marketing watches.... ... ... ... During that time, a unionized workforce was employed....
Preview sample
Enhancing Urban Safety and Security
10 pages (2903 words) , Download 2 , Essay
Free
This essay "Enhancing Urban Safety and security" presents a legislative structure that prevents the contravention of the tenants' rights, today's legal scenario is pretty different and provides us reasons to be hopeful in the context of the tenant's rights.... 11), however, aims at redefining the dimensions of housing security of the UK citizens at large.... i) Broken and cracked windows, a serious challenge to James' personal security and inviolability....
Preview sample
Comparison of Training Implemented in National Oil Corporation and Arabian Gulf Oil Company
8 pages (2251 words) , Download 0 , Research Proposal
Free
The research proposal comprises of the research objective of performing a comparative analysis of the training and development programs incorporated by the two oil and gas companies that is Arabian Gulf Oil Company and the national Oil Corporation.... The paper "Comparison of Training Implemented in national Oil Corporation and Arabian Gulf Oil Company" is a great example of a research proposal on human resources.... The research proposal comprises the research objective of performing a comparative analysis of the training and development programs incorporated by the two oil and gas companies that are Arabian Gulf Oil Company and the national Oil Corporation....
Preview sample
Ptr 100 Perspectives on Security And Terrorism
4 pages (1000 words) , Essay
Nobody downloaded yet
part from strengthening the hands of America, in countering global terrorism, Australia has concentrated heavily in domestic security as well.... Even though, occasional terrorist activities were there in the world before 9/11, the seriousness of the problem was better understood by the world only after....
Preview sample
National Environmental Policy Act
8 pages (2314 words) , Download 2 , Research Paper
Free
This paper ''national Environmental Policy Act'' tells us that in the current age where we are feeling the ravages of global warming and its related environmental issues, our government officials seem to be actively searching for means to stem the tide of environmental damage and its long-term impact.... The national Environmental Policy Act (NEPA) was first passed in 1969, and it is one of the first laws ever written which establishes an encompassing national framework in the protection of the environment....
Preview sample
National Healthcare Insurance
5 pages (1250 words) , Download 2 , Essay
Free
national Health Care Insurance John Stuart Mill conception of liberty correlates liberty of discussion and thought, individuality as an element of well-being, and limits to societal authority over individuals.... With the consideration of the above scholars and their principles, the national health care insurance plan will violate most the principles set by these philosophers.... Imposing a national health insurance plan on all citizens of the US will be undermining their individual liberties....
Preview sample
What Elements of Security Actually Mean
6 pages (1710 words) , Download 2 , Essay
Free
The paper "What Elements of security Actually Mean" discusses that as safety of all guests will be the responsibility of the security personnel, so they will have to be fully attentive so as to make sure that no criminal activity takes place within the premises of the function.... Generally speaking, whenever a guest arrives, the security personnel will have to ask him for his entrance card.... If any person entering the territory seems suspicious, the role of the security personnel will be to investigate him....
Preview sample
Management Accounting: Absorption vs Marginal Costing
9 pages (2626 words) , Download 4 , Essay
Free
As the paper "Management Accounting: Absorption vs Marginal Costing" states, costing is the technique used for the ascertainment of the cost of products and services.... The adoption of cost accounting will be useful in controlling costs and for taking strategic management decisions.... .... ... ...
Preview sample
Biometric Technologies vs Traditional Security Methods
5 pages (1467 words) , Download 3 , Essay
Free
From the paper "Biometric Technologies vs Traditional security Methods" it is clear that biometric hand geometry readers or devices are used in clinics, casinos, lodges and bars as well as office buildings to regulate access and entry because traditional methods cannot perform such tasks.... For years, traditional security strategies such as personal PINs and passwords have been in use but with various limitations.... Currently swipe cards and personal identification numbers have been introduced for increased security....
Preview sample
Improving Security Across The Software Development
5 pages (1414 words) , Download 1 , Report
Free
This report "Improving security Across The Software Development" discusses network security devices, this service helps our organization improve risk management and satisfy compliance requirements by reducing threats to the confidentiality, and availability of business processes and information.... Therefore, the evaluation of the security status of these network devices is vital.... Module Module Network security devices List Antivirus program-cost about $15 e....
Preview sample
Rational Recreation
11 pages (2805 words) , Download 1 , Essay
Free
The author of this paper "Rational Recreation" discusses why recreation should be rational and how has this idea been expressed at different times, recreation as any activity which is individual.... The paper provides references to both the ancient and the modern world.... ... ... ... Various people view rational recreation quite differently....
Preview sample
Martin Luther King Junior in the pages of the History
8 pages (2187 words) , Download 1 , Literature review
Free
This literature review shall review and analyze the life of Martin Luther King Jr.... The review suggests King has taken a long journey from being a disbeliever at the age of thirteen and then, he led a moment based on Christian ethical values in order to prove his belief on Jesus.... ... .... ... ...
Preview sample
Security and Risk Management
11 pages (2750 words) , Download 3 , Essay
Free
In the paper 'security and Risk Management' the author provides a critical review of the research which focuses particularly on the methodology.... security and Risk Management of the of the security and Risk Management Introduction In the given scenario, a securitymanager employed at a large store is concerned at the extent of shoplifting in the store and has undertaken a piece of research which examines the problem.... A Critical Review and Analysis of the Report on Shoplifting Presented by the security Manager Working at the Large Departmental Store We will now review the research report on the issue of shoplifting prepared by the security Manager of the large departmental store....
Preview sample
Electronic Software Security in Medical Institutions
5 pages (1250 words) , Download 1 , Research Paper
Free
This essay discusses electronic software security in medical institutions.... It analyses government and technological sectors, for a better software security system....  Electronic Software security in Medical Institutions ... oftware security in Health Settings ... This very nature of electronic systems enhances the risks of information intrusion; hence, software security has been established.... Software system security is a program specific in safeguarding the integrity of database, warding off “unauthorized (actions)....
Preview sample
The Disturbing Issue of Food Insecurity and Its Prevalence in the US
3 pages (845 words) , Download 3 , Essay
Free
The concept of food security pertains to not only the elimination of hunger but also the potential of hunger.... (Household Food security in the United States, 2006 Food insecurity in United States households is usually recurrent or episodic, but not chronic (unlike that in developing and undeveloped countries).... Some particular household groups are more susceptible to food insecurity than others, with the prevalence of food insecurity much higher than the national average....
Preview sample
Key Industry Success Factors of Amazon
8 pages (2187 words) , Download 3 , Research Paper
Free
Financial Indicator Current Period Previous Period Operating Cash Flow margin 8.... % Operating Cash Flow margin= EBITDA divide by Sales Explanation: This is a company representation of the cash flow revenue generated from the sale of every single product.... What is Net Profit margin?...
Preview sample
Network Security and Its Business Impact
8 pages (2000 words) , Download 2 , Essay
Free
This essay presents network security which has become a major issue in the business world....  Table of Contents Background: 2 2 Situation Overview: 2 3 Presenting the Problem Definition: 3 4 Real World Target: 3 5 What is security?... 3 6What is Network security?... To identify the criteria of security for integrated wired/ wireless networks in organizations.... To develop suggestions for the security policies in organizations, to address the changes in wired and wireless networks....
Preview sample
TSA Airport security and the changes after 9/11
14 pages (3500 words) , Download 4 , Research Paper
Free
Since the function of the TSA encompasses national security, focus should be given on improving analytical abilities and developing a structure that promotes information sharing and building knowledge capabilities.... Aviation security has been a primary concern for authorities and passengers since the terrorist attack on 9/11.... The September attack raised serious questions on the viability of existing security check procedures and the outcome was the formation of TSA....
Preview sample
All About the Art of Book Marking
3 pages (823 words) , Download 2 , Essay
Free
The enumerated process includes underlining major points, use of critical lines at the margin, using stars, or asterisks sparingly, marking with numbers to indicate the sequence of points, etc.... The numbers of other pages in the margin should indicate where else in the book the author made points relevant to the point marked.... Finally, a note can be written in the margin, or at the top or bottom of the page....
Preview sample
Evolution of Web Security
12 pages (3204 words) , Download 3 , Essay
Free
The paper "Evolution of Web security" discusses that Web security is a very important area of information technology.... Web security Prepared for Web security Introduction Technological evolution has grownfast and vast.... However, these platforms are loaded with a major risk: information security risk.... In the recent years, web security, a branch of information security has drawn an eye of attention from many industries and organisations....
Preview sample
Porters Ideas on National Competitive Advantage
8 pages (2209 words) , Download 2 , Essay
Free
The inbound Foreign Direct investment helps Singapore attract more and more foreign capital and technological advancement whereas the outbound Foreign Direct Investment aids Singapore in achieving the advantages of cheap labor and national resources.... Loan granting, mitigation of taxes, provision of useful information, security of research and its results, promotion of manpower and institutions for technological assistance etc.... This essay "Porter's Ideas on national Competitive Advantage " discusses Porter's theory that may be taken as a great contribution to the debate of Competitive advantage....
Preview sample
Analysis of the 6th Chapter of The Aesthetics of the Natural Environments
3 pages (750 words) , Download 2 , Essay
The author differentiates between human attitudes and appreciation towards art and towards appreciation of the aesthetic value of nature.... On the other hand scientific evidence should not surplus all other aesthetic appreciation of nature.... Date Analyse chapter 6 of the book “The aesthetics of the Natural Environments,”eds....
Preview sample
Rational Decision-Making Model
6 pages (1500 words) , Download 12 , Essay
Free
national FORUM OF EDUCATIONAL ADMINISTRATION AND SUPERVISION JOURNAL, 27, pp.... This research will begin with the statement that decision making is required in every field whether it is business or routine life activities.... It is required to make effective decisions in limited time by formulating policies through proper planning....
Preview sample
The Effective Manager
9 pages (2250 words) , Download 2 , Assignment
Free
In order to evaluate the statement that how does the understanding of accounting and financial management contribute to effective security management, one has to learn the whole process and implications of effective security managements and its linkages to the accounting and financial knowledge.... security policies are the foundation of the effective security management.... Without them, one cannot protect the company from possible lawsuits, lost revenue, and bad publicity, not to mention basic security attacks....
Preview sample
Threats to Computer Security
3 pages (818 words) , Download 3 , Essay
Free
The paper "Threats to Computer security" describes that with information regarding the recent attack releases as well as the current and viable protection measures, individuals are better placed to avoid falling trap to the tricks of the attackers and cybercriminals.... Computers have always been a major target for security threats.... Thus, the issue of computer security is very diverse such that it is not easy to cover.... This is because, the threats to computer security range from cyber crimes to computer crimes and internet crimes, as well as computer privacy issues....
Preview sample
IT Security and the Impact of CIO Roles
3 pages (996 words) , Download 4 , Essay
Free
The essay "IT security and the Impact of CIO Roles" focuses on the critical analysis of the major issues in IT security and the impact of CIO roles.... Information security threats have made governments enact information communications laws to set requirements and standards that an information system must meet to perform effectively.... For a system to pass these security compliances it must meet the criteria set; the system boundaries for the hardware, software, users, and interactions with the environment must be clearly defined to assess any threats....
Preview sample
Describe Maslow's hierarchy of needs
2 pages (500 words) , Download 8 , Essay
Free
Aesthetic needs mainly consist of appreciation and search for beauty, balance, form, etc.... Everyone wants to have safety and security.... This may be for physical security, health security, employment security, revenues, property and resources security, moral and physiological security, family security, etc....
Preview sample
Security Locking Devices
6 pages (1500 words) , Download 3 , Assignment
Free
The author of this assignment entitled "security Locking Devices" comments on the difference of two locking devices for doors and windows and the means of generating power through alternative means to that of the existing modes of power generation.... While the first text is to do with the microcontrollers and processors that make up the security locking system, the second text is to do with the photovoltaic cells, Wind turbines and the CHP systems that make up the power generating capacity....
Preview sample
Border Security and How It Has Grown over the Decades
10 pages (2742 words) , Download 2 , Research Paper
Free
"Border security and How It Has Grown over the Decades" paper analyses border security, its history, and its evolution over the years.... The border security force or Customs and Border Protection (CBP) is the largest law enforcement workforce in America.... One of many concerns raised by September 11, 2001, terrorist attacks in New York and Washington is the security of U.... The Homeland security Act of 2002 established border security as a major mission for the new Department of Homeland security (DHS) Approximately 11 million illegal aliens live in the United States....
Preview sample
Kurds' Self-Determination - National State Concept
6 pages (1762 words) , Download 1 , Research Proposal
Free
In addition, this group of people has a deep sense of cultural and national values.... This would bring stability and security to the region and provide welfare to the people residing over there.... This report intends to review the concept of a national state applied to the self-determination of Kurds and Irish.... In most cases people are returning back to their state where they have a chance to share the same national identity with the representatives of their own group....
Preview sample
Public and Business Administration Comparison
8 pages (2400 words) , Download 1 , Coursework
Free
security, education, healthcare and consumer protection are some of the public goods.... security concerns, the privately owned entity being sacrosanct in the running of the government or in the provision of public goods and forceful acquisitions or takeovers are the main reasons for nationalization.... In response to security concerns following September 11th Attacks, the airport security industry underwent nationalization, and became operational under the aegis of the Transportation security Administration, pronto....
Preview sample
Security in New Generation Cell Phones
5 pages (1371 words) , Download 2 , Report
Free
This report " security in New Generation Cell Phones" discusses cell phones that play a major role in the information technology revolution to the present generation.... However, they also come with various security risks discussed above.... security in new generation cell phones Task: security in new generation cell phones Cell phones and other mobile devices accessories play a major role in the information technology revolution to the present generation....
Preview sample
The Business Scenario of Japan and Its National Innovation System
8 pages (2000 words) , Download 5 , Term Paper
Free
It is not merely a rise in GDP due to higher value of exports on account of appreciation of currency.... This paper "The Business Scenario of Japan and Its national Innovation System" summarizes the NIS provides all Japanese institutions and commercial enterprises with an equal transfer of information.... usiness environment of Japan Table of Contents Introduction 3 Business environment in Japan 3 national Innovation System (NIS) 4 Government component of the NIS 4 Finance component of the NIS 6 Scientific and Technological institution/Education components of the NIS 7 Industry component of NIS 8 Conclusion 9 Reference List 10 Introduction Economic growth driven by innovation is a sustained growth process and it involves the entire economy in the path of growth....
Preview sample
The 1992 European Exchange Rate Mechanism Crisis
6 pages (1500 words) , Download 3 , Case Study
Free
This case study describes the analysis of the 1992 European exchange rate mechanism crisis, that was introduced to reduce firstly to exchange rate variations and for the purpose of maintaining monetary stability in Europe and in the United Kingdom especially.... .... ... ... The European exchange rate mechanism was a system intended to maintain fixed but adjustable exchange rates, this mechanism was also seen as a way that would stimulate trade and investment among member countries, countries prone to inflation considered the fixed exchange rates as a way to maintain price stability....
Preview sample
Security Issues in Various Public Places
8 pages (2303 words) , Download 2 , Report
Free
This report called "security Issues in Various Public Places" describes the security employed in three different public places, namely, airports, banks, and workplaces.... From this work, it is clear that security also includes virtual security such as internet banking, online shopping, and airport software systems, among others.... Unlike previous decades, security today has been tighter and more intensive.... Running Head: security ISSUES security Issues in Various Public Places Nowadays, human security has been a worldwide phenomenal concern....
Preview sample
National Sovereignty and Democracy vs Humanitarian Intervention
9 pages (2696 words) , Download 2 , Essay
Free
and European states view Africa as an insignificant security threat.... security.... nstantaneous, mid-, and long-term labors to encourage steadiness and security on the African continent are needed to end the widespread violence that frustrates progress, creates setting ripe for humanitarian adversity, and every so often leads to novel failed states, argument, considered and natural, is the foremost enemy of following, social, and economic advancement and vestiges widespread in Africa....
Preview sample
Objectives of Virgin Atlantic Airline with the British Red Cross
14 pages (3843 words) , Download 2 , Essay
Free
It also encourages customers to travel between the countries thereby increasing the profit margin of VAA (Erskine, 1991). ... cleaning companies, security companies e.... The government enforces property rights, enforces contracts, prevents fraud, force and coercion, provides for local law enforcement, national defense etc.... his policy improves the efficiency of trade among the nations thereby increasing the customers to VAA hence increasing the profit margin which may lead to expansion of VAA activities in the region. ...
Preview sample
Online Security Threats Removal
6 pages (1713 words) , Download 2 , Essay
Free
The essay "Online security Threats Removal" focuses on the critical analysis of the removal of online security threats.... But, it doesn't matter if you use the internet to get information or to shop around, you have to face certain security threats as there is an overwhelming increase in cybercrime over the last few years.... Can online security threats be removed altogether' Discuss.... But, it doesn't really matter if you use internet to get information or to shop around, you have to face certain security threats as there is an overwhelming increase in the cyber crime over the last few years....
Preview sample
Pros and Cons of the European Currency Union
8 pages (2146 words) , Download 3 , Term Paper
Free
"Loss of national sovereignty is the most often mentioned disadvantage of monetary union.... The transfer of money and fiscal competencies from national to community level would mean economically strong and stable countries would have to co-operate in the field of economic policy with other, weaker, countries, which are more tolerant to higher inflation.... When there is a same currency in many neighboring countries the power from one county inevitably travels to another country resulting in the loss of the ability of the national government to control policy....
Preview sample
Martin Luther the Hero of the Reformation 1483 to 1546
1 pages (250 words) , Download 4 , Essay
Free
This study will analyze the book 'Martin Luther the Hero of the Reformation 1483 to 1546' written by H.... .... Jacobs.... The major weaknesses of this study are concentrated on Martin Luther's numerous disagreements with the Roman Catholic Church's doctrines.... ... ... ... This research will begin with the statement that according to Jacobs, in his book Martin Luther was a hero who led a major reformation....
Preview sample
Security Of Swimming Pool
13 pages (3474 words) , Download 0 , Research Paper
Free
The paper "security Of Swimming Pool" underlines that the main problem being the cost incurred in maintaining the security systems which may be expensive.... The systems are not yet perfect meaning that there will be instances that the security systems will sound falsely.... Swimming Pool security ... n the 21st century, there has been a new wave of different ways of security using the best available technology....
Preview sample
Service and the Security Implication Voice over Ip
60 pages (10366 words) , Download 2 , Dissertation
From the paper "Service and the security Implication Voice over Ip" it is clear that opportunistic hackers can be akin to a criminal who just walks down a street looking for open doors or open windows if not backdoors that he can use to get inside an establishment.... In ensuring the security of the information technology infrastructure the VoIP infrastructure is also affected.... This dissertation shall tackle the different security threats and vulnerabilities of VoIP....
Preview sample
Business Proposal for a Partnership Firm
4 pages (1000 words) , Download 2 , Assignment
Free
This assignment discusses the organizational structure and the management team of Millimeters which is supposed to be a partnership firm with three partners involved in it.... These three would be the owner of the company and would be responsible for managing the company as a whole.... ... ... ... The company would offer few of the proposed services for its customers and then depending on the increase in demand for other services in the market, the company would hire more specialists to handle other services....
Preview sample
Founding a Nation 1783-1789
9 pages (2253 words) , Download 0 , Assignment
Free
The women's movement split into two separate national organizations in part because the 15th Amendment did not give women the vote.... lthough it might seem as somewhat strange, the split that occurred and created two separate national organizations that promoted women's rights within the United States can ultimately be linked to the Civil War and the issue of slavery.... What national issues and attitudes combined to bring an end to Reconstruction by 1877? ...
Preview sample
Oman's International Relations and Foreign Policy Initiatives
38 pages (9811 words) , Download 5 , Research Paper
Oman is a unique case study because unlike other countries in the Middle East which are directed by ideological leanings and immediate benefits, the Sultanate of Oman has been driven by its own particular agenda, takes the position that peaceful negotiation is important for achieving long-term gains for preserving prosperity and security for Oman.... At the heart of these national connections and disconnections are human beings who make decisions either in groups or alone (Hudson, 2005)....
Preview sample
Biometric Security System
5 pages (1591 words) , Download 1 , Report
Free
This report "Biometric security System" presents the use of iris recognition banks that can be able to reduce fraud activities and guard the customer's bank accounts.... Biometric security ... he IRIS method of biometric security has brought about a sign of relief in terms of effectiveness more so in reducing fraud in the banking industry.... he IRIS biometric security measure ensures that customers will have their authentication to a bank for a long time and thus regarded as a stable method as opposed to carrying of cards which can easily get lost or damaged....
Preview sample
Information Security Proposal
2 pages (500 words) , Download 4 , Essay
Free
Being mobile phone users it is essential for us to understand how the company deals with the information security and the measures that are in place for the IT disaster recovery plan as Information security Proposal Aim and Objectives of Project: To identify the issue faced by mobile phone network providers in regards to the privacy issues and the network downtime issues.... Justification of the Project:Information security issues within firms are many....
Preview sample
Interest and Security Lies
1 pages (309 words) , Download 2 , Essay
Free
The essay "Interest and security Lies" states that each one of us who were already aware can remember where we were, what we were doing and how we felt on September 11, 2011.... It has propelled me to pursue my current course as a homeland security major.... security is an integral fact that must be given due attention in our diplomatic discourse.... This is where my fervor toward counterterrorism and the indispensability of security lies....
Preview sample
3451 - 3500 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us