StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
National Gallery of Art
2 pages (500 words) , Download 2 , Research Paper
Free
I am partial with Andy Warhol not only that he is American but I can relate more to his work because it blurred the demarcation between fine arts and popular culture that it made his work more contemporary that young people like me Experience and Reflection on Exhibits from the national Gallery of Art Museum in DC: Warhol Headlines There are several exhibits that are currently going on at the national Gallery of Art Museum in DC.... His exhibit is located at the East Upper Level of the national Gallery of Art in DC that will run from September 25, 2011 to January 2, 2012 (national Gallery of Museum and Art, 2011)....
Preview sample
Maritime Security on a Broad Scale
8 pages (2267 words) , Download 1 , Coursework
Free
The paper "Maritime Security on a Broad Scale" provides a thorough insight into the nature of threats and the deployed countermeasures for economic, national security, environmental, and energy security of a vast area of the open sea, where no nation claims jurisdiction.... This work will discuss four sections of the topic, energy security, environmental security, economic security, and national security.... national security depends on how well a society secures its maritime domain from acts of terrorism and piracy....
Preview sample
Cyber Security: Foundations of Risk Management
4 pages (1122 words) , Download 3 , Research Paper
Free
The research paper 'Cyber security: Foundations of Risk Management' focuses on cybersecurity and how it poses to be a huge risk now and the next decade.... CYBER security Introduction The research paper will be oncyber security and how it poses to be a huge risk now and the next decade.... The American government understands that cyber security is a very complicated war and it needs a lot of intelligence to be able to ensure that in as much as organizations are transacting and conducting business it is important for them to be regulated to ensure that safety standards are adhered to. ...
Preview sample
National Drug Control Strategy Structure
5 pages (1250 words) , Download 2 , Research Paper
Free
An author of the research "national Drug Control Strategy Structure" will outline the main principles of working of the national Drug Control.... he national Drug Control Strategy ... One way is to increase national beer tax and commit the revenues to substance abuse prevention (Califano, 2007).... 2011 national Drug Control Strategy.... ov/ondcp/2011-national-drug-control-strategy ... White House: 2011 national drug control strategy....
Preview sample
Security Automation in oil and gas company
2 pages (500 words) , Download 2 , Assignment
Free
The use of security automation systems would significantly help to control the above industry's risks.... 32) the need for extensive research on the role, the challenges and the benefits of security Automation systems in the oil and gas industry was security Automation in Oil and Gas companies security Automation in Oil and Gas companies Topic Overview The exposure of the oil and gas companiesto risks is high.... The use of security automation systems would significantly help to control the above industry's risks....
Preview sample
Aspects of Network Security Management
6 pages (1903 words) , Download 1 , Essay
Free
The essay "Aspects of Network security Management" focuses on the critical analysis of the comprehensive overview and analysis of some of the main aspects of network security as well as its management.... However, these systems also encompass some of the grim security and privacy-related issues.... NETWORK security Network security In the present era the new technology has definitely evolved to a huge extent....
Preview sample
National and Community Benefit
1 pages (323 words) , Download 3 , Essay
Free
The author of the "national and Community Benefit" paper summarises the national and community benefits that are expected to arise from the research and explains why this project is of interest and why the author believes he/she has the skills and knowledge necessary to undertake it successfully.... Dental erosion is thus becoming a preponderant health problem in the national context....
Preview sample
Indian National Cinema
10 pages (2500 words) , Download 3 , Essay
Free
Indian national Cinema.... ndian national Cinema Cinema, since its evolution, has emerged as one of the most stimulating means of influencing thehuman race.... national industries have been developed in many countries, to cater to the needs of people belonging to a certain culture and can speak a certain language.... Countries where diversity in culture exists, national cinemas have been so vastly developed that movies are produced in various languages and are also translated from one local language to another....
Preview sample
Business plan to develop a small business - Engineering or Manufacturing Based
40 pages (10000 words) , Download 3 , Dissertation
Final Report Alroy Sheet Metals EXECUTIVE SUMMARY Domestically and internationally, Alroy operates and will be operating in very saturated market environments with competition of wide variety producing drawer runners.... However, Alroy intends to capture the UK and even foreign markets by focusing on innovation production and devoting considerable capital and labour expenditures into the research and development process....
Preview sample
The Significance of Systems Configuration and Management for a UNIX System
8 pages (2392 words) , Download 2 , Essay
Free
This essay "The Significance of Systems Configuration and Management for a UNIX System" discusses detailed analysis of security-related aspects for the UNIX operating system.... This essay analyses some fundamental issues that compromise the security and privacy of the UNIX system.... ractical UNIX security Table of Contents Introduction UNIX is the most popular operating system which has been used extensively, and a lot of people still use it as it has been used in the past....
Preview sample
Discretion Granted to National Courts in Relation to the EU Legal Order
11 pages (3006 words) , Download 2 , Essay
Free
The author of the paper titled "Discretion Granted to national Courts in Relation to the EU Legal Order" argues that government crimes are the leading causes of problems such as poverty in countries.... It is clear that different countries might adapt and make decisions in different ways; different questions might be interpreted in different ways and applied in different ways, through the control of national courts.... Discretion Granted to national Courts in Relation to the EU Legal Order Number: Due: Introduction According to Article 234 of the European Courts Treaty, the European Court of Justice (ECJ) has the rights and obligation to ensure that the laws that are established by the member states of the European Union has the same meaning and it is effected in the same way to all the member states....
Preview sample
Analysis of Security of the Airport
10 pages (2500 words) , Download 3 , Research Paper
Free
This essay "Analysis of security of the Airport" discusses the new security measures of air travelers and airport employees.... Following certain incidents, the authorities in different nations have instituted their own security measures but by and large most follow what the US does.... security of the airport is of paramount importance as it entails the security of the passengers, the air crafts, the crew, the nation and a huge amount of individual, organizational and national property....
Preview sample
What is Social Security and Social Security Trust Fund
1 pages (377 words) , Download 2 , Term Paper
Free
The focus of this paper "What is Social security and Social security Trust Fund?... is on Social security as a provision for guaranteed income every year to over 55 million American families and workers who have lost revenue due to retirement, death or disability.... Social security is the provision of insurance security valued at $400,000 for youthful workers and their families.... Social security Trust Fund is support operated by the Social security Administration into which remunerated payroll tax aids from employers and workers under the Social security scheme....
Preview sample
The National Risk Registers of Civil Emergencies
8 pages (2185 words) , Download 0 , Essay
Free
It can also be described as 'war, or terrorism that threatens serious damage to the security of the UK.... The paper "The national Risk Registers of Civil Emergencies" precisely summarizes all the information that is contained in the document and gives a critical review of the issues that have been handled.... CRITICAL REVIEW OF THE national RISK REGISTERS OF CIVIL EMERGENCIES ... he national risk register of the civil emergencies (NRR) is a document prepared in 2008....
Preview sample
Homeland Security and Child Pornography
5 pages (1575 words) , Download 0 , Coursework
Free
Customs and border Protection, and U.... This "Homeland security and Child Pornography" paper explains why Child Pornography is considered as important or relevant in Information Warfare and Homeland security today, investigates and analyzes the relation among Homeland security, Information Warfare, and Child Pornography.... The Department of Homeland security considers child pornography as a serious crime against children and implements effective preventive measures against the same....
Preview sample
Recent Development in Fight against Peer to Peer File Sharing: Legal Issues and Alternative Solutions
29 pages (2250 words) , Download 2 , Assignment
This paper examines the technological difficulties and the legal barriers faced by the right-holders in their fight against the p2p file sharing, with a comprehensive focus on the defendants of p2p infringement such as: web providers, individuals and ISP.... ... ... ... This paper, Legal Issues and Alternative Solutions, attempts at showing the ineffectiveness of legal litigation against these defendants and at providing alternative solutions to prevent the P2P file sharing infringements....
Preview sample
Cross Border Insolvency
5 pages (1250 words) , Download 2 , Essay
a ) common characteristics b) any significant differences In any case: c) how compatible are those processes d) how would the event of any incompatability affect the development and employment of a cross border recognition and assistance law between those jurisdictions ... ... ... ...
Preview sample
Wireless Security
15 pages (3750 words) , Download 3 , Essay
Free
Running head: WIRELESS security Wireless security Goes Here al Affiliation Goes Here Wireless security Introduction A wireless LAN (wireless network) is a network without wires.... he answer to Wi-Fi security may lie in "centralized" switches.... Originally, Wi-Fi antennas were complex systems that might include networking and security in the same box with the antenna.... This concept greatly enhances security and eases maintenance and monitoring compared to previous generations of Wi-Fi antenna....
Preview sample
Social and National Identity
5 pages (1250 words) , Download 3 , Essay
Name of the of the Concerned Professor Sociology 25 August 2011 Social and national Identity Introduction One of the most interesting aspects of sociology it to attempt to understand as to how people manage to develop a sense of membership and a notion of belonging with a particular group.... Many a times the viciousness associated with intergroup discrimination and the resultant competition could give way to nasty social and national arrangements like apartheid in earlier South Africa or acts of genocide or say the Jim Crow laws in the American South....
Preview sample
Social Inequality of Mexican Americans
9 pages (2421 words) , Download 3 , Research Paper
Free
The paper "Social Inequality of Mexican Americans" underlines that the factors resulting in the inequalities, in the social establishment of the mexican Americans, continue to reflect themselves, worsening the standards of living of the people, and inflicting conflicts.... the mexican Americans constitute a vast group in the states, resulting in the institution of the New Mexican State (Maril 17).... Further, the community of the mexican Americans constitutes a vastly distributed population, with the members habiting various states at the southern side of the country....
Preview sample
A Change Initiative at a Security Company
6 pages (1724 words) , Download 2 , Term Paper
Free
The objective of this paper is to assess the current system at a security Company to determine which particular aspect needs change.... In this case of this security Company, the possible resistance could be a combination of emotional and social.... t A security Company ... he objective of this essay is to assess the current system at a security Company to determine which particular aspect needs change.... It is in this regard that this essay is written to present pertinent changes in organizational processes or systems to adjust to the requirements of efficiency in assuring compliance to attendance protocols of a security Company. ...
Preview sample
Planning for coordination with federal entities regarding homeland security
2 pages (500 words) , Download 2 , Essay
Free
vior, in the form of terrorists' threat or in the cases where low tolerance often results in violent events, coordination with various federal agencies becomes extremely important for homeland security.... In the emerging new trends of extreme aggressive behavior, in the form of terrorists' threat or in the cases where low tolerance often results in violent events, coordination with various federal agencies becomes extremely important for homeland security.... epartment of Homeland SecurityThe Department of Homeland security is the central agencies that to provide effective management resource within federal, state and local governments on security issues....
Preview sample
Information Assurance and Computer Security
6 pages (1705 words) , Download 3 , Report
Free
This report "Information Assurance and Computer security" discusses protecting the internet and computer system of an organization as essential for the survival of the organization.... This is the most challenging part while establishing the security of a computer system (Vacca, 2014).... t is therefore difficult to develop a standard security system that can protect from future threats.... Creation of a security solution for a company is not easy task, and depends on the needs and vulnerability of the company....
Preview sample
Family and Medical Leave Act
5 pages (1445 words) , Download 2 , Essay
Free
The FMLA is proposed to balance the needs of families with demands of the place of work, to encourage the economic security and stability of families, and to support national interests in protecting family integrity (Waldfogel and Jane, 17).... When a family crisis arises, needing workers to attend to children and parents, relatives, newly-born and adopted infants, employees need assurance for their job security and undertaking their family and personal obligations (Waldfogel and Jane, 17). ...
Preview sample
Australian National Culture
6 pages (1532 words) , Download 0 , Article
Free
This article "Australian national Culture" discusses various issues.... In Australia, there is national culture which influences the way people behave the way they do.... All the people of Australia have almost the same behavior because of the national culture which they inhibit.... he first characteristic of the national culture in Australia according to my observation is that the people have the culture of individualism.... Therefore, the national culture of Australia is that people approach things through individualism meaning that each individual wants to be independent and in this way the national culture in Australia encourages hard work....
Preview sample
IT Audit & Security controls at ABC Company
25 pages (6250 words) , Download 2 , Essay
The use of mobile devices in any organizations is expanding day by day.... Mobile device in an organization extend the boundaries of corporate networks beyond a restricted work environment to a loosely coupled, distributed platform where workers can carry and perform there assignments anytime, anywhere using various devices such as laptops, mobile devices and PDAs and communication technologies....
Preview sample
The Saudi Arabian Governments Efforts to Counteract Security Threats
7 pages (2086 words) , Download 0 , Case Study
Free
It is clear from the discussion "The Saudi Arabian Governments Efforts to Counteract security Threats" that the Saudi Arabian government is keenly aware of the past episodes of violence and, as a result, it has endeavored to put various measures into place to ensure the safety of the pilgrims.... In the past, the event has been characterized by numerous security threats, such as fires, protests, and stampedes, which have led to the death of hundreds of people....
Preview sample
The Chinese - American Cyber War
4 pages (1000 words) , Download 0 , Assignment
Free
One purpose pointed out to the commercial industry while the other targeted key aspect of national security.... This article addresses the breach of security into the American health industry and exposes previous events by the Chinese government and the Chinese hackers in relation to America internet attacks.... The attackers targeted crucial information such as security numbers, date of birth, and address location.... A report released by the American Government indicate that, there was no breach of credit card security....
Preview sample
The Health of the Nation
8 pages (2108 words) , Download 1 , Assignment
Free
It proposed social security, to be enjoyed in good, and have a free health.... Yet the British only barely succeeded in overcoming professional opposition to form the NHS out of the prewar mixture of limited national insurance, various voluntary insurance schemes, charity care, and public health services.... It was also at that time that there was a creation of coordinated hospital service, national and regional services for laboratory work and blood transfusions, and nationalized services for surgery, neurology, psychiatry, and rehabilitation, blood-transfusion and pathology services, and transformed sprawling Victorian country institutions into busy hospitals serving the bomb-threatened cities....
Preview sample
Neoliberalism and Government Control over Multi-National and Trans-National Corporations
10 pages (3108 words) , Download 0 , Literature review
Free
An example includes the massive inflow of MNCs into the mexican economy, which ruins the economy (Portes & Hoffman 2003). ... The paper "Neoliberalism and Government Control over Multi-national and Trans-national Corporations" is an outstanding example of a politics literature review.... The paper "Neoliberalism and Government Control over Multi-national and Trans-national Corporations" is an outstanding example of a politics literature review....
Preview sample
Transportation Security Administration
4 pages (1000 words) , Download 2 , Research Paper
Transportation security Administration Institution Affiliation: Date: TSA is a United States security agency primarily concerned with the public transportation sector.... It is also charged with the responsibility of ensuring that the security of the travelling public is upheld at every level of the transportation undertakings.... This means that the TSA agency manages all levels public transport, from mainland to air transport modes and means, the primary purpose being to ensure safety and security of travellers....
Preview sample
Network Security and Its Main Aspects
8 pages (2303 words) , Download 1 , Term Paper
Free
This work concentrates on network security and its main aspects.... This term paper deals with data protection, privacy, and network along with information security by lessening IT costs at large.... In this similar context, 'Cloud Computing security' is fundamentally described as a set of standardized procedures that are designed to deliver the utmost security as well as information assurance within the environment of cloud computing....
Preview sample
Effect of Leadership Style on Satisfaction and Motivation of Employees
23 pages (6409 words) , Download 2 , Literature review
This literature review "Effect of Leadership Style on Satisfaction and Motivation of Employees" offers the analysis of information concerning leadership, internal communication, employees, and management acquired through several years of management and some research carried out by various scholars....
Preview sample
Christie's Dubai: Reasons for Locating in Dubai
56 pages (14486 words) , Thesis
Nobody downloaded yet
Christie's was listed publicly in the stock exchange of London from 1973 up to 1999 but then it was taken back and was privately owned by Francois Pinault who was a French national.... This thesis "Christie's Dubai: Reasons for Locating in Dubai" focuses on the world-famous auction house and how Christie's had inaugurated its auction sale in the Middle East for the first time on the 24th of May, 2006, the auction was held at the Jumeirah Emirates Tower Hotel in Dubai....
Preview sample
Security Best Practice Guidelines for Businesses
4 pages (1000 words) , Download 2 , Admission/Application Essay
Free
The author of this essay entitled "security Best Practice Guidelines for Businesses" touches upon the Intrusion Detection System (IDS) which is a critical precautionary tool that monitors the network through monitoring packets that are passed within users.... The first and easiest application of an Intrusion Detection Systems for security purposes is known as application isolation.... The first and easiest application of an Intrusion Detection Systems for security purposes is known as application isolation....
Preview sample
Database and Enterprise Application Security
7 pages (1750 words) , Download 3 , Essay
Free
This paper 'Database and Enterprise Application security' will discuss various issues those need to be considered by the organizations for the protection of business data and information.... It will also present some of the basic aspects regarding DBMS system security concerns.... The author claims that information security remains an extremely significant concern throughout system development life cycle.... The operating system, the system architecture can be designed and integrated with security included features....
Preview sample
Analyze Job Description Security Officials
11 pages (2989 words) , Download 0 , Term Paper
Free
The paper "Analyze Job Description security Officials" is a good example of a term paper on management.... security is a fundamental provision necessary to an organization or even in residential places.... The primary role of any security firm or personnel is to be able to provide the best services in the protection of life and property.... The paper "Analyze Job Description security Officials" is a good example of a term paper on management....
Preview sample
The Generalization about the National Character
4 pages (1257 words) , Download 2 , Essay
Free
This paper ''The Generalization about the national Character'' tells us that there is a sound basis for doubting the validity of generalizations about the national character.... No one today will accept the notions which once prevailed that such qualities as the capacity for self-government are inherited in the genes, nor will anyone credit the notion that national character is a unique quality that manifests itself mystically in all the inhabitants of a given country....
Preview sample
Physical Security System Design
5 pages (1342 words) , Download 0 , Essay
Free
The paper "Physical security System Design" describes that security guards and cameras can guard the perimeter or interior, rational in terms of the above levels, and trying to device 2 or 3 physical security procedures at each level, which will aid in the implementing of suitable security actions.... Territorial Reinforcement is not in any way the same as perimeter security, but the objective of both is similar....
Preview sample
The National Geographic Society. National Geographic website
2 pages (500 words) , Download 2 , Essay
Free
The national Geographic Society.... ue to the popularity of national geographic the organization has a presence on the internet through its website.... The national Geographic Society was founded in 1888.... The national Geographic Society was founded in 1888.... Due to the popularity of national geographic the organization has a presence on the internet through its website.... The magazine link has the current issue of the national Geographic magazine for the month of March 2011....
Preview sample
Firewall Security Measures
13 pages (3250 words) , Download 2 , Essay
Free
This paper deals with the security measures in information technology.... Admittedly, layers 3 and 4 of OSI models use packet filtering as a firewall security measures, with IP address in the packets, and also the ports used to filter session that is admitted or otherwise drop.... The author of the paper touches upon the security means within the information technology sphere.... 1a Layers 3 and 4 of OSI models uses packet filtering as a firewall security measures, with IP address in the packets, and also the ports, used to filter session that are admitted or otherwise drop....
Preview sample
Information Technology Security
8 pages (2043 words) , Download 3 , Report
Free
This report "Information Technology security" discusses one such aspect, which is the human-computer interface (HCI) that is at the basic level by which people interact with computers.... INFORMATION TECHNOLOGY security (Computer Sciences) of (affiliation) of Submission: Estimated word count: 1,937 Introduction The human experience today continues to be benefited and expanding at a very fast rate because of computer-related technologies which contribute greatly to modern conveniences....
Preview sample
Security Management in Maritime Organisations
8 pages (2212 words) , Download 3 , Case Study
Free
The paper "security Management in Maritime Organisations" discusses that looking to the future in the short term would probably complement the great maritime innovation of the late twentieth century deployed by the TT Club, container shipping by providing distributor services.... Compare and contrast the TT Club's loss prevention guide "Terminal security" with the International Maritime Organisation (IMO)'s ISPS The TTClub 'Stoploss' initiative manual has been published in order to prevent and create awareness among its members about various maritime losses and threats....
Preview sample
Security Manager: Ethical and Social Responsibilities
15 pages (3750 words) , Download 2 , Essay
Therefore, the dependence on security solutions is becoming greater.... In this context, the security manager is responsible for not only protecting data but also acting responsibly.... As Deb Shinder points out in her article on the ethical issues of IT security on the Internet, they have to be leaders in self-restraint and not abuse their position by prying into data not relevant to them.... hey also have to be guides to their colleagues in establishing a good security culture by gaining their confidence and ensuring that all across the board are aware of the need for security as an enabler rather than a block....
Preview sample
The Course of Mexican History Research Paper
3 pages (750 words) , Download 2 , Essay
Date A Reflection on ‘The Course of mexican History' Learning from the course modules based on the book entitled The Course of mexican History written by authors Meyer, Sherman and Deeds was analogous to taking an exciting journey to experience another culture.... Finally, the influence of other races: Spaniards, in particular, in their way of life, in political endeavors, and in fighting for national freedom from foreign rule and...
Preview sample
Mexican Immigration to the United States
8 pages (2058 words) , Download 3 , Research Paper
Free
The civil rights movements of 1960s made the mexican Americans take what would be rightfully theirs in the United States.... the mexican American population changed from the rural to urban mode of life.... By 1990s, more than 80 percent of the mexican immigrants lived near or in cities.... In those years after the Civil War in America, the mexican immigrants began looking for jobs.... By the last part of World War 1, the mexican immigrants worked in California in the Central Valley on the large farms....
Preview sample
So mexicans are taking jobs from americans
2 pages (500 words) , Download 0 , Annotated Bibliography
Free
the mexican American Experience: An Encyclopedia.... After the mexican-American war in 1855, Mexicans were allowed to settle in the US state of Texas, after which they started moving to other parts of United States.... the mexican American Experience: An Encyclopedia.... As opposed to being accused of taking away jobs, Chomsky argues that mexican Americans Annotated Bibliography: So Mexicans are Taking Jobs from Americans Chomsky, Aviva....
Preview sample
Network Security - Information Assurance
12 pages (3208 words) , Download 1 , Coursework
Free
The paper "Network security - Information Assurance" highlights that in general, the explosive growth of Information Technology and the amalgamation of IT with telecommunication have brought together the world much closer than any time before in history.... Network security – Information Assurance Institute Network security – Information Assurance Introduction The growth of information systems and associated systems has been unprecedented in the last decade of the 20th century and the first decade of the new millennium....
Preview sample
Effectiveness of Security Technology in Reducing Security Threats
10 pages (2500 words) , Download 3 , Research Paper
Free
The paper "Effectiveness of security Technology in Reducing security Threats" was undertaken with a view to addressing the fundamental issue of security threats.... security issues have become very fundamental to deal with in the modern day organization particularly propelled.... Chapter two reviews the available literature on security issues.... EFFECTIVENESS OF security TECHNOLOGY IN REDUCING security THREATS ...
Preview sample
Computer Security and the Systems Vulnerabilities
6 pages (1835 words) , Download 5 , Essay
Free
This essay "Computer security and the System's Vulnerabilities" provides an example of how security lapses can occur and expose the system's vulnerabilities.... The essay looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.... ssessment Computer security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources....
Preview sample
14301 - 14350 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us