|
Essays! ALL of the following essays are available for same
day delivery via your choice of e-mail or fax! Only $/pg
+ FREE bibliography!
Make your selection below!...
|
Papers On Internet & Related Issues
Page 62 of 95
|
|
Outline : GEC Portal Solution Project
[ send me this essay ]
This 20 page paper is an outline of a student-supplied project for developing a GEC Portal for e-government. No bibliography.
Filename: PGgecpr.rtf
OVERVIEW: DENIAL OF SERVICE ATTACKS
[ send me this essay ]
This paper presents an overview of denial of service attacks (DDoS), what they are, what their effects are and how they can be prevented. Bibliography lists 6 sources.
Filename: MTdosatt.rtf
PC Environment Control of Mission Critical Data
[ send me this essay ]
In consideration of the question as to whether the PC environment storage of mission critical data is both a step forward and back, the issues of application development are explored in terms of security, maintenance, management structure, and recommended tools. Bibliography lists 6 sources. jvPCenvi.rtf
Filename: jvPCenvi.rtf
Peapod and the Success of Supermarket Services
[ send me this essay ]
This 3 page paper examines Peapod and other supermarket services. Bibliography lists 4 sources.
Filename: SA906pea.rtf
Peer-to-Peer Applications
[ send me this essay ]
This 6 page report discusses the concept and development of peer-to-peer or P2P applications and what they have meant in terms of file-sharing and distributive computing. Peer-to-peer applications take advantage of the computing resources available on each individual system that connects with a larger network in order to share information and/or processing power. It is what allows for long-distance collaborative work on projects, as well as an increased ability to utilize the combined strength or power of multiple systems when one user ostensibly only has access to one computer. Bibliography lists 4 sources.
Filename: BWp2papp.rtf
Personal Computing in 2004
[ send me this essay ]
This mock magazine offers six RT computer articles on the title and a 6 page editorial on what's included in those articles. Subjects include: Re-evaluating your replacement strategy, Sasser worm, MS revisit of NGSCB security plan, top technologies for 2005, Hitachi 400GB drive, and Linksys, Boingo Boost Hotspots. Bibliography lists 5 sources. jvPCmag.rtf
Filename: jvPCmag.rtf
PHP Language
[ send me this essay ]
An 8 page paper discussing the history, characteristics and benefits of PHP language. Originally called "Personal Home Page," PHP language was developed for use in the open-source environment of Linux and Apache. Its ease of use and compatibility with a wide range of programs, however, have made it one of the fastest-growing languages currently in use. As C, C++, Java and Visual Basic decline in popularity or at least fail to grow, PHP continues to increase in frequency of use. Bibliography lists 9 sources.
Filename: KSitPHP.rtf
Planning an E-Commerce Site
[ send me this essay ]
A 5 page paper that discusses the need for establishing an Internet Web site. Aspects that the manager needs to consider are discussed. Bibliography lists 4 sources.
Filename: PGweb4.wps
Planning the “Smart House”
[ send me this essay ]
A 7 page paper discussing current developments in central and electronic security systems that are also capable of controlling home systems such as heating and lighting. The smart house holds great promise for the future. Paradoxically, however, though most systems center on security, there is very little mention of security measures for the systems themselves. As systems become more wireless than cable based, the matter could become more problematic in the future than it is now. Bibliography lists 8 sources.
Filename: KSitHomeSec.rtf
Political Campaigns and the Internet
[ send me this essay ]
A 5 page paper that reviews the contemporary use of the Internet in the '96 Presidential Campaign and discusses briefly the benefits of future use of the Internet for political information. Bibliography lists 6 sources.
Filename: Polinet.wps
POLITICS AND LEGISLATION IN INFORMATION SECURITY MANAGEMENT
[ send me this essay ]
This 3-page paper examines legislation that has been directed toward information security protection. Bibliography lists 3 sources.
Filename: MTpolinfse.rtf
So what's your essay topic?
|