17 February, 2022
Computer science
-
Applying a machine learning algorithm
-
Privacy Laws and Protection of Personal Information
17 February, 2022
-
The benefits and the roles containers can play in a Windows environment.
17 February, 2022
-
Using virtualization or cloud computing in your professional job
17 February, 2022
-
Providing disk redundancy and resiliency.
17 February, 2022
-
Crowd Funding
17 February, 2022
-
The concept of false discovery in data.
14 February, 2022
-
Database systems
14 February, 2022
-
Why Security as a Service is a good investment.
13 February, 2022
-
Cloud computing
13 February, 2022
-
SQL Database Normalization Essay
09 February, 2022
-
Relational database management system (RDBMS)
08 February, 2022
-
The importance of data types when designing a relational database.
08 February, 2022
-
Computer security
08 February, 2022
-
Using Apps to Record Police Activity
08 February, 2022
-
Conversation techniques
05 February, 2022
-
Visible and invisible physical security controls.
01 February, 2022
-
OOP and Computational Thinking.
01 February, 2022
-
OOP and Computational Thinking.
31 January, 2022
-
OOP and Computational Thinking.
31 January, 2022
-
Data and classifying data
30 January, 2022
-
Data visualization
30 January, 2022
-
Enabling Kubernetes and maintaining server hardening.
29 January, 2022
-
Spreading activation
23 January, 2022
-
Open access portals
16 January, 2022
-
The Utility of Cloud Computing
15 January, 2022
-
Computer Incident Response Team (CIRT) Plan
15 January, 2022
-
Performing a network security assessment for a large firm
15 January, 2022
-
WAN Technologies
13 January, 2022
-
Common Hacking Techniques You Should Know About
10 January, 2022
-
" Virtual vs Traditional Teams "
10 January, 2022
-
Information security
10 January, 2022
-
Research on virtualization
05 January, 2022
-
Cybersecurity
04 January, 2022
-
Traditional methods of data collection in the transit system
03 January, 2022
-
Operating systems used to run networks.
03 January, 2022
-
The rising importance of big-data computing stems
30 December, 2021
-
National Religion Databases
30 December, 2021
-
Collecting information and data to save in company records
30 December, 2021
-
Collecting and analyzing a set of data.
27 December, 2021
-
The concept of big data and managing information
23 December, 2021
-
Showcasing what you learnt in programming
19 December, 2021
-
Providing computer security
18 December, 2021
-
The roles of APNs employed by health care organizations
16 December, 2021
-
Boxplots for data visualization
16 December, 2021
-
Testing blockchain applications.
16 December, 2021
-
Computer System
16 December, 2021
-
Explain Linux Operating system
16 December, 2021
-
Cloud computing, 'data centers' and 'as-a-service'.
15 December, 2021
-
A biometric security device
14 December, 2021
-
An article that describes a successful Web service(s) software
14 December, 2021
-
The role of the database and data administrator
14 December, 2021
-
Firewall management.
13 December, 2021
-
"Booting Linux"
13 December, 2021
-
Various data communication technologies
13 December, 2021
-
Object-Oriented Application
13 December, 2021
-
Community risk reduction strategies
13 December, 2021
-
An ethical policy that protects privacy while ensuring security
11 December, 2021
-
Cryptography
09 December, 2021
-
Computer database in criminal investigations.
08 December, 2021
-
The “costs” of cyber security both intrusions and prevention.
08 December, 2021
-
The Open Web Application Security Project (OWASP)
06 December, 2021
-
Anomalous objects
06 December, 2021
-
Data breaches from 2020-2021.
04 December, 2021
-
Data and classifying data
04 December, 2021
-
Software Weaknesses
01 December, 2021
-
Roles of security analysts in preventing Web serve
01 December, 2021
-
Developing a secure implementation plan
01 December, 2021
-
Functions and caps of Microsoft tools
01 December, 2021
-
A Computer/Internet Security Policy
01 December, 2021
-
Compliance audit
01 December, 2021
-
The chi-square test and ANOVA
01 December, 2021
-
"Properties of Data
29 November, 2021
-
Network Attacks
25 November, 2021
-
Elements of a computer forensic examination
25 November, 2021
-
Asymmetric and symmetric encryption.
24 November, 2021
-
Cloud Computing technologies
23 November, 2021
-
The System Design Document (SDD)
23 November, 2021
-
Global Approaches to Cyber security
23 November, 2021
-
Accountability for adherence to security policies
23 November, 2021
-
Cloud-based implementation strategies.
23 November, 2021
-
Data Science & Big Data Analytics
23 November, 2021
-
APT
23 November, 2021
-
Using the Machine learning process to mitigate fraudulent transactions
21 November, 2021
-
Benchmarks
20 November, 2021
-
How cookies can show that a user has visited a site
20 November, 2021
-
Analyzing & Visualizing Data
20 November, 2021
-
A highly technical society.
20 November, 2021
-
Genetic or genomic technology.
20 November, 2021
-
Derivative Security
19 November, 2021
-
The right to privacy
18 November, 2021
-
Countermeasures to mitigate residual risk
18 November, 2021
-
Computer & Network Security
16 November, 2021
-
VA(Vulnerability Assessment) and PT(Penetration Testing)
16 November, 2021
-
An artificial neural network
16 November, 2021
-
Information security policies used at your academic institution
16 November, 2021
-
Broadcom's Integrated Database Management System (CA-IDMS) AND MongoDB
16 November, 2021