Consult more than 15026 documents with no limitation. Our subscription options

Theme : Security

Our documents

Filtrer par :

10 Dec 2023

Proposal to Sell a Security Service

Case study - 1 pages - Economy general

We have an important client pitch coming up about our post trade services. Our platform sales group are responsible for pitching global custody, fund services, securities lending, collateral management, OTC clearing, liquidity solutions, and data analytics. These transactions are typically...

08 Jun 2022

How has the Belt and Road Initiative played a part in China's cross-regional political and security relations?

Essay - 3 pages - International relations

The announcement of the Belt and Road Initiative in 2013 was meant to signal China's interest in building stronger global economic links, but it has been argued that the BRI also serves to improve Beijing's cross-regional diplomacy in other ways, including strengthening the country's...

08 Oct 2015
doc

Information security system management for Swift Courier Company

Essay - 40 pages - Management

This paper focuses on the information security management of Swift Courier. Swift Courier is a relatively small company deals in courier services involving the delivery of various goods and services. The company is based in Abu Dhabi and has clients across the United Arab Emirates (UAE)....

16 Feb 2015
doc

Fire and Security Monitoring System - Process Architectural Design

Case study - 6 pages - Criminal law

The fire and security monitoring system is meant to manage, and to monitor the fire security alarms in a building. In order to best understand how this system works, it is only prudent to define its design both in terms of the software and the hardware components that it is made up...

27 Feb 2015
doc

Security and Risk Management - IT Database security

Case study - 2 pages - Educational studies

The IT infrastructure of the organization makes it susceptible to external intrusions. For example, there are more than 1000 access points with no security awareness programs and no deployed security software programs or reporting to protect the access points. In addition, there is...

29 Jul 2015
doc

The impact of history and gothic art on peace and security

Case study - 5 pages - Arts and art history

This paper entails a collection of 10 pieces of art from Prehistory style to the Gothic style. Each of the ten pieces of art selected portrays the theme of peace and security in terms of managing conflict and violence in a turbulent world. Peace and security are critical...

08 Oct 2015
doc

History of private security : the path to professionalism in the security industry

Essay - 3 pages - Economy general

In the United States, private security started as far back as in the mid-19th century. During that time, private security personnel could only be used to fill in the gaps created by the public police forces within major cities which were just forming. Private security...

25 Mar 2015
doc

Information Security Program - Security Risk Assessment and Audit

Case study - 12 pages - Educational studies

An information security program is one of the fundamental aspects of security management that must be properly implemented to ensure that information within the computer systems are appropriately protected (Krause & Tipton, 2007). Threats to information systems include unauthorized...

16 Apr 2014
doc

A study on security analysis for selecting appropriate security

Case study - 79 pages - Management

An investment refers to the commitment of funds at present, in anticipation of some positive rate of return in future. Today the spectrum of investment is indeed wide. An investor is confronted with array of investment avenues. Among all investment, investment in equity is best high proportion....

30 Apr 2014
doc

Operation "Althea" in Bosnia and Herzegovine: the European security and Defence policy (ESDP) coming of age?

Essay - 14 pages - International relations

The European Union (EU) is a newcomer in the business of peace support operations. Of course, its members have long been involved in almost any sort of non-Article 5 (NATO/WEU) mission in the past, and they still are today. But they have usually done so under other flags than the EU one. Even if...

03 Sep 2014
doc

Changes Needed in Wireless Security Measures

Case study - 3 pages - Educational studies

In the recent years home wireless threats have become extremely common. In this study we are going to review the risks and types of attacks users should be aware, when using home wireless networks. We are going to determine which type of network is more secure, and how can users protect...

24 Nov 2014
doc

The impact of National Security to a Nation

Case study - 3 pages - Educational studies

National security is an extremely sensitive issue for any government. There have been various acts of crime that have led to loss of lives as well as property. However, the government has various doctrines initiated with the intent of helping to solve various crime problems. Crime...

27 Jul 2014
doc

Likely evolution of the Security and Economic Dynamics in Central Asia

Case study - 3 pages - Educational studies

Central Asia is a region bordering China to the West, Russia to the north and finally Turkey to the South. Historically, this area has lacked strong political representation and has thus relied on powerful neighbors for all aspects of her development. This paper examines the changing dynamics in...

06 Sep 2013
doc

The security plan: Private Doctor's office

Case study - 3 pages - Educational studies

The target area is of a private physician's practice. The location for the practice is a known urban part of town. The location of the practice has both benefits and downfalls. Since the practice is located in a very busy and highly populated section of town, the practice is well known and has...

06 Dec 2013
doc

Security information on the internet

Case study - 3 pages - Business strategy

If you decide to use the Internet either as a consumer, business, for information or just surfing the web for entertainment purposes you have to decide whether you want to use or visit websites that use an open or secure environment while on the Internet. In today's “digitally connected...

18 Apr 2013
doc

Choosing careers in health care for job security

Case study - 2 pages - Educational studies

Despite slow recovery of economy battered by recession followed by credit crunch, overall poor economic growth and unstable stock markets, job prospects in health care is bright in the USA, UK and many other countries. In fact, health care is a very demanding sector where career growth is...

18 Jul 2013
doc

Security vulnerabilities of cloud computing

Case study - 2 pages - Management

Data, for any company, is most important than anything. Companies will take a lot of security measures to ensure the data security and unwanted hacks. This is the major reason companies, which are into data sensitive fields; take a back seat when talking about the cloud computing...

18 Jul 2013
doc

Security issues with cloud computing

Case study - 3 pages - Management

As most of the cloud computing services depend on the internet, the availability of the service is incessant. The only thing a user needs to worry about is the security of the data, which is stored on the cloud network, which is popularly known as shared network. Most of the services...

03 Feb 2011
doc

The High Representative of the Union for Foreign Affairs and Security Policy

Worksheets - 3 pages - European law

It is only with the European Council acting by qualified majority and the concurrence of the President of the European Commission that the High Representative is appointed. Art 18 TEU states that the High Representative shall implement the common foreign and security policy of the Union....

30 Jun 2011
doc

Exploring the Genesis of the Department of Homeland Security: What Exactly Lies Within the Office of the Director of National Intelligence?

Thesis - 5 pages - Social, moral & civic education

This report will investigate the root causes for the creation of the Department of Homeland Security (DHS). To help explain the genesis of its inception, history of the Bush administration's preoccupation with securing the nation from terrorist threats or attacks will be discussed....

03 Feb 2011
doc

Social Security in Algeria

Course material - 9 pages - Social, moral & civic education

On the eve of colonization of Algeria by France, the concepts of public health and social security barely existed. The colonial regime of the time introduced Social Security in Algeria to organize the medical benefits of military settlers and for the Algerian Workers' Algerians...

25 Mar 2010
doc

David J. Francis, Uniting Africa: Building regional peace and security systems

Book review - 3 pages - Literature

“Africa today is faced with a stark choice, either unite or perish. ” So opens David J. Francis' intriguing study on the state of African nations in relation to one another. Frances spends a great deal of attention outlining the serious social and economic problems facing the African...

12 Apr 2010
pdf

Formal security evaluation of ad hoc routing protocols

Thesis - 3 pages - Computer science

Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. If the underlying routing protocol cannot be...

29 Sep 2010
doc

UN Security Council Resolution 1559 and US multilateralism

Essay - 6 pages - Political science

The United Nations Security Council Resolution of 1559 was adopted by the Security Council on September 2, 2004 by a vote of 9 in favor (Angola, Benin, Chile, France, Germany, Romania, Spain, United Kingdom, United States), to none against, with 6 abstentions (Algeria, Brazil,...

29 Sep 2010
doc

Differences and similarities among the contemporary security policies in Nordic countries

Essay - 9 pages - Political science

“Since 1720, all the Nordic countries have remained minor powers on the international stage. As such, the Nordic states have had to adapt to the constraints that are usually beyond their control.” This statement could summarize the geopolitical situation which has shaped the...

29 Sep 2010
doc

Security and emancipation

Essay - 4 pages - Political science

The 20th century has witnessed many struggles for emancipation, and a strong emphasis put on security agenda in many countries. Regarding emancipation, many examples come to our mind like the decolonization era, after World War II, the feminist struggles for equality between genders all...

29 Apr 2010
pdf

Analysis of FOSS: An open standard for network security and monitoring

Thesis - 5 pages - Computer science

The aim of the project is to provide a cost effective, secure and easy working environment over a network. This FOSS is very much helpful for educational institutes, non profit organizations and small industries. The GUI provides options to choose from monitoring, blocking, filtering and...

18 Nov 2010
doc

Is the EU successful in its attempt to create a 'security community' with its neighbors through the elaboration of the European Neighborhood Policy?

Thesis - 6 pages - European union

The aim of this paper is to assess whether or not the EU is efficient in its attempt to build a security community with its neighbors through the implementation of the European Neighborhood Policy (ENP). In order to do so, I will first demonstrate that the EU and its neighbors share, to a...

13 Apr 2010
pdf

Security in image transmission using audio watermarking

Thesis - 3 pages - Computer science

With the recent burgeoning of networked multimedia systems, techniques are needed to prevent illegal copying / forgery in distributed digital audio/ visual/text document. It may be also desirable to determine where and by how much the multimedia file has been changed from the original due to...

31 Mar 2010
pdf

Do online information retrieval systems pose a security threat?

Thesis - 4 pages - Computer science

The search engine's deceptive role of information mining from the crawled web servers has been gravely misunderstood. The general perception of search engine being an information locator is a universal truth. The 24x7 availability of the updated information makes it a potential information search...