27 July, 2021
Risk Response Plan
-
Cloud computing
-
Algorithms on social media and how it effects people.
27 July, 2021
-
The role of Unmanned Aerial Vehicles (UAV)
24 July, 2021
-
Data Security
24 July, 2021
-
File organizations
21 July, 2021
-
Alternatives for storing information
21 July, 2021
-
SENSE4US
19 July, 2021
-
Machine, Deep and Algorithm Learning
19 July, 2021
-
Managing personnel and information system
19 July, 2021
-
Formulating Your Brief
19 July, 2021
-
Improving Data Governance
18 July, 2021
-
Data visualization - Computer science - R programing
18 July, 2021
-
Remedies available to IP owners
18 July, 2021
-
Data management analytics and business intelligence
16 July, 2021
-
Cyberattack
15 July, 2021
-
A Port Scanning Tool
15 July, 2021
-
Designing a plan for outcome evaluation
14 July, 2021
-
Filter bubble
14 July, 2021
-
Big Data Analytics
14 July, 2021
-
Decision Making Using Systems Modelling
14 July, 2021
-
Benefits of virtualization software
13 July, 2021
-
Encrypted data
13 July, 2021
-
Threat agent
12 July, 2021
-
Variation in practice
12 July, 2021
-
Video analysis
10 July, 2021
-
Virtual private networks
10 July, 2021
-
Current and emerging technologies
09 July, 2021
-
Blockchain
08 July, 2021
-
Discussing IAM in a federated cloud application
06 July, 2021
-
Discussion about cyber security
05 July, 2021
-
Cryptography or encryption
05 July, 2021
-
Improving data governance critical thinking
05 July, 2021
-
Blockchain and cryptocurrency Bitcoin.
05 July, 2021
-
Information governance
01 July, 2021
-
Data collection tools and procedures
30 June, 2021
-
Data visualization techniques
30 June, 2021
-
Computer technology scenario
29 June, 2021
-
SMS Language.
25 June, 2021
-
Threat modeling
25 June, 2021
-
Information systems infrastructure
25 June, 2021
-
Internet systems developments software technologies
25 June, 2021
-
Protection of patient data
23 June, 2021
-
Data science and big data analysis
23 June, 2021
-
Article by Patterson about blockchain
22 June, 2021
-
Bernard Marr's talk on big data
22 June, 2021
-
Cybersecurity problems
21 June, 2021
-
Articulating a Relational Database Design
19 June, 2021
-
Working in a Virtual Team
18 June, 2021
-
Server virtualization and cloud computing
18 June, 2021
-
Telecommunications and network security
18 June, 2021
-
Cryptography attack
16 June, 2021
-
Intrusion detection tools
15 June, 2021
-
Threat modeling
15 June, 2021
-
Digital Natives, Yet Strangers to the Web
15 June, 2021
-
Services that are offered on the cloud.
14 June, 2021
-
Sustainability in supply chain in terms of Inventory
12 June, 2021
-
Storing information in a data entry of an index.
11 June, 2021
-
Virtual concet report
11 June, 2021
-
Files
11 June, 2021
-
Algorithm
08 June, 2021
-
Cyber espionage
07 June, 2021
-
Bid data and internet of things
03 June, 2021
-
Relationship between Naïve Bayes and Bayesian networks
02 June, 2021
-
Java question
02 June, 2021
-
Network threats
02 June, 2021
-
Electronic Obsession
30 May, 2021
-
Cybersecurity
30 May, 2021
-
Visualization
25 May, 2021
-
Data Analytics
25 May, 2021
-
Optimization
23 May, 2021
-
Blockchain
21 May, 2021
-
Gene technology
21 May, 2021
-
Solar PV and battery optimisation
20 May, 2021
-
C++, polymorphism, file i/o, inheritance
19 May, 2021
-
Data mining.
15 May, 2021
-
The importance of data in analytics
15 May, 2021
-
Software Engineering
14 May, 2021
-
Designing a secured computer system.
11 May, 2021
-
Firewalls
10 May, 2021
-
IT Security Policy Implementations
10 May, 2021
-
Remote targeting phase
10 May, 2021
-
Cyber security question
08 May, 2021
-
3-F Method
06 May, 2021
-
Process Optimisation and Control
05 May, 2021
-
Operating Systems
04 May, 2021
-
VIRTUALIZATION
04 May, 2021
-
The Cloud
04 May, 2021
-
The virus explorer application
01 May, 2021
-
NFA star construction
29 April, 2021
-
NFA concatentation construction
29 April, 2021
-
DFA majority
29 April, 2021
-
NFA union construction
29 April, 2021