Back to category: Technology Limited version - please login or register to view the entire paper. Impact of technology in the work place SECTION A III METHODOLOGY III INDEX BASED (DIRECTORIES) III HIGHLIGHTS OF ALTAVISTA. III META SEARCH SITES III SECTION B IV FIREWALLS. IV WHAT IS A FIREWALL? IV WHAT IS ENCRYPTION? IV HOW IT WORKS. IV HOW IS IT OVERCOME? IV FILTERING SOFTWARE V WHAT IS FILTERING SOFTWARE? V HOW IT WORKS V KEYWORD BLOCKING V SITE BLOCKING V WEB RATING SYSTEMS V SOME EXAMPLES OF FILTERING SOFTWARE: V COMPUTE VIRUSES VI WHAT IS A COMPUTER VIRUS? VI DIFFERENT TYPES OF VIRUSES VI HOW DO YOU RECOGNISE A HOAX? VII WHAT IS DIGITAL SIGNATURE? VIII HOW DIGITAL SIGNATURES ARE CREATED VIII STEP 1 THE HASH VIII STEP 2 ENCRYPTION VIII STEP 3 CERTIFICATION IX HOW IT WORKS IX A DIGITAL SIGNATURE MIGHT LOOK LIKE THIS. X CAN THEY BE INTERFERED WITH? X SECTION C XI TERMS OF REFERENCE XI FINDINGS. XI 1) HOW INFECTION OCCURS XI 2) PARASITE V... Posted by: William Katz Limited version - please login or register to view the entire paper. |
|
© 2006 TermPaperAccess.com |