forsoplus.com Today's Opening Times 10:00 - 20:00 (BST)

Information Technology Dissertation Examples

Search to find a specific information technology dissertation or browse from the list below:

Java and Bluetooth Technologies

CHAPTER - I INTRODUCTION 1.1 Project Background Wireless technologies are becoming more and more popular around the world. Consumers appreciate the wireless lifestyle, relieving them of the well...

Mobile Ad Hoc Network Intrusion Detection System (IDS)

Chapter 1 1. Introduction Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are relatively new communication paradigms. MANETs do not require expensive base stations or...

High Performance Wireless Telecommunications Modulation

Introduction The primary goal of the project is to analyze of OFDM system and to assess the suitability of OFDM as a modulation technique...

Security Incident Handling Service

EXECUTIVE SUMMARY 1 INTRODUCTION Expect the unexpected. As soon as a crisis erupts, it should be immediately handled to reduce its potential impact on critical...

Development of Fantasy Football Website

Chapter 1. Introduction Project Overview Last year a project was completed for Mr. Starkey (hereinafter referred to as "Client") to design a family website. The website was...

Web Based Technology and Continuing Medical Education

This dissertation explores the use of Web based technology to enhance and maintain procedural skills in the context of continuing medical...

Web 2.0 Advantages and Disadvantages

Abstract: Web 2.0 can be described as different types of web applications which allow people to publish knowledge that they have created and also...

Secure Corporate Network Infrastructure Development

Pop Quiz! VPN stands for… A.1 VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a private network in the sense that it carries...

End to End VoIP Security

Introduction User communications applications are in high demand in the Internet user community. Two classes of such applications are of great importance and attract interest by...

Voice over Internet Protocol (VoIP) Technology

ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephony's system will affect the sending voice...

Virtual Reality Applications and Universal Accessibility

1. Abstract The conception of Virtual Reality, a divinatory three-dimensional, computer-generated environs that allows a individual or multiple users to interact, pilot, react, and feel a...

Underwater Acoustic Sensor Network (UASN)

CHAPTER1: Introduction Most of the earth surface is composed of water including fresh water from river, lakes etc and salt water from the sea....

Biometric Applications for Information Security

Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways,...

Analysis of the Internet of Things

The "Internet of things" is a term coined by Massachutes Institute of technology (MIT).The term describes a vision of the internet in the...

Development of Intrusion Detection System Software

INTRODUCTION Heavy reliance on the Internet and worldwide connectivity has greatly increased that can be imposed by attacks plunged over the Internet against systems. It is...

Succession Planning for SMEs in IT Industry

Purpose This thesis is based on an investigation into succession planning in small to medium-size organisations within the Information Technology (IT) industry. The main area of research...

Impact of Spyware on Computers and Mobile Devices

1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which...

Impact of Information Architecture

In recent years, as the technology is changing to our society, people are more relying on Internet to find out the solutions for their everyday...

User Perceptions of Web 2.0

Abstract With the advent of the internet and the evolution of e-business, the widely held perception is that we operate in a know ledged-based economy. Many...

The Emergence of IT Governance in Greece

Introduction The emergence of IT Governance The cases of Enron, Worldcom and other corporate and financial scandals in the early years of the century have raised the...

Internet Threats and Security for Protection

Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security...

Factors Influencing the Technical Defensive Measures on Spyw

1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is “Study on the Factors Influencing the Technical Defensive Measures on...

Metrics and Models in Software Testing

How do we measure the progress of testing? When do we release the software? Why do we devote more time and resources for testing a...

Causes of Software Project Failure

All successful software projects start with the premise that the end result will be successful. The owner of the project initial goal is to deliver...

Sniffing Attacks Prevention and Detection Techniques

Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN) ABSTRACT During the past era, Information Technology made a revolution...

Importance of Smartphone Security in Business Environment

1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I...

Smart Medical Diagnosis for Common Diseases

1. Introduction 1.1. Present Scenario Internet is the latest and the most powerful innovation of mankind. In present era of internet we used computer technology...

Six Sigma Lean Production Systems

Nowadays, the development of industrial core intrinsic technologies is more and more important due to the dynamic competition in the global...

Development of Peer-to-Peer Network System

Procedures which we are followed to success this project. Task 01 - Familiarizing with the equipments & preparing an action plan. Task 02 - Prepare the work...

Review of IT Project Management Practices in the UAE

A Study on the UAE IT Industry ABSTRACT "I keep six honest serving men, (They taught me all I know); Their names are What and Why and When...

E-Commerce Analysis: Online Ticket Purchasing

CHAPTER ONE: INTRODUCTION 1.1 INTRODUCTION This chapter presents the background of the research study. It starts by providing an overview of Electronic Commerce, customer satisfaction and service...

Feasibility of Online Shopping in UK Primark

Abstract The purpose of this research is to study the online shopping in UK clothing retail market, and how it will be helpful to the researcher...

Development of Online Auction Market

Abstract The world of online auction is a very competitive world, its also almost monopoly where companies such as e-bay take the biggest market share. Because...

OLAP Multidimensional Database Concept

CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION This chapter is designed to provide background information and reviewing the characteristics of data warehouse, OLAP multidimensional database Concept, data mining model...

Implementation of New Computer Network

Here we are going to implement an new computer network for this company that 25 employees have been working in. Suppose you want to build a...

Get help with your dissertation
Find out more
Build Time: 0.0087 Seconds