Sample Essay on:
Information Technology Security, Web Services and Database Management Systems

Here is the synopsis of our sample research paper on Information Technology Security, Web Services and Database Management Systems. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 14 page paper is written in three parts. Each part of the paper looks at a different type of technology, outlining the purpose and the motivation for it's' existence, how it functions, how it is used by organizations, the market and the way it may evolve in the future. The technologies discussed include information technology security, focusing on cryptography, web services and database management systems. The bibliography cites 15 sources.

Page Count:

14 pages (~225 words per page)

File: TS14_TEscwebsdbm.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

developed in order to increase security. One of these is cryptography. Cryptography can be defined as "The science of coding and decoding messages so as to keep these messages secure" by the American Heritage Dictionary (dictionary.com, 2008). As information technology has become more important in both social and commercial lives issues of security has risen to prominence. The ability to keep information secure, protecting it from unauthorized parties has increased the level of attention paid to cryptography. Data is important; there are many reasons why an individual or a company may want to ensure that only those who are authorized will gain access to data. These may be for commercial reasons, for example protecting proprietary information as well as the legal requirements to protect personal information of customers under relevant legislation (Hart and Fazzani, 2001). The development of cryptography in an information technology environment is motivated by both self protection drivers as well as push factors including legal obligations. For private individuals there may be sensitive data and motivations are to protect privacy for sensitive information. 1.2 How the Technology Functions In cryptography used in information technology cryptography is based on the use of mathematical formulas and algorithms. With many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. One most common form of cryptography that is found today is that of public key cryptography (PKC) (Cormen, 2001). This is also nine as asymmetric cryptography as it takes a form which make use of two keys forming a pair. Of the two keys one is a private and one of the public key. The public key may be distributed widely, where as the private key is known only to the individual party. Each of these keys has a mathematical ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now