Show simple item record

dc.contributor.authorAli, Mohamed M.
dc.date.accessioned2011-06-01T21:02:57Z
dc.date.available2011-06-01T21:02:57Z
dc.date.issued2011-05-20
dc.identifier.urihttp://hdl.handle.net/1808/7586
dc.description.abstractThis research paper provides an overview of the XYZ database security and implementing the best security measures to maximize performance and Web security for telecommuters. This research paper further discusses telecommuting security, strategies of implementing security, various types of technologies utilized, basic security products, and benefits for telecommuters and businesses. It also provides information on Web security which will entail techniques of proper encryption, firewalls, and how these security measures will enhance the overall performance of XYZ’s database. This research paper will further describe how the above security measures will ensure better security of data stored in the database server, improve the overall database design, and explore the different types of technologies available such as Virtual Private Networking (VPN), authentication methods, and firewalls. In addition, this research paper will list costs associated with the appropriate security implementation in order to provide a secure environment between the telecommuter and the workplace.
dc.language.isoen_US
dc.titleImplementing an Improved Security for XYZ's Database and Telecommuters
dc.typeProject
kusw.oastatusna
kusw.oapolicyThis item does not meet KU Open Access policy criteria.
dc.rights.accessrightsopenAccess


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record