Client/Server Architecture

Client/Server computing is currently one of the buzzwords in the computer industry. The client/server environment can be defined as an open systems environment. This openness of the client/server environment makes it a very popular environment to operate in. As information is exceedingly accessed in a client/server manner certain security issues arise.

 

In order to address this definite need for a secure client/server environment it is necessary to firstly define the client/server environment. This is accomplished through defining three possible ways to partition programs within the client/server environment.

 

Security or secure systems have a different meaning for different people. This thesis defines six attributes of information that should be maintained in order to have secure information. For certain environments some of these attributes may be unnecessary or of lesser importance.

 

Different security techniques and measures are discussed and classified in terms of the client/server partitions and the security attributes that are maintained by them. This is presented in the form of a matrix and provides an easy reference to decide on security measures in the client/server environment in order to protect a specific aspect of the information.

 

The importance of a security policy and more specifically the influence of the client/server environment on such a policy are discussed and it is demonstrated that the framework can assist in drawing up a security policy for a client/server environment.

 

This thesis furthermore defines an electronic document management system as a case study. It is shown that the client/server environment is a suitable environment for such a system. The security needs and problems are identified and classified in terms of the security attributes. Solutions to the problems are discussed in order to provide a reasonably secure electronic document management system environment.

Virtual Private Networks

The aim of this Applied Knowledge Paper is to give a deep insight on the basics, components and benefits of Virtual Private Networks.  A detailed understanding has been given for the business benefits of a VPN.

 

The document starts by giving an introduction to a VPN, followed by its components and implementation.

 

Further the types of VPN have been discussed. Basic VPN requirements have been talked about next. Followed by data security issues in a VPN and the ways of settings up a VPN have been elucidated.

 

Finally, the document wraps up the paper by evaluating the pros and cons and alternatives of a VPN. The author of the paper hopes that this discussion will serve as a comprehensive guideline for the readers.

Multimedia Systems & Authoring

The aim of this Applied Knowledge Paper is to give a deep insight on the basics, components and applications of multimedia systems and authoring.  A detailed overview has been given for the multimedia systems; their history and the components that make it.

 

The document starts by giving a history of multimedia systems followed by the characteristics, challenges and components.

 

Further the multimedia authoring has been talked about. Types of tools present in market today have been reviewed upon Next its applications and trends have been highlighted.

 

Finally, the document wraps up the paper by evaluating the benefits of multimedia systems. The author of the paper hopes that this discussion will serve as a comprehensive guideline for the readers.

SORTING ALGORITHMS

This paper is a collection of algorithms for sorting. The descriptions given are brief and intuitive, with just enough theory thrown in to elucidate the sorting concepts. I assume one knows a high-level language, such as C++, and that are familiar with programming concepts including arrays and pointers.

 

The first section gives an introduction to algorithms and various basic concepts associated to it. The next section presents most commonly used sorting algorithms. Source code, examples and analysis for each algorithm, in MS Visual C++, is included.

 

The last section critically evaluates the sorting algorithms, throws light on the importance and application of sorting algorithms and concludes on a note explaining the need for understanding the algorithms.

HASHING

The aim of this Applied Knowledge Paper is to give a deep insight on the need, concepts and benefits of Object Oriented Programming followed by its application using C++.  The concepts and approaches of OOP have been discussed and reviewed upon in detail.

The document starts by giving a comparison and analysis on different programming techniques followed by the need for Object Oriented Programming. The earlier approaches have been illustrated using figures and there weak points have been chalked out too. And the reasons which lead to the need for OOP have been aimed.

Further the origin and history of C++ has been talked about. How it evolved over several decades and its current standing. Next its benefits have been highlighted. It’s also been compared with the other two most popular OOP languages.

Next to this, the OOP features supported by C++ have been discussed using detailed examples and with source codes written in C++. The concepts have been embellished and elucidated using figures and tables as well.

Finally, the document wraps up the paper by critically evaluating merits and demerits of programming using the OO approach. The author of the paper hopes that this discussion will serve as a comprehensive guideline for the readers.

Cryptography

The aim of this Applied Knowledge Paper is to give a deep insight on cryptography.  A detailed understanding has been given for cryptographic primitives and protocols.

 

The document starts by giving an introduction to cryptography, followed by its services and protocols.

 

Further the XML and JAVA cryptography. Followed by the projected problem and potential benefits. Next, cryptography has been reviewed in the real world.

 

Finally, the document wraps up the paper by evaluating the pros and cons and future of cryptography. The author of the paper hopes that this discussion will serve as a comprehensive guideline for the readers.

Concurrency Control Performance Modelling

The aim of this Applied Knowledge Paper is to give a deep insight on the basics, components and benefits of Virtual Private Networks.  A detailed understanding has been given for the business benefits of a VPN.

 

The document starts by giving an introduction to a VPN, followed by its components and implementation.

 

Further the types of VPN have been discussed. Basic VPN requirements have been talked about next. Followed by data security issues in a VPN and the ways of settings up a VPN have been elucidated.

 

Finally, the document wraps up the paper by evaluating the pros and cons and alternatives of a VPN. The author of the paper hopes that this discussion will serve as a comprehensive guideline for the readers.

OBJECT ORIENTED PROGRAMMING & C++

The aim of this Applied Knowledge Paper is to give a deep insight on the need, concepts and benefits of Object Oriented Programming followed by its application using C++.  The concepts and approaches of OOP have been discussed and reviewed upon in detail.

 

The document starts by giving a comparison and analysis on different programming techniques followed by the need for Object Oriented Programming. The earlier approaches have been illustrated using figures and there weak points have been chalked out too. And the reasons which lead to the need for OOP have been aimed.

 

Further the origin and history of C++ has been talked about. How it evolved over several decades and its current standing. Next its benefits have been highlighted. It’s also been compared with the other two most popular OOP languages.

 

Next to this, the OOP features supported by C++ have been discussed using detailed examples and with source codes written in C++. The concepts have been embellished and elucidated using figures and tables as well.

 

Finally, the document wraps up the paper by critically evaluating merits and demerits of programming using the OO approach. The author of the paper hopes that this discussion will serve as a comprehensive guideline for the readers.