The completion of this study has inevitably involved various kinds of inputs from different people to whom Iam indebted.
I have received extensive support both materially and morally from substantial number of people directly and indirectly.
The only best way to thank and advance my regards to them would have been mentioning them one after another, but on a given space list has remain incomplete; I would like to extend my special regards to the ministry of financemy sponsor for granting sponsorship for my studies and reseach,The management of post cooperation(personal admistrative officer) Mbeya which gave me the opportunity to carry out field attachment for a period of at least four months in the Management Information System Department.
Also wish to express my sincere gratitude to my supervisor Mr.Titus, Tossy of IAA who assisted me in all necessary guidance and advice whenever I needed.
I gave thanks to Mr.Sendama(The post coperation Zonal Manager Mbeya branch),Miss. Grace(Senior System Administrator and Programmer)
Special gratitude also goes to my mother and my father Regina sampeta,and Mr. Yesaya Mwaipopo respectively, through their help I succeeded to produce this report.also thanks to my best friend Dolika kasiba who give me asupport in encouraging me in writing this report not only that but thanks to Obadia,Yonah,said,Obedi,Hussen.Richard.Seleman who give me assist staying at their home during preparation of this report
Lastly I would like to thank those respondents who provided me with necessary information and data needed for this report.
DECLARATION
Iam Mwaipopo, Lawi hereby declare that to the best of my knowledge, this report is my own work and has not been submitted for the award of Advance Diploma or Bachelor Degree in any other higher learning Institution for academic award.
Student name: Mwaipopo, Lawi.
Date……………….Day………2008.
Signed………………………………
Supervisor name: TiTus, Tossy.
Date………………..Day………2008.
Bibliography: a) Curtin, M (1997) Introduction to Network Security [online] Available: www.interhack.net/pubs/network-security b) Douglas, I.J and P.J. Olson (1986). Audit and Control of Computer Networks. Manchester: NCC Publications (p.21) c) Doyle, S (2000). Understanding Information and Communication Technology. Cheltenham: Stanley Thornes (Publishers) Ltd. d) Home Network Security [online] Available: www.cert.org/tech_tips/ home_network.html e) Jones, R.E and Robbi J.L (1986). Discovering Technology, Communication. USA: Harcourt Brace Jovanovich, Inc. f) Pulschen, D.M.; Szymanski D.P., & Szymanski R.A (1991). Computers and Information Systems: with hands-on software tutorials. Upper Saddle River: Prentice-Hall, Inc. g) Supplement on Information and Communication Technology [online] Available: www.nam-csstc.org/spain/manuals_e-readiness/ supplement /S_Chapter1.htm#ComputerHistory h) Thompson, B (2002, October 6). Why the poor need technology. BBC News World Edition e) http://www.psc.edu/networking/projects/tcptune/ 14/9/2005 f) http://www.ncne.org/jumbogram/mtu_discovery.php 14/9/2005