"Infrastructure" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 34 of 50 - About 500 Essays
  • Good Essays

    Viet Nam logistics infrastructure still lagging |[pic] | Experts have said that logistics will be a key element to enhance Viet Nam’s competitiveness‚ as the country is expected to become a hub for both logistics and port operation. However‚ there are some concerns about the development of this sector. Thanet Sorat‚ vice-president of V-Serve Group‚ a leading Thai logistics service provider‚ spoke with Viet Nam News reporter Ha Phuong about the Thai logistics system and commented

    Premium Vietnam Cambodia Logistics

    • 675 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    USING PROJECT FINANCE TO FUND INFRASTRUCTURE INVESTMENTS   Throughout most of the history of the industrialized world‚ much of the funding for large-scale public works such as the building of roads and canals has come from private sources of capital. It was only toward the end of the 19th century that public financing of large “infrastructure” projects began to dominate private finance‚ and this trend continued throughout most of the 20th century.   Since the early 1980s‚ however‚ private-sector

    Premium Finance Debt Project management

    • 7798 Words
    • 32 Pages
    Powerful Essays
  • Best Essays

    Joe Burgess Mr. Jason Kirker Eng.120H 10 December 20121 Hidden Issues: The Healthcare Infrastructure of Post-Katrina New Orleans When Hurricane Katrina struck the city of New Orleans in August of 2005‚ the physical damage that the storm caused was easily seen. Mass flooding led to the destruction of many homes and famous landmarks. In an attempt to get out of the way of the storm’s path‚ many citizens fled the city in the days before the storm. Some‚ though‚ for various reasons‚ did not

    Premium New Orleans Health care Hurricane Katrina

    • 3599 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    The Importance of the Agricultural and Infrastructure Sectors in the Argentinean Economy Case studies involving the PMP (policy making process) A key feature of economic development in Argentina has been its high economic volatility which has encompassed periods of high economic growth and high productivity gains followed by periods of persistent under performance ending in severe crisis damaging overall productivity. Considering the last crisis of four

    Premium Agriculture Policy Public policy

    • 2271 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    protocols

    • 1257 Words
    • 6 Pages

    EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system‚ the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL‚ and verifying the authenticity of the certificate and signature of the sender. In this paper‚ we propose an Expedite Message

    Premium Cryptography Algorithm Public key infrastructure

    • 1257 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    access security measures and multi-factor authentication for employees and contractors through public Internet Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures Assessment Worksheet Design a Multi-factor Authentication Process Overview The students will research best practices for private sector and public sector authentication as it

    Premium Authentication Public key infrastructure

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Vpn with Ipsec

    • 4525 Words
    • 19 Pages

    1. Abstract The goal of VPNs is to provide a cost-effective and secure way to connect business to one another and remote workers to office networks. Network Security Protocols encompasses the basis for safe & reliable data transfer. These security devices should be able to provide accountability‚ access control‚ confidentiality‚ integrity‚ while all the time being cost effective. This provides us with different security protocols related to the transfer of data through a network. With a prevalent

    Premium IP address Virtual private network Internet Protocol

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    network access either by physically shutting down the port or logically by blocking the MAC or IP addresses. 6. Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites. The PKI infrastructure provides for the generation‚ production‚

    Premium Certificate authority Authentication Access control

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    cyber fraud

    • 341 Words
    • 2 Pages

    Introduction : We have seen a spate of cyber frauds in the recent past. The frequency and scale of the incidents has created a lot of concerns for the banks‚ regulators and customers. What do banks in India have to learn from these? Are they doing enough to ensure that we don’t end up as sitting ducks? What preventive measures to take to face this new menace? Before we consider these and other related questions‚ we need to understand the anatomy of cyber frauds. Cyber Fraud is a generic term used

    Premium Fraud Bank Malware

    • 341 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    significant weaknesses that can be exploited by attacks. Attackers can launch attacks against X.509 digital certificates signed using the MD5 hashing algorithm‚ to generate additional digital certificates. Vulnerability in the Internet Public Key Infrastructure (PKI) can allow rogue Certification Authority (CA) certificate trusted by all common web browsers. Rogue Certification Authority (CA) certificate‚ can

    Free Transport Layer Security Certificate authority Cryptography

    • 385 Words
    • 2 Pages
    Good Essays
Page 1 31 32 33 34 35 36 37 38 50