Application Security

 

Discuss  the following, supplying citations to support any information that you  provide.  Do not include your opinion, only what you can support with a  citation.  Address the following topics.

  1. Describe operating system hardening 
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment? 
  2. Describe system restoration methods and procedures  
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls 
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence 
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence 
      1. Describe why evidence is collected, 
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format. 
  • Utilize at least five scholarly references.  
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.  
  • Utilize Google Scholar and/or the university library.  
  • Do  not copy and paste bulleted lists.  Instead, read the material and in  your words, describe the recommendation citing the source.  
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment.  
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Computer Geographics

1.     

In this chapter we have looked at the point location problem with pre- processing. We have not looked at the single shot problem, where the subdivision and the query point are given at the same time, and we have no special preprocessing to speed up the searches. In this exercise and some of the following ones, we have a look at such problems. 

Given a simple polygon P with n vertices and a query point q, here is an algorithm to determine whether q lies in P. Consider the ray ρ := {(qx +λ,qy) : λ > 0} (this is the horizontal ray starting in q and going rightwards). Determine for every edge e of P whether it intersects ρ. If the number of intersecting edges is odd, then q ∈ P, otherwise q à∈ P. 

Prove that this algorithm is correct, and explain how to deal with degen- erate cases. (One degenerate case is when ρ intersects an endpoint of an edge. Are there other special cases?) What is the running time of the algorithm? 

2. Suppose you are given an n-vertex simple polygon, P. Describe how to build an efficient data structure for determining in O(log n) time whether a query point, q, is inside of P or not. What is the space and preprocessing time for your data structure?

3. The ray shooting problem occurs in computer graphics (see Chapter 8). A 2-dimensional version can be given as follows: Store a set S of n non-crossing line segments such that one can quickly answer queries of the type: “Given a query ray ρ—a ray is a half-line starting at some point—find the first segment in S intersected by ρ.” (We leave it to you to define the behavior for degenerate cases.) In this exercise, we look at vertical ray shooting, where the query ray must be a vertical ray pointing upwards. Only the starting point need be specified in such a query. Give a data structure for the vertical ray shooting problem for a set S of n non-crossing line segments in general position. Bound the query time and storage requirement of your data structure. What is the preprocessing time?

computer science

 network analysis/tech using the NS3 network simulator and , report-1000 words and , 10 ppt slides w/o notes 

java

i already done half the work i just need you to make the output like this {

Square of 1 is 1

Square of 2 is 4

Square of 3 is 9

Square of 4 is 16

Square of 5 is 25

Square of 6 is 36

Square of 7 is 49

Square of 8 is 64

Square of 9 is 81

Square of 10 is 100

The sum of the squares is 385!

}

300 words discussion

One of the hardest tasks you may face in Web Analytics is to convince persons outside of your team or department of the importance of the reports and KPI’s that tell the story of how well or bad you are doing with your website. Communicating your information effectively to Management and the Board of Directors, whom we will call the stakeholders, can be a daunting task, they just do not have the time to understand the details of the reports you offer. Therefore, to communicate your information, you will have to learn how to summarize and format your reports in abridged versions.

Please explain the following:
300 Words Minimum 

Explain what KPIs are they designed to accomplish.
Describe how to prepare a KPI.
Explain how you would present your KPI to the Stakeholders, in brief. 

Business Intelligence_ week 7

Discussion : Please find the attachment below for question

Paper: Please find the attachment below for question

There are two sections of conclusions mentioned in the question. Please read it carefully and make sure there is at least one logic or flow diagram in the paper.

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.) 

Please write 350 words essay.