Et Cetera


Hacking: What Video Gamers Love to Hate

Contributed by Matthew Cantu

This paper explains the effects hacking has on the video game industry. The paper also goes into great detail about why these hackers have become so apparent the last decade as games have become more sophisticated. The video game industry is taking a major hit each and every year and must battle everyday against these hackers to preserve, not only their game, but also their reputation. As you begin to look further into the paper you’ll discover how these companies have begun to counteract some of these hackers. Some of the hackers may be easier than others to deal with. Some are just small time hobbyists, others are large hacktivist groups looking to deal major damage.

This document is in PDF format. To view it click here.


Multiprotocol Label Switching: An In Depth View

Contributed by LoyCurtis Smith


Survey of Sensitive Information Detection Techniques: The need and usefulness of Machine Learning Techniques

Contributed by Riya Shah and Manisha Valera


Software Defined Networking: What it is and what you should know!

Contributed by Jeff Dixon

It’s well known that technology changes and creates new and increasing demands at an incredible pace. There have been few dramatic changes in how networks are designed over the years, however, that is quickly changing with the advent of Software Defined Networking (SDN). This paper will serve to provide a comprehensive guide to explore and explain the advancements of Software Defined Networking. The purpose is aimed to further inform and educate readers about SDN, what it is, and what you need to know moving forward, learning today for the challenges of tomorrow.

This document is in PDF format. To view it click here.


Enterprise Network Management

Contributed by Billy Short

This document was created for the implementation of best practices in enterprise network management. Specifically, best practices in security are emphasized. Best practices in an enterprise network are used by Network Administrators and Information Technology management in order to consistently create highly functional, yet highly secure networks. Secure networks are key in providing clients, customers, and employee's data and other files safe and secure. While reading and understanding this report, individuals will learn that the level of security and the level of usability by the user is directly affected. A network can be extremely secure, but impractical to use.

This document is in PDF format. To view it click here.


Subscribe to RSS - Et Cetera