Discount applied successfully
Title |
|
Pages / Words |
Save |
What Were The Major Political And Socio-Economic Changes Introduced By The British Colonial Authorities In Kenya. What Did The Authorities Seek To Achieve By These Changes?
|
|
6 / 1407 |
|
Wheres the Athletes Cut
|
|
6 / 1594 |
|
Why Has It Been So Difficult To Reach An Agreed Definition Of Terrorism?
|
|
10 / 2657 |
|
Why advertising is an ethical problem
|
|
6 / 1536 |
|
Women In Africa
|
|
9 / 2385 |
|
Women and the Media
|
|
5 / 1368 |
|
World Bank Mediation On Baglihar Dam:
|
|
28 / 7583 |
|
World Trade Center
|
|
12 / 3160 |
|
will consumers pay more for ethically produced goods
|
|
4 / 1010 |
|
African American History
|
|
36 / 10043 |
|
Asia Regional Economic Integration
|
|
36 / 10027 |
|
Intellectual Property Law, Part I
|
|
10 / 2525 |
|
P.e.t.a. : Animal Rights, Human Abuse
|
|
6 / 1481 |
|
Wal-mart Smart Inventory Systems
|
|
10 / 2623 |
|
A Comparison of Sun's Java 2 Enterprise Edition (J2EE) and Microsoft's .NET Framework using the Porter's Five Forces Model of Competition
|
|
11 / 3064 |
|
A Place To Make Amends?
|
|
6 / 1615 |
|
A Primer on Satellite Communications
|
|
45 / 12452 |
|
A Proposed Strategic Information System for a Retail Chain
|
|
18 / 4968 |
|
AD
|
|
9 / 2473 |
|
Abbey
|
|
14 / 3700 |
|
Abgenix
|
|
10 / 2787 |
|
Accelerometer mouse
|
|
12 / 3219 |
|
All About FTP
|
|
12 / 3331 |
|
American Red Cross
|
|
14 / 3665 |
|
An Analysis Comparing and Contrasting
|
|
11 / 3037 |
|
An Assessment Of Keystroke Capturing Technology
|
|
12 / 3345 |
|
An Integrated Strategic Approach
|
|
25 / 6800 |
|
An Overview On Current Free And Open Source Desktop Gis Developments
|
|
38 / 10406 |
|
An Overview of Unix Security
|
|
5 / 1375 |
|
Analysis Of Unix And Windows
|
|
3 / 673 |
|
Analysis of Microsoft WMF Vulnerability
|
|
4 / 971 |
|
Analysis on Mainframe
|
|
27 / 7407 |
|
Applications of Computers
|
|
10 / 2591 |
|
Artificial Intelligence
|
|
11 / 2801 |
|
Awt Stats Installation
|
|
2 / 348 |
|
adhoc area networks
|
|
16 / 4307 |
|
BSIT Gen300 Final
|
|
7 / 1817 |
|
BSS Exploit Example
|
|
1 / 64 |
|
Bead Bar E Commerce
|
|
4 / 899 |
|
Beyond Basic HTML
|
|
15 / 4175 |
|
Beyond Html Web Technologies
|
|
12 / 3172 |
|
Bill Gates
|
|
8 / 2195 |
|
Block Adservers
|
|
15 / 3931 |
|
Business Req
|
|
6 / 1469 |
|
Business Utilization of Open Source Software
|
|
8 / 1993 |
|
backup systems
|
|
4 / 866 |
|
bluetoot profile
|
|
8 / 2034 |
|
C&A Assessment
|
|
21 / 5864 |
|
C++
|
|
11 / 3038 |
|
COBIT Security Checklist
|
|
28 / 7621 |
|
Call Center Case Study - Customer Contact Center
|
|
19 / 5264 |
|
Case Study
|
|
4 / 984 |
|
Cheating
|
|
8 / 2180 |
|
Compare and Contrast Linux and Windows File System
|
|
2 / 385 |
|
Compare linux and windows 2000
|
|
9 / 2371 |
|
Comparison of J2EE and .NET
|
|
10 / 2679 |
|
Comparison of Linux/UNIX and Windows XP
|
|
13 / 3565 |
|
Comparison of Network Operating Systems
|
|
3 / 563 |
|
Comparison of Unix, Linx and Windows
|
|
10 / 2697 |
|
Comparison of Windows and X Windows on Knoppix Linux Boot disk and Window 2000 Citing Advantages and Disadvantages to Both
|
|
4 / 882 |
|
Comparisons and Contrasts of Windows CE, Windows XP, and Linux
|
|
13 / 3626 |
|
Compilers
|
|
15 / 4132 |
|
Compilers
|
|
2 / 426 |
|
Computer Hacking
|
|
5 / 1342 |
|
Computer Networking And Management
|
|
28 / 7643 |
|
Computer Networking And Management
|
|
4 / 889 |
|
Computer Programming: A Brief Overview
|
|
3 / 739 |
|
Computer Software
|
|
9 / 2442 |
|
Computer Virus
|
|
17 / 4556 |
|
Computer Viruses: Past, Present And Future
|
|
17 / 4728 |
|
Computer history timeline
|
|
29 / 8004 |
|
Computer
|
|
51 / 14101 |
|
Computers Now
|
|
4 / 989 |
|
Computers: The Greatest Invention of the Century?
|
|
9 / 2390 |
|
Consuming Kids (summary)
|
|
2 / 407 |
|
Continuous Auditing Of Database Applications
|
|
14 / 3786 |
|
Continuum Percolation study of carbon nano tube composites via Size distribution effects
|
|
5 / 1294 |
|
Copy Protection and the DRM
|
|
4 / 889 |
|
Creating a simple and inexpensive network
|
|
4 / 933 |
|
Critical appraisal of Amazon.com current e-business strategy and activities.
|
|
6 / 1492 |
|
Cryptography
|
|
22 / 5911 |
|
cell processor
|
|
38 / 10636 |
|
computer virus
|
|
7 / 1802 |
|
computer viruses
|
|
4 / 1088 |
|
computer viruses
|
|
17 / 4688 |
|
computer
|
|
5 / 1194 |
|
DNS cache poisoning
|
|
4 / 1051 |
|
Data Modeling Tools
|
|
2 / 468 |
|
Database Comparison Paper
|
|
4 / 843 |
|
Database Comparison of SQL Server 2000, Access, MySQL, DB2, and Oracle
|
|
4 / 1090 |
|
Database
|
|
2 / 486 |
|
Deconstructing the clock
|
|
4 / 865 |
|
Desktop Environments:
|
|
2 / 398 |
|
Development Of A Area Processing Center
|
|
42 / 11518 |
|
Digital Video Recorders
|
|
3 / 834 |
|
DirectX 10 & the Future of Gaming
|
|
11 / 2985 |
|
Does It Matter?
|
|
2 / 320 |
|
ddsddd
|
|
15 / 3942 |
|
dell
|
|
9 / 2320 |
|
E-Business and Technology
|
|
12 / 3085 |
|
E-Commerce
|
|
22 / 6004 |
|
E-commerce Website Security Issues
|
|
9 / 2499 |
|
EUROPEAN COMMUNICATION POLICY
|
|
13 / 3584 |
|
EVALUATION
|
|
3 / 751 |
|
Ebook Readers of the future
|
|
5 / 1205 |
|
Ecommerce Legal Issues
|
|
10 / 2739 |
|
Energy, Technology and Climate: Running Out of Gas
|
|
24 / 6635 |
|
Enterprise Architecture
|
|
34 / 9414 |
|
Enterprise Database Management System Paper
|
|
3 / 728 |
|
Er.
|
|
2 / 507 |
|
Erp - History And Evolution
|
|
9 / 2506 |
|
Erp Selection For Small And Medium Size Organizations
|
|
34 / 9479 |
|
Essay On Convergance Culture And Trends Of Music Sharing Online
|
|
5 / 1396 |
|
Etech Ohio 2009
|
|
4 / 926 |
|
Ethical Computer Hacking
|
|
3 / 776 |
|
Ethical Issues And Implications Of Information Technology Use For Financial Corporations As It Relates To Identity Theft
|
|
29 / 7880 |
|
Evil Consequences Of It
|
|
9 / 2482 |
|
Evolution of Programming Languages
|
|
1 / 277 |
|
Examining Port Scan Methods - Analysing Audible Techniques
|
|
17 / 4623 |
|
Exploiting the Potenital Of Linux
|
|
8 / 2118 |
|
Expressing OLAP operators with the TAX XML algebra
|
|
14 / 3730 |
|
e-banking
|
|
17 / 4654 |
|
e-commerce
|
|
2 / 521 |
|
File Encryption
|
|
1 / 264 |
|
File processing and Programming Capabilities
|
|
3 / 686 |
|
Framework For Setting IT Salaries
|
|
35 / 9551 |
|
Free Software Vs. Open Source
|
|
7 / 1776 |
|
FrontPage2002
|
|
5 / 1392 |
|
Functions of an OS Platform-('03)
|
|
6 / 1507 |
|
Future of HA
|
|
11 / 2945 |
|
file processing in windows/linux
|
|
7 / 1793 |
|
fpga working
|
|
16 / 4467 |
|
GAIM Review
|
|
18 / 4805 |
|
GUI
|
|
6 / 1533 |
|
Gentoo Install Guide
|
|
10 / 2765 |
|
Get Hired in Security Today
|
|
8 / 2035 |
|
Gmail Tools & Plugins
|
|
3 / 834 |
|
Google Chrome
|
|
2 / 457 |
|
Google Leading From Front
|
|
34 / 9329 |
|
Google Research
|
|
3 / 689 |
|
Google takes on the world
|
|
10 / 2783 |
|
Google
|
|
7 / 1709 |
|
Green It
|
|
10 / 2624 |
|
Growth Of Distributed Systems Using Grid Computing And Softer Aspects Of E-Science
|
|
16 / 4463 |
|
HD TV over IP Networks
|
|
11 / 2821 |
|
HRIS online discussion
|
|
7 / 1814 |
|
Hack
|
|
2 / 309 |
|
Hacking Guide To GSM
|
|
20 / 5591 |
|
Hacking
|
|
3 / 816 |
|
Hacking
|
|
2 / 465 |
|
Hardening Linux
|
|
2 / 551 |
|
Healthcare Management
|
|
4 / 989 |
|
Healthlite Yoghurt
|
|
4 / 1106 |
|
Healthlite Yogurt Company
|
|
12 / 3102 |
|
Help Desk Software Tools
|
|
5 / 1294 |
|
Honda Marketting Strategy
|
|
6 / 1572 |
|
Hosting Your Own Website
|
|
4 / 858 |
|
How Far Will Microsoft Get?
|
|
5 / 1214 |
|
How To Hack
|
|
6 / 1549 |
|
Hp Proliant
|
|
8 / 1973 |
|
Huffman Trucking Network
|
|
10 / 2594 |
|
hacking
|
|
22 / 5903 |
|
history of Pc
|
|
5 / 1390 |
|
IBM DB2 vs Oracle
|
|
4 / 1109 |
|
IBM TERM
|
|
3 / 723 |
|
INFORMATION SYSTEMS DEVELOPMENT PROCESS
|
|
10 / 2606 |
|
INTRANET AND ITS SUPPORT TO ELECTRONIC BUSINESS
|
|
13 / 3410 |
|
IPv6 migration
|
|
7 / 1792 |
|
IT (harware and software)
|
|
5 / 1191 |
|
IT Industry in Pakistan
|
|
21 / 5669 |
|
Ifdma - A Promising Multiple Acess Scheme For Future Mobile Radio Systems.
|
|
18 / 4761 |
|
Impact of electric commerce
|
|
9 / 2358 |
|
Implementation of Nemo on Linux
|
|
26 / 7064 |
|
Intel & Future Of Mobile Phones
|
|
2 / 529 |
|
Intellectual Property Rights And The Society
|
|
11 / 3032 |
|
Intelligent EMbedded Systems
|
|
7 / 1884 |
|
Internet Explorer
|
|
3 / 754 |
|
Internet Payments
|
|
4 / 844 |
|
Intro to Computer Hacking
|
|
14 / 3797 |
|
Is Microsoft really a Monopoly?
|
|
8 / 2010 |
|
It Development Of China
|
|
8 / 2057 |
|
It Is So Good
|
|
21 / 5698 |
|
iTunes and The Digital Music Industry
|
|
5 / 1329 |
|
information technology
|
|
26 / 7055 |
|
Java Programming Language
|
|
30 / 8370 |
|
Java Systems
|
|
11 / 2971 |
|
Java's API and Libraries
|
|
3 / 671 |
|
Knowledge Management
|
|
92 / 25721 |
|
LAN
|
|
13 / 3408 |
|
LINUX
|
|
9 / 2394 |
|
LInux Mail server configuration
|
|
29 / 7878 |
|
LS-DYNA Data Management using Visual-Environment
|
|
10 / 2723 |
|
Les souris informatiques, comment evolueront-elles ?
|
|
20 / 5529 |
|
Lindows.com
|
|
1 / 248 |
|
Linux Advanced Routing & Traffic Control
|
|
34 / 9338 |
|
Linux Operating System
|
|
2 / 455 |
|
Linux Versus Microsoft
|
|
3 / 654 |
|
Linux Versus Windows NT
|
|
4 / 921 |
|
Linux /UNIX vs. Windows
|
|
13 / 3516 |
|
Linux and Microsoft
|
|
6 / 1602 |
|