mini research paper

  
Chapter  2 Security in Mic  
Chapter 1 – Windows and the Threat Landscape
Windows 10 Threat Landscape – Multiple Contributors, Microsoft.com
7 Things to Know about the Changing Security Landscape – Jessica Lyons Hardcastle 
  Chapter  2 Security in Microsoft Windows OS
http://resources.infosecinstitute.com/identity-management/
https://www.sans.edu/cyber-research/security-laboratory/article/311
Chapter  3 Access Controls in Microsoft Windows
https://technet.microsoft.com/en-us/library/dd277411.aspx
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models
Chapter  9 Microsoft Windows Network Security
https://technet.microsoft.com/en-us/security/hh535726.aspx
Pick a topic relevant to the information we have covered to date, including this week.  It can cover information in Chapters 1,2,3, and 9, or any of the articles presented in the readings area.  The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):
INTRODUCTION
· State the topic you are attempting to cover
· State the issues involved
· State why we should be concerned with resolving whatever issues are involved
· State how answering the issues will help us
· State the implications and consequences of dealing with or resolving the issues involved
REVIEW OF THE LITERATURE (2 sources minimal, at least 1 needs to be peer-reviewed)
Identify who has tried to answer the question before by doing the following:
· Summarize how each of the sources presents and deals with the subject
· Explain how each source presents and deals with its findings or results
· Explain the relevancy of each source to your topic
· State what you learned from each of your sources
· State in what way(s) each source contributes to answering your issues
DISCUSSION
· State your answer to your issue
· State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue
· State what questions about your topic you still have that your sources may not have answered
CONCLUSIONS
· Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
· State the implications of your conclusions
· State what might be the possible consequences of your conclusions
· State the significance these implications and consequences might have in the information technology / information security realm 
DOCUMENTATION
· On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper
· You should have a MINIMUM of three (2) sources for your paper, at least 1 source needs to be peer-reviewed
· Not meeting this minimum requirement of three (2) sources will lead to a lower evaluation of your paper for each missing source
· Use APA format for documenting your sources
-For APA help: Purdue OWL
-For more details on journal types, refer to this link:  Rutgers Library

find the cost of your paper

JOURNAL ARTICLE REVIEW – EMOTIONAL INTELLIGENCE

Each student will select one of the key terms listed  below and conduct a search of our University’s online Library  resources to find 1 recent peer-reviewed article (ATTACHED TO THIS POST) that closely….

9

Using the format outlined on the PICO reference page in the Nursing Reference Center design your own question. (This may be related to something you are familiar with, or something….

management questions

I have 5 questions need to be answers for management class  and the answers from the book  from chapter 1 to 5   the answers should be short  here is….