security padlock

Application Security

Network security is often viewed as covering the 7 layer TCP/IP model. This report covers why the distinction is made between Network Security and Application Security and the tools available to developers enabling best practise to be followed.

Advanced Internet Technologies

Internet technologies have evolved and modern distributed systems employ several techniques to function effectively and efficiently. These systems and operational techniques are covered within this report, including the following topics; responsiveness, scalability, synchronisation, fault tolerance and availability. Current web based databases are also considered and finally an elastic name server service and controller is designed with a range of relevant technologies explored and evaluated.

Strategic Change & Business Value

This report looks at how IT Service Managers (ITSM) delivering IT as a service can generate and deliver value by using frameworks to design, implement, measure and improve a service portfolio. The discussion focuses around the Information Technology Infrastructure Library (ITIL) framework.