SearchSkip to Search Results
- 164Concordia University of Edmonton
- 90Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
- 12Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 10Concordia University of Edmonton/Master of Arts in Biblical and Christian Studies Theses (Concordia University of Edmonton)
24, 48 and 72 hour contact toxicity test of peppermint (Mentha piperita), garlic (Allium sativum L.) and lemon (Citrus limon L.) essential oil on the long-tailed mealybug (Pseudococcus longispinus)Download
The long-tailed mealybug (Pseudococcus longispinus) is a major agricultural pest to over 26 different plant species. They proliferate both sexually and parthenogenetically, taking approximately 4-6 weeks to reach reproductive maturity. Each adult female can produce 75 to 200 live-young over an...
Cloud computing is evolving as a key computing platform for sharing technological resources including infrastructures, software and business applications. Cloud has proven to bring many promising benefits to organizations. As a result, increasing number of companies are migrating legacy...
The book of Lamentations is comprised of five acrostic poems that relate to the tragedy of the Babylonian siege and destruction of the temple around 587 BCE. Many commentators and scholars of Lamentations speak of the competing voices that are to be found in the text. This reflects the fact that...
A comparative case study on Cloud Service Providers, their Service Level Agreements, and lost of availability due to security breach: Amazon EC2 and S3, and Microsoft Windows Azure Compute and StorageDownload
Even though Amazon and Microsoft are promising 99.9 to 100 percent service uptime for their cloud compute and storage services, they don't take responsibility of service downtime that could result from Distributed Denial of Service (DDoS) and outside malicious attacks. The objective of this paper...
In 1999 Lutheran Church-Canada (LCC) established its office of deacon. Is LCC's conception of this office consistent with the New Testament evidence? To answer this question, the following approach is taken. The study is divided into five chapters. The first chapter examines the development of...
This study compares the protection of Electrical Infrastructure (EI) in Cyber Security Strategies (CSS) of the United States (U.S) and Australia. Employing three key indicators as interpretive frameworks - (I) Standards and guidelines, (II) policies and (III) security controls, this study takes...
A comprehensive framework for a risk and role based enterprise security awareness, training and education program for ISO/IEC 27002 complianceDownload
Organizations are faced with a variety of ever changing information security risks. This study examines the state of information security, user groups and user roles responsible for and ISO/IEC domains required for risk mitigation in a large public organization in Canada. The objective is to...
This research paper develops a conceptual framework for internal control, suitable for small business owners, to guide the effective selection and implementation of internal controls that help prevent and detect occupational fraud. Although the de facto internal control framework, the Committee...
A critical consideration of three fulfillment citations in the Gospel According to Matthew|Old TestamentDownload
This paper will argue that the author of the Gospel According to Matthew employed the citations within Matt 1:18-25; 2:19-23 and 4:12-16 to demonstrate that Jesus was the messiah and the heir of David. He achieved this by using hermeneutical methods common in his day and culture, thus embedding...
In this research paper, a new systematic approach to segmenting nodes in an internetwork is proposed. The research paper shows advantages of screening traffic between clients and the servers with which they communicate. The proposed strategy is intended to supplement, but not displace, other...