Network Management

ALL INSTRUCTIONS WILL BE PROVIDED IN THE 2 FILES I WILL PROVIDE BUT I WILL STILL PROVIDE THE INSTRUCTIONS HERE JUST AS A PRECAUTION. THANK YOU WRITER! 1ST FILE: Deliverables The deliverable is a five full page term paper in MLA format. The submitted file must be Microsoft Word .doc/.docx .   Process The topic should be detailed enough so that you can easily meet the page count requirement.  You can use The Information Technology URLs file that I have provided or use your favorite Internet search engine (Bing, Google, Yahoo, etc…) to find references.  The Works Cited references that you choose must be professional.  You must use at least 5 different websites as references to reduce the possibility of myopia by adding balance.  If a Works Cited reference is not listed in the Information Technology Professional URLs file, then it cannot be used. The Information Technology URLs file will be attached.   I am choosing this as my topic for my term paper. TERM PAPER TOPIC: The detailed requirements for the Term Paper will be posted on Blackboard at the beginning of the semester.  The Term Paper topic must be focused on the Network.  The Term Paper topic cannot be related to security.   – Network Management   You cannot use the course textbooks as references.  Since the Information Technology industry is constantly changing, you must use references that are under 3 years old.  Every Works Cited reference needs to have a working URL that points to the exact PDF or specific webpage, not a general landing webpage and must not require registration or the use of a username and password to access the reference.   Here are some examples of domains that cannot be used as references:        Format MLA format is required.  The Purdue University Online Writing Lab has some excellent reference material on MLA. For MLA General Information – See For MLA Sample – See   This assignment should be well written in terms of organization, spelling, and grammar.  Length needs to be at least 5 full pages excluding Title, Student Name, CxC nnn, Date, Works Cited and any non-student content (tables, graphs or pictures, quotes, etc…).  Ensure that the body fills five pages.    In 2009 MLA changed the specification of Web Publications.  For this assignment you must add the URL in angle brackets at the end of each works cited entry from the Web as shown below.    Aristotle. Poetics. Trans. S. H. Butcher. The Internet Classics Archive. Web Atomic and        Massachusetts Institute of Technology, 13 Sept. 2007. Web. 4 Nov. 2008. ‹›.   Free Tool to Generate MLA Works Cited Entries BibMe is a free automatic citation creator that supports MLA, APA, Chicago, and Turabian formatting. BibMe leverages external databases to quickly fill citation information for you. BibMe will then format the citation information and compile a bibliography according to the guidelines of the style manuals. If you prefer, you can enter your citation information manually. BibMe also features a citation guide that provides students with the style manuals’ guidelines for citing references. Note:  Make sure that you have selected MLA format, as BibMe supports MLA, APA, Chicago and Turabian bibliography formats.   See   Checklist You will not get full credit if… – Submitted file is not Microsoft Word .doc/.docx   – Late submissions will not be accepted – Topic does not match that which is specified in the syllabus – Works Cited with less than five different websites – Works Cited reference is not listed in the Information Technology Professional URLs on Blackboard – Works Cited URL that is over three years old – Works Cited URL that points to a general landing page – Body does not fill five pages – MLA format not used – Works Cited reference without a URL – Works Cited URL that requires registration and/or username/password   Submission Remember that everything you do or say is a direct reflection of yourself, so before submitting your work, make sure that it represents you in a positive, professional manner. 2ND FILE: Network: A10 – ADTRAN – Affirmed – Alaxala – Alcatel – Allied Telesis – American Registry for Internet Numbers (ARIN) – Arista – Arris – Aruba – Aryaka – Asia Pacific Network Information Centre (APNIC) – Avaya – Ayla – Barracuda – Big Switch – Broadcom – Cambium – Ciena – Cisco – Cloudflare – CloudGenix – CommScope – Cumulus – D-Link – DotGov – DrayTek – ECI – EnGenius – Ericsson – Exinda – ExtraHop – Extreme – Federal Communications Commission (FCC) – Fujitsu – Hewlett Packard Enterprise – Huawei – Internet Engineering Task Force (IETF) – Internet Society – – Juniper – Linksys – Mist – National Telecommunications and Information Administration (NTIA) – NEC – Netgear – Netscout – Network Computing – Network World – Nokia – Open Networking Foundation (ONF) – Palo Alto – Pluribus – PureVPN – RAD – Riverbed – SolarWinds MSP – SonicWall – Stability Networks – Telco – Teridion – TP-Link – Ubiquiti – VeloCloud – Wi-Fi Alliance –   Security: Acceptto – Application Development Trends Security – Broadcom Mainframe Security and Compliance – Build Security In (BSI) – Chief Information Security Officer (CISO) – CIO Insight Security – Cloud Security Alliance – Common Criteria (CC) – Compuware Cybersecurity for Mainframe Data Protection – CSO – Cybersecurity and Infrastructure Security Agency (CISA) – Datamation Security – Defense Information Systems Agency (DISA) – Department of Homeland Security (DHS) Science and Technology Directorate (S&T) Cybersecurity – Duo – Enterprise IT Security – Government Security News – Idaptive – Infosecurity – International Association for Cryptologic Research (IACR) – or International Journal of Computer Science and Network Security (IJCSNS) – Journal of National Security Law & Policy – Key Resources – Krebs on Security – LoginRadius – Making Security Measurable (MSM) – McAfee – NIST Computer Security Resource Center (CSRC) – NIST Cybersecurity – NIST Cybersecurity Framework – NIST ITL Applied Cybersecurity Division – NIST National Cybersecurity Center of Excellence (NCCoE) – NIST National Initiative for Cybersecurity Education (NICE) – NIST Privacy Framework – Norton – Okta – OneLogin – OneSpan – PC World Security – RSA – Security Boulevard – Software Development Times Security – Tech News World Security – TechRepublic Security – Vanguard Integrity Professionals – VentureBeat Security- Verge Cybersecurity- Wired Security – WSJ Pro Cybersecurity –     Other: Agile Alliance – Agile Business Conference – Agile Journal – Application Development Trends – Association for Computing Machinery (ACM) – Broadcom – Center for Systems and Software Engineering (CSSE) @ USC – CIO – CIO Insight – Computer Measurement Group (CMG) – Computer Weekly – Computer World – Consortium for IT Software Quality (CISQ) – Container Journal – CrossTalk, the Journal of Defense Software Engineering – Data & Analysis Center for Software (DACS) – Datamation – Defense ARJ @ DAU – Defense AT&L @ DAU – Deloitte – – Digital Trends – Dr.Dobb’s – Enterprise Systems Media – eWeek – ExtremeTech – Federal Computer Week – Ferderal Times – Fierce Government IT – Fujitsu – Galorath – Google Patents – Healthcare Information and Management Systems Society (HIMSS) – Hindawi – IBM – IBM Redbooks – IBM Systems Magazine – IBM Technical Sales Library (Techdocs) – IEEE Computer Society – Info World – InfoQ – InformationWeek – InfoStor – Institute for Software Research (ISR) @ UCI – International Journal of Advanced Research in Computer Science (IJARCS) – IOPscience – IT PRO – IT World – Journal of Theoretical Physics and Cryptography (JTPC) – Lean Magazine – Manifesto for Agile Software Development – Microsoft – National Institute of Standards and Technology (NIST) – Object Management Group (OMG) – Occupational Outlook Handbook (OOH) @ BLS – PC World – PlanetMainframe – PragPub – Project Management Institute (PMI) – Project Smart – Red Hat – Register – SC Magazine – Science Direct – SHARE – Software Assurance – Software Development Times – Software Engineering Information Repository (SEIR) @ CMU – ???? Software Engineering Institute (SEI) @ CMU – Software Protection Initiative (SPI) @ DOD – Sydney Morning Herald IT Pro – Tech News World – Tech Republic – Tech Spective – Thought Works Technology Radar – US-CERT – Verge – Wired – WSJ Technology – z/OS Hot Topics – z/OS Internet Library – ZDNet –

Assignment Term Paper (TP) Requirements Information Technology Professional URLs

Don't use plagiarized sources. Get Your Custom Essay on
Network Management
Just from $13/Page
Order Essay
Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)