Ten Years of Academic Writing

Education Articles & Research Papers

A long night of term paper writing and vodka.

A long night of term paper writing and vodka.

Today, I write fiction and social commentary, but for more than a decade, I wrote term papers and essays on a wide range of topics, including accounting, business, criminal justice, technology, and many others. Despite writing thousands of research papers, I consider them the worst of my writing and desire never to read term papers – ever. Sometimes I discuss term paper writing in my bios, and those discussions link to these papers. I also have no use for these papers, so I thought posting them might help anyone needing course assistance. Please do not ask me about papers unless you buy my books and give me a good review, just kidding! Maybe.

Please feel free to use my papers, but do not copy and paste them as your own because they are copyright protected. You may quote them in papers and on webpages but please link back. All papers are keyworded by subject. Use the search bar at the top of the site to search for your topic. Thanks.

Authentication Functions Widely Used Today to Support Network-based User Authentication

Authentication Functions Supporting Network-bas...

Vincent Triola

There are a number of authentication and access functions that are widely used to support network-based user authentication.

Authentication Functions Supporting Network-bas...

Vincent Triola

There are a number of authentication and access functions that are widely used to support network-based user authentication.

What are network security policies?

What are network security policies?

Vincent Triola

Security policies are those rules or guidelines which guide practices and standards of activity on a network.

What are network security policies?

Vincent Triola

Security policies are those rules or guidelines which guide practices and standards of activity on a network.

NIST Framework & Need for Universal Information Assurance Standards

NIST Framework & Need for Universal Information...

Vincent Triola

The NIST Framework is the standard security framework for information assurance and cyber security. This framework is designed in a general composition in order to allow companies the ability to...

NIST Framework & Need for Universal Information...

Vincent Triola

The NIST Framework is the standard security framework for information assurance and cyber security. This framework is designed in a general composition in order to allow companies the ability to...

Tunneling in the VPN Environment

Tunneling in the VPN Environment

Vincent Triola

The virtual private network is the extension of a private network into the internet. The VPN expands the ability of user to connect and access the network across larger geographies...

Tunneling in the VPN Environment

Vincent Triola

The virtual private network is the extension of a private network into the internet. The VPN expands the ability of user to connect and access the network across larger geographies...

What types of security risks do you face when installing a Web server?

What types of security risks do you face when i...

Vincent Triola

The major risks associated with webservers and its security include the following: 1. The Web Server is designed to run over a network.

What types of security risks do you face when i...

Vincent Triola

The major risks associated with webservers and its security include the following: 1. The Web Server is designed to run over a network.

The Basics of Devising Security Policy & Network Access Control

The Basics of Devising Security Policy & Networ...

Vincent Triola

There are a large number of security policies and network security designs but general security policies areas would likely include:

The Basics of Devising Security Policy & Networ...

Vincent Triola

There are a large number of security policies and network security designs but general security policies areas would likely include: