Project Proposal

Page 3

time communication and conduct our collaboration efforts (i.e. document sharing, team postings, etc.) via our personal website and post finished products to Blackboard. We also created the following norms for our team:     

Check in via blackboard and the website Tuesday evening of every week. Yahoo chat meetings on Thursday evenings at 9:30 pm EST. Post sections of the assignment that are due that week must be completed nlt Wednesday evening so there is time to compile the information, edit and discuss accordingly via Thursday teleconference. Commit to giving 100% participation. Team submissions will be provided by Denico Green.

References Perrin, C. (2008, December 18). Understanding layered security and defense in depth. Retrieved from http://blogs.techrepublic.com.com/security/?p=703 PMI. (2008). A guide to the project management body of knowledge. Newtown Square, PA: Project Management Institute Riggs, C. (2003). Network perimeter security. CRC Press. Nichols, R. & Lekko, P. (2001). Wireless security: models, threats and solutions. New York, NY: McGraw-Hill.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.