Designing a Secured Wireless Network Infrastructure

What would you use Critical Path or Critical Chain methodology when organising an event? Evaluate and suggest appropriate decisions for different type
August 10, 2020
Westboro, Inc_CVP Analysis
August 10, 2020

Designing a Secured Wireless Network Infrastructure

1. Introduction and Background A description of the general area of study
2. Literature review Strategy and Findings
a. Keywords used and results obtained
b. Journals used and evaluation of worth
c. Principal authors and their positions
d. Summary of findings
e. Properly referenced bibliography (at end of document)
3. Research Methodology
a. Type(s) of data sought and sources of data.
b. Methodological approaches considered (for data acquisition and data
analysis)
c. Explanation of how methodology will provide data required
4. Refined research question
a. What are you going to do?
b. Why are you going to do it?
c. Who will be interested?
d. What is the scope?
e. What are the limitations (what will you not cover?)