Computer science:NETWORK SECURITY ISSUES WITH WIRELESS TECHNOLOGY,Reference (need at least 6 Peer-Reviewed/scholarly references Literature Review: You are to submit your Table of Contents, Introduction, Literature Review ranging from 7 – 15 pages in leng

Reference (need at least 6 Peer-Reviewed/scholarly references Literature Review: You are to submit your Table of Contents, Introduction, Literature Review ranging from 7 – 15 pages in length with no less than 5 peer reviewed references as a complete paper. Use the Table of Contents to guide the flow of the paper! •Matching percent from direct/in-direct quotes should not exceed 10%. •Review the literature on a specific research question. •The literature review should focus on discussing how other researchers have addressed the same or similar research questions. •It should introduce the study and place it in larger context that includes a discussion of why it is important to study this topic. •It should provide the current state of accumulated knowledge as it relates to the your specific research question/hypothesis/thesis statement. •Summarize the general state of the literature (cumulative knowledge base) on the specific research question/hypothesis/thesis statement: include researcher’s findings, how the findings were obtained, and evaluation of biases in the findings. •Include a short conclusion and transition to the next section. •Use peer reviewed research articles. As a guide, you may build your Table of Contents and write your literature review based on one or more of the following organizational patterns: •Chronological Patterns. •Sequential Patterns. •Spatial Patterns. •Compare-Contrast Patterns. •Advantages- Disadvantages Patterns. •Cause-Effect Patterns. •Problem-Solution Patterns. •Topical Patterns. The link between clear, logical organization and effective communication is powerful, both for the “sender” and the “receiver.” (“Pattern of Organizations,” n.d., para.1)

"Looking for a Similar Assignment? Order now and Get a Discount!