|
CYBER STAKING: CRIME AND CHALLENGE AT THE CYBERSPACE
Anju Thapa, Dr. Raj Kumar
VIEW/DOWNLOAD
|
ANALYSIS OF NETWORK VULNERABILITIES AND MANAGEMENT TO ENSURE MAXIMUM SECURITY
Dr. S. N. Panda, Narinder Singh Rana, Shant Kaushik, Dr. Rajinder Singh
VIEW/DOWNLOAD
|
DETECTION OF DDOS ATTACKS USING DATA MINING
Kanwal Garg, Rshma Chawla
VIEW/DOWNLOAD
|
ADAPTING THE SOFTWARE ENGINEERING PROCESS TO WEB ENGINEERING PROCESS
Sandeep Kumar, Satyaveer Sangwan
VIEW/DOWNLOAD
|
ANALYSIS OF NON-ADAPTIVE AND ADAPTIVE EDGE BASED LSB STEGANOGRAPHY FOR COLORED IMAGES
VIEW/DOWNLOAD
|
A SIMULATOR FOR SCHEDULING DUAL TUB WASHING MACHINE-AN EMBEDDED SYSTEM CASE STUDY
Rajesh Kumar Garg, Vikram Singh
VIEW/DOWNLOAD
|
PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS
Divya Sharma, Ashwani Kush
VIEW/DOWNLOAD
|
SECURE WEB MARKETING USING EAR BIOMETRICS
Girish Kumar
VIEW/DOWNLOAD
|
MODIFICATION OF SOFTWARE ON THE FLY
Tirlok Gabba
VIEW/DOWNLOAD
|
MODEL FOR CONCERN DATA BASES
Vishal Verma, Ashok Kumar
VIEW/DOWNLOAD
|
REVIEW OF SECURED ROUTING FOR WIRELESS AD HOC NETWORK
Satish Kumar Garg
VIEW/DOWNLOAD
|
AN APPROACH FOR TESTING THE DESIGN OF WEBSITE
Vandana Khatkar
VIEW/DOWNLOAD
|
INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING
Karun Madan
VIEW/DOWNLOAD
|
|