CYBER STAKING: CRIME AND CHALLENGE AT THE CYBERSPACE

Anju Thapa, Dr. Raj Kumar

VIEW/DOWNLOAD

ANALYSIS OF NETWORK VULNERABILITIES AND MANAGEMENT TO ENSURE MAXIMUM SECURITY

Dr. S. N. Panda, Narinder Singh Rana, Shant Kaushik, Dr. Rajinder Singh

VIEW/DOWNLOAD

DETECTION OF DDOS ATTACKS USING DATA MINING

Kanwal Garg, Rshma Chawla

VIEW/DOWNLOAD

ADAPTING THE SOFTWARE ENGINEERING PROCESS TO WEB ENGINEERING PROCESS

Sandeep Kumar, Satyaveer Sangwan

VIEW/DOWNLOAD

ANALYSIS OF NON-ADAPTIVE AND ADAPTIVE EDGE BASED LSB STEGANOGRAPHY FOR COLORED IMAGES

VIEW/DOWNLOAD

A SIMULATOR FOR SCHEDULING DUAL TUB WASHING MACHINE-AN EMBEDDED SYSTEM CASE STUDY

Rajesh Kumar Garg, Vikram Singh

VIEW/DOWNLOAD

PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

Divya Sharma,  Ashwani Kush

VIEW/DOWNLOAD

SECURE WEB MARKETING USING EAR BIOMETRICS

Girish Kumar

VIEW/DOWNLOAD

MODIFICATION OF SOFTWARE ON THE FLY

Tirlok Gabba

VIEW/DOWNLOAD

MODEL FOR CONCERN DATA BASES

Vishal Verma,  Ashok Kumar

VIEW/DOWNLOAD

REVIEW OF SECURED ROUTING FOR WIRELESS AD HOC NETWORK

Satish Kumar Garg

VIEW/DOWNLOAD

AN APPROACH FOR TESTING THE DESIGN OF WEBSITE

Vandana Khatkar

VIEW/DOWNLOAD

INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING

Karun Madan

VIEW/DOWNLOAD