Downloads :-
Integrate Military with Distributed Cloud Computing and Secure Virtualization
J. MOUNIKA REDDY, J. MARY MONIKA, Vol.1, Issue 3, December, 2012
Software Security Risks in Mobile E-Commerce
Yeddula Venkatramana Reddy, Member IEEE, Vol.1, Issue 3, December, 2012
Linear and Nonlinear Controller Contrast for the Vibration Isolation System utilizing Smart Spring
Ch. Arshad Mehmood, Muhammad Ali, (USA), Vol.1, Issue 3, December, 2012
Cloud Computing and its impact on Supply Chain Performance
Ali, Syed Imran, (Saudi Arabia), Vol.1, Issue 3, December, 2012
Collaborative Word Processors
Ali A Altalbe, (Saudi Arabia), Vol.1, Issue 3, December, 2012
Applications of Ethical Hacking Techniques to Software Professionals with respect to Behavioral Science
Prof. A. T. Gaikwad, Dr. R. V. Kulkarni, Vol.1, Issue 3, December, 2012
Artificial Neural Network for Ecosystems Analysis (ANEA), A Neural Ecosystem Analyzer.
Khalda F. Ali, Riza. M. Suliman, Mohd Talib Latif, (Malayasia), Vol.1, Issue 3, December, 2012
Introduce an Integrated Approach to Vendor Evaluation
Ali Nazeri, Mehdi Nosratpour, Awaluddin Bin Mohamed Shaharoun, (Malaysia), Vol.1, Issue 3, December, 2012
Prevention of Privacy Threats in Social Networking Sites
Gurpreet Singh, Gagandeep Singh, Neha Kohli, Vol. 2, Issue 1, January, 2013
Derivation Rule Dependency and Data Provenance Semantics
Choon Lee, Don Kerr, (KOREA), Vol.2, Issue 1, January, 2013