1 |
A Green Thumb to Fortify Information Redemption
V T RAM PAVAN KUMAR. M
|
1-5 |
|
2 |
A New Approach of Digital Forensic Model for Digital Forensic Investigation
P.V.S. Sriram
|
6-9 |
|
3 |
Comparing Forensic Analysis Methods: A Roadmap to Cost-Effective Forensic Investigation
Ms. Pooja Gupta
|
10-14 |
|
4 |
Computer Intrusion Forensics
CH. RAMESH BABU
|
15-17 |
|
5 |
Digital Forensic Investigation Model
Ch. Pavani
|
18-20 |
|
6 |
Digital Forensics: Need and Models
R.Selvaprabha
|
21-23 |
|
7 |
ETHICAL HACKING: A PROFICIENCY TO REINFORCE INFORMATION SECURITY
J.Panduranga Rao
|
24-28 |
|
8 |
Ethical Hacking Commandments
V. Prameela Rani
|
29-32 |
|
9 |
Ethical Hacking Tools: A Situational Awareness
M.Rajendra Prasad,Dr.B.Manjula
|
33-38 |
|
10 |
ETHICAL HACKING TOOLS
V.Teja Priya
|
39-42 |
|
11 |
ETHICAL HACKING: TYPES OF ETHICAL HACKERS
V.Chandrika
|
43-48 |
|
12 |
Hacking Vs Ethical Hacking
Kanusu Srinivasa Rao,Ratna Kumari Challa
|
49-52 |
|
13 |
Operating System and Security
D.Suneeta
|
53-57 |
|
14 |
Operating Systems and Security
P Ravindra
|
58-59 |
|
15 |
Service Recovery Technology
P.L.Ramesh
|
60-63 |
|
16 |
Dynamic Query Forms for Database Queries
Rajulapati Siva Sankar,J. Raja Rajeswari
|
64-68 |
|
17 |
Secure Patient-Centric PHRs management in Cloud Computing using ABE
Prathipati Srinu,J. Raja Rajeswari
|
69-72 |
|
18 |
A Novel Secure Encryption Scheme in MANET
A. Pratapa Reddya,Dr. N. Satyanarayana
|
73-78 |
|
19 |
Issues in Electronic security infrastructure in Banking System
CH.Nagabhushanam
|
79-82 |
|
20 |
PROFESSIONAL ETHICS AND HUMAN VALUES IN WORKPLACE
D.S.V.Krishna Kumari
|
83-85 |
|