Search articles
Search authors
in all GESJ journals
2013 | No.4(40) [2013.12.31]
CONTENTS
Sathyaraj Ragupathi
CLIENT PUZZLE TECHINQUE TO OVERCOME DDOS IN TLS
3-9
View article (PDF)
or
Abstract
Hitendra Suryawanshi
,
Amit Mishra
,
Amit Sinhal
DUAL-LAYER DIGITAL IMAGE WATERMARKING FOR INTELLECTUAL PROPERTY RIGHT PROTECTION
10-15
View article (PDF)
or
Abstract
Shouket Ahmad Kouchay
SECURED ARCHITECTURE STRATEGY FOR FIGHTING AGAINST BOTS
16-23
View article (PDF)
or
Abstract
Seyi Osunade
A CONCEPTUAL DESIGN OF A LOW COST IDENTIFICATION MANAGEMENT SYSTEM FOR NIGERIA
24-32
View article (PDF)
or
Abstract
K.rachel Praveena
,
K.suresh Babu
,
Sudhakar G
DETECTING AND RESOLVING IDENTITY CRIMES BY USING SECURE MECHANISM
33-43
View article (PDF)
or
Abstract
Marian Slabinoha
COMPRESSION ALGORITHM OF TECHNOLOGICAL PROCESS DATA BASED ON HAAR WAVELET
(Language: Russian)
44-50
View article (PDF)
or
Abstract
Natela Archvadze
POSSIBILITY OF FUNCTIONAL PROGRAMS VERIFICATION THROUGH APPLICATION OF MODEL CHECKING
51-58
View article (PDF)
or
Abstract
Andrey Oganov
,
Vladimir Gogunsky
USE OF THE THEORY OF CONSTRAINTS IN CASE OF IMPLEMENTATION ENTERPRISES PROJECT MANAGEMENT OFFICE
(Language: Russian)
59-65
View article (PDF)
or
Abstract
1
printer version
Internet Academy
2001-2024
ISSN 1512-1232