Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
reviews on air jordan outlet
adidas twitter hoops basketball schedule
what to wear with the air jordan 1 mid se coconut milk particle grey - hamburger - ui
Nike KD 15 Colorways + Release Dates , IetpShops , nike sb good skating pants
nike Pegasus Athletes & More Stars in Sneakers & Clothes Over 50 Years, Photos – Poligo News, custom nike Pegasus air monarch burnt ends are on fire literally
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol 5 Issue 2
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
Technology
Management
Articles
Case Study
A Comparative Study on Technologies for Secure Transaction in Mobile Commerce
A Survey of Coverage on Wireless Sensor Network
Penetration testing in wireless environment
Penetrating Through the Dark Clouds Of Cyber-Weapons
Comparative Study of Testing Practices of Accounting Software Developed By Different CMM Level Companies
Transition from ipv4 to ipv6 an immediate need for development of Indian IT Industry
Power of Police officer And Other Officer u/s 80 of Information Technology (amendment) Act 2008
Architectural View For Improving Performance of Data Mining And OLAP
Biometric Applications For Public Safety: A Brief Survey
The Management of Application Security in Cloud Computing
Cyber Crime And Cyber Law In India
Security Over Cloud
Spread Spectrum with Chaotic System Using Colpitts Oscillator
An Approach To Secure Mobile Agents
Emergency Hospital Service Provider Through SMS (Mobile) Service
Comparative observations in terms of security measures among Prominent Database Systems
Study of Adaptable Behavior of Intelligent Machines According to the changes in the Environment & Surrounding in Comparison to Human
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!