Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
adidas tycane lenses for sale on craigslist cars , adidas' Contemporary Hybrid Silhouette, IetpShops, adidas mens manazero pants suits shoes
Nike Nsw Therma - Fit Repel Puffer Jacket– JmksportShops - ladies length nike air max 95 essential black gold
Nike Air Jordan 1 Mid Black Siren Red Womens Bq6472 004 - Nike SB Stefan Janoski Free - AspennigeriaShops - Canvas
Nike Air Force 1 SK8 Skate Shoe Colorways Release Dates , AspennigeriaShops , Nike Club half-zip hoodie in black
Nike Jordan Jumpman hoodie in grey - release dates & sneakers., Jordans - Yeezys, Urlfreeze News
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol 5 Issue 2
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
Technology
Management
Articles
Case Study
A Comparative Study on Technologies for Secure Transaction in Mobile Commerce
A Survey of Coverage on Wireless Sensor Network
Penetration testing in wireless environment
Penetrating Through the Dark Clouds Of Cyber-Weapons
Comparative Study of Testing Practices of Accounting Software Developed By Different CMM Level Companies
Transition from ipv4 to ipv6 an immediate need for development of Indian IT Industry
Power of Police officer And Other Officer u/s 80 of Information Technology (amendment) Act 2008
Architectural View For Improving Performance of Data Mining And OLAP
Biometric Applications For Public Safety: A Brief Survey
The Management of Application Security in Cloud Computing
Cyber Crime And Cyber Law In India
Security Over Cloud
Spread Spectrum with Chaotic System Using Colpitts Oscillator
An Approach To Secure Mobile Agents
Emergency Hospital Service Provider Through SMS (Mobile) Service
Comparative observations in terms of security measures among Prominent Database Systems
Study of Adaptable Behavior of Intelligent Machines According to the changes in the Environment & Surrounding in Comparison to Human
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!