Accredited Grade "A" By NAAC &
Approved By AICTE
IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
HOME
ABOUT US
ARCHIVE
CALL FOR PAPER
EDITORIAL BOARD
REVIEW POLICY
PUBLICATION ETHICS
CONTACT US
Published Issues
Current Issue
Archive
Submission
Please sent your full manuscript to
[email protected]
Author Guidelines
Useful Documents
Paper Template
Copyright Form
Subscription-Form
Feedback Form
Volume 6 issue 1 January- June 2015
Research Paper & Articles
FIRe: Firefox for Computer Security Incident Reporting and Coordination
1
Ashutosh Bahuguna
View/Download-PDF
Nine Steps to Indian Security, Confidentiality Privacy & Technology in Cyber Space
10
Rajeev Kumar Singh
View/Download-PDF
Security Vulnerabilities in ‘Future of the Web’-IPv6 Protocol Suite
17
Navneet Kaur Popli, Dr. Anup Girdhar
View/Download-PDF
A Study to Examine Cyber Forensic: Trends and Patterns in India
21
Ms. Shruti Verma, Dr. Saurabh Mehta
View/Download-PDF
General View on the Aspects of Cryptography
28
Amit Kumar, Sonia Kumari
View/Download-PDF
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
33
A. Radha Krishna, K. Chandra Sekharaiah
View/Download-PDF
“Aadhar” Management System
40
Ameer Ulla Siddiqui, Mr. Hare Krishna Singh
View/Download-PDF
A Survey on Honeypots Security
44
Amit Kumar, Sonia Kumari
View/Download-PDF
Security Features of User's for Online Social Networks
51
A. Radha Krishna, K. Chandra Sekharaiah
View/Download-PDF
Cyber Security in India: Problems and Prospects
59
Sushma Devi, Mohd. Aarif Rather
View/Download-PDF
An Analysis on Improvement of Website Ranking Using Joomla
69
Kirti Nigam, Satyam Saxena, Nargish Gupta
View/Download-PDF
Network Security-Authentication Methods and Firewall
73
Minal Dhankar
View/Download-PDF
Cyber Security in Biometrics Using Fingerprints
80
Priyanka Rattan, Ritika Kapoor
View/Download-PDF
The Online Murder: Death via Hacked Internet Connected Technologies
86
Nishtha Girotra, Raghunatha Sethupathy
View/Download-PDF
Future Towards Danger: The Terror of Cyber Attacks
90
Kanika Sharma, Tanvi Bhalla
View/Download-PDF
Method for Storing User Password Securely
95
Gunjan Jha, Navneet Popli
View/Download-PDF
Security Issues in Bluetooth Technology-A Review
100
Dr. Menal, Sumeet Gill
View/Download-PDF
Detection of Terrorism Activities Using Face Recognition Technique
104
Garima Bhatia, Mansi
View/Download-PDF
Cloud Security: A Concerning Issue
112
Apurva Aggarwal, Shalini Sharma
View/Download-PDF
Hand Recognition System Design
116
Harleen Kaur, Simranjeet Kaur
View/Download-PDF
Infrared Thermal Imaging
120
Amit Sharma, Nidhi Jindal
View/Download-PDF
Cyber Forensic: Introducing A New Approach to Studying Cyber Forensic and Various Tools to Prevent Cybercrimes
123
B. Vanlalsiama, Nitesh Jha
View/Download-PDF
Cyber Crime and Information Warfare-The New Arenas for WAR
129
Anwesha Pathak, Rohit Sharma
View/Download-PDF
Legislation Vulnerabilities, Threats and Counter Measures in Wireless Network Security
135
Kushagra Dhingra, Ankit Verma
View/Download-PDF
Cyber Ethics in Security Application in the Modern Era of Internet
140
Megha Sharma, Sanchit Mittal, Ankit Verma
View/Download-PDF
Comparison of AES and DES Algorithm
144
Shruti Kumari, Gautam Kumar
View/Download-PDF
Social Networking Security Loopholes
147
Shelly Taneja, Shalini Rawat
View/Download-PDF
Cloud Computing: Vulnerabilities, Privacy and Legislation
152
Amit Kiran, Priyam Lizmary Cherian
View/Download-PDF
The Exigency in Accretion of Cyber Warfare Legislation
158
Raman Solanki, Ankit Verma
View/Download-PDF
Cyber Terrorism-An International Phenomena and An Eminent Threat
164
Biny Pal Singh, Ankit Verma
View/Download-PDF
copyright @ www.iitmjanakpuri.com