# | Article Title |
---|
1 | Combating Kernel Rootkits on Linux Version 2.6 (Analysis of Rootkit Prevention, Detection and Correction) Authors : T.J. Anande, T.K. Genger, J.U. Abasiene |
2 | Advanced SQL Query To Flink Translator Authors : Yasien Ghallab Gouda, Hager Saleh Mohammed, Mohamed Helmy Khafagy |
3 | Comparative Analysis of GPON and DSL Access Technologies for Enhancing Broadband Internet Penetration in Nigeria Authors : Agboje Oboyerulu Edevbie, Olowononi Felix Opeyemi |
4 | Analyzing Master Boot Record for Forensic Investigations Authors : Ghania Al Sadi |
5 | Content based Image Retrieval using Model Approach Authors : Kunal Shriwas, Vaqar Ansari |
6 | Cloud Computing Governance Readiness Assessment: Case Study of a local Airline Company Authors : Stephen O. Owuonda, Dan Orwa |
7 | Regulations, Frames of Reference, Information Systems Security and it Governance Authors : Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti |
8 | PDP of the 3GPP SCME Channel Models Emulation, Reverberation Authors : Bouchaib Marah, Wafaâ Bouab Bennani, Pierre Nlend, Adil Sayouti |